{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T06:48:32Z","timestamp":1776754112463,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,20]],"date-time":"2017-09-20T00:00:00Z","timestamp":1505865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea(NRF) & Ministry of Science, ICT and Future Planning","award":["2015R1A2A1A15053738"],"award-info":[{"award-number":["2015R1A2A1A15053738"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,20]]},"DOI":"10.1145\/3129676.3129708","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"217-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications"],"prefix":"10.1145","author":[{"given":"Kyeonghwan","family":"Lim","sequence":"first","affiliation":[{"name":"Dept. of Computer Science, Dankook University, Yongin, Korea"}]},{"given":"Jaemin","family":"Jeong","sequence":"additional","affiliation":[{"name":"Dept. of Software, Dankook University, Yongin, Korea"}]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science, Dankook University, Yongin, Korea"}]},{"given":"Jongmoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Dept. of Software, Dankook University, Yongin, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Konkuk University, Chungbuk, Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Konkuk University, Chungbuk, Korea"}]},{"given":"Seongtae","family":"Jhang","sequence":"additional","affiliation":[{"name":"Dept. of Computer, Suwon University, Suwon, Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mobile Threat Report What's on the Horizon for","author":"Snell B.","year":"2016","unstructured":"Snell B. 2016. Mobile Threat Report What's on the Horizon for 2016 . https:\/\/www.mcafee.com\/us\/resources\/reports\/rpmobile-threat-report-2016.pdf Snell B. 2016. Mobile Threat Report What's on the Horizon for 2016. https:\/\/www.mcafee.com\/us\/resources\/reports\/rpmobile-threat-report-2016.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14257\/jse.2014.02.01"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 20th USENIX conference on Security (San Fransicso, USA, August 08--12, 2011). SEC '11. USENIX","author":"Enck W.","unstructured":"Enck , W. , Octeau , D. , McDaniel , P. and Chaudhuri , S . 2011. A Study of Android Application Security . In Proceedings of the 20th USENIX conference on Security (San Fransicso, USA, August 08--12, 2011). SEC '11. USENIX , San Francisco, CA, 21--21. Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S. 2011. A Study of Android Application Security. In Proceedings of the 20th USENIX conference on Security (San Fransicso, USA, August 08--12, 2011). SEC '11. USENIX, San Francisco, CA, 21--21."},{"key":"e_1_3_2_1_5_1","unstructured":"Chebyshev V. and Unuchek R. 2014. Mobile Malware Evolution: 2013. https:\/\/securelist.com\/58335\/mobile-malware-evolution-2013.  Chebyshev V. and Unuchek R. 2014. Mobile Malware Evolution: 2013. https:\/\/securelist.com\/58335\/mobile-malware-evolution-2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2013.38B.8.654"},{"key":"e_1_3_2_1_7_1","volume-title":"Code protection in android. Lab Report","author":"Schulz P.","unstructured":"Schulz , P. 2012. Code protection in android. Lab Report . University of Bonn at North Rhine-Westphalia . Schulz, P. 2012. Code protection in android. Lab Report. University of Bonn at North Rhine-Westphalia."},{"key":"e_1_3_2_1_8_1","volume-title":"www.bangcle.com. [Online","author":"Bangcle","year":"2016","unstructured":"Bangcle . www.bangcle.com. [Online ; Accessed on September 10, 2016 ]. Bangcle. www.bangcle.com. [Online; Accessed on September 10, 2016]."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/liapp.lockincomp.com\/. [Online","author":"LIAPP.","year":"2016","unstructured":"LIAPP. https:\/\/liapp.lockincomp.com\/. [Online ; Accessed on September 10, 2016 ]. LIAPP. https:\/\/liapp.lockincomp.com\/. [Online; Accessed on September 10, 2016]."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1559-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808126"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_17"},{"key":"e_1_3_2_1_14_1","first-page":"39","article-title":"HOOKDROID: DALVIK DYNAMIC INSTRUMENTATION FOR SECURITY ANALYTICS","volume":"8","author":"Costamagna V.","year":"2016","unstructured":"Costamagna , V. and Bergadano , F. 2016 . HOOKDROID: DALVIK DYNAMIC INSTRUMENTATION FOR SECURITY ANALYTICS . International Journal on Information Technologies and Security. 8 , 1 (2016), 39 -- 52 . Costamagna, V. and Bergadano, F. 2016. HOOKDROID: DALVIK DYNAMIC INSTRUMENTATION FOR SECURITY ANALYTICS. International Journal on Information Technologies and Security. 8, 1 (2016), 39--52.","journal-title":"International Journal on Information Technologies and Security."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2016 Innovations in Mobile Privacy and Security (Egham, SRY, April 06, 2016). IMPS 2016. CEURWS, 20--28","author":"Costamagna V.","unstructured":"Costamagna , V. and Zheng , C . 2016. ARTDroid: A virtual-method hooking framework on android ART runtime . In Proceedings of the 2016 Innovations in Mobile Privacy and Security (Egham, SRY, April 06, 2016). IMPS 2016. CEURWS, 20--28 . Costamagna, V. and Zheng, C. 2016. ARTDroid: A virtual-method hooking framework on android ART runtime. In Proceedings of the 2016 Innovations in Mobile Privacy and Security (Egham, SRY, April 06, 2016). IMPS 2016. CEURWS, 20--28."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. Android NDK. https:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html.  Google. Android NDK. https:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Welton R. 2014. Obfuscating Android Applications using O-LLVM and the NDK. http:\/\/fuzion24.github.io\/android\/obfuscation\/ndk\/llvm\/o-llvm\/2014\/07\/27\/android-obfuscation-o-llvm-ndk\/.  Welton R. 2014. Obfuscating Android Applications using O-LLVM and the NDK. http:\/\/fuzion24.github.io\/android\/obfuscation\/ndk\/llvm\/o-llvm\/2014\/07\/27\/android-obfuscation-o-llvm-ndk\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2015.25.1.17"},{"key":"e_1_3_2_1_19_1","article-title":"An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks","volume":"7","author":"Lim K.","year":"2016","unstructured":"Lim , K. , Jeong , Y. , Cho , S. , Park , M. and Han , S. 2016 . An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks . Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7 , 3( Sep. 2016), 40--52. Lim, K., Jeong, Y., Cho, S., Park, M. and Han, S. 2016. An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, 3(Sep. 2016), 40--52.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03783-7_10"}],"event":{"name":"RACS '17: International Conference on Research in Adaptive and Convergent Systems","location":"Krakow Poland","acronym":"RACS '17","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"]},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3129676.3129708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3129676.3129708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:32Z","timestamp":1750217432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3129676.3129708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,20]]},"references-count":20,"alternative-id":["10.1145\/3129676.3129708","10.1145\/3129676"],"URL":"https:\/\/doi.org\/10.1145\/3129676.3129708","relation":{},"subject":[],"published":{"date-parts":[[2017,9,20]]},"assertion":[{"value":"2017-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}