{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:54Z","timestamp":1759332714396,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation CNS","award":["1223477, 1223495, 1527141, 1618493"],"award-info":[{"award-number":["1223477, 1223495, 1527141, 1618493"]}]},{"name":"National Key Research and Development Program of China","award":["2016QY04W0805, 2016YFB0801603"],"award-info":[{"award-number":["2016QY04W0805, 2016YFB0801603"]}]},{"name":"Youth Innovation Promotion Association CAS"},{"name":"Strategic Priority Research Program of CAS","award":["XDA06010701"],"award-info":[{"award-number":["XDA06010701"]}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1610127"],"award-info":[{"award-number":["W911NF1610127"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1536106, 61728209"],"award-info":[{"award-number":["U1536106, 61728209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134009","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"815-828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution"],"prefix":"10.1145","author":[{"given":"Yi","family":"Chen","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Bloomington, IN, USA"}]},{"given":"Yeonjoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Bloomington, IN, USA"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AddictiveTips. 2017. Easily Monitor All Incoming & Outgoing Network Connections On Android. http:\/\/www.addictivetips.com\/android\/monitor-all-incoming-outgoing-network-connections-on-android\/. (2017)."},{"volume-title":"Can Android Applications Be Identified Using Only TCP\/IP Headers of Their Launch Time Traffic Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)","author":"Alan Hasan Faik","key":"e_1_3_2_2_2_1","unstructured":"Hasan Faik Alan and Jasleen Kaur [n. d.]. Can Android Applications Be Identified Using Only TCP\/IP Headers of Their Launch Time Traffic Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),(Ed.)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_2_5_1","volume-title":"USENIX Security Symposium. 659--674","author":"Chen Kai","year":"2015","unstructured":"Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. USENIX Security Symposium. 659--674."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Mauro Conti Luigi V. Mancini Riccardo Spolaor and Nino Vincenzo Verde 2015. Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY' 15). 297--304.","DOI":"10.1145\/2699026.2699119"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Andrea Continella Yanick Fratantonio Martina Lindorfer Alessandro Puccetti Ali Zand Christopher Kruegel and Giovanni Vigna 2017. Obfuscation-resilient privacy leak detection for mobile apps through differential analysis Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS). 1--16.","DOI":"10.14722\/ndss.2017.23465"},{"volume-title":"NetworkProfiler: Towards automatic fingerprinting of Android apps Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM'13). 809--817","author":"Dai Shuaifu","key":"e_1_3_2_2_9_1","unstructured":"Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, and Dawn Song 2013. NetworkProfiler: Towards automatic fingerprinting of Android apps Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM'13). 809--817."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Marianne De Michiel Armelle Bonenfant Hugues Cass\u00e9 and Pascal Sainrat 2008. Static Loop Bound Analysis of C Programs Based on Flow Analysis and Abstract Interpretation Proceedings of the 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE 161--166.","DOI":"10.1109\/RTCSA.2008.53"},{"key":"e_1_3_2_2_11_1","unstructured":"Gartner 2017. Managed Security Service Provider (MSSP). http:\/\/www.gartner.com\/it-glossary\/mssp-managed-security-service-provider\/. (2017)."},{"key":"e_1_3_2_2_12_1","first-page":"62","article-title":"Bring your own device (BYOD): Security risks and mitigating strategies","volume":"4","author":"Ghosh Arnab","year":"2013","unstructured":"Arnab Ghosh, Prashant Kumar Gajar, and Shashikant Rai 2013. Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, Vol. 4, 4 (2013), 62--70.","journal-title":"Journal of Global Research in Computer Science"},{"key":"e_1_3_2_2_13_1","unstructured":"Google 2017. The Google Android Security Team's Classifications for PotentiallyHarmful Applications. https:\/\/static.googleusercontent.com\/media\/source.andro\u0131d.com\/en\/\/security\/reports\/Google_Android_Security_PHA_classifications.pdf. (2017)."},{"volume-title":"Information-flow analysis of Android applications in DroidSafe Proc. of the Network and Distributed System Security Symposium (NDSS)","author":"Gordon Michael I","key":"e_1_3_2_2_14_1","unstructured":"Michael I Gordon, Deokhwan Kim, Jeff Perkins, Limei Gilham, Nguyen Nguyen, and Martin Rinard. 2015. Information-flow analysis of Android applications in DroidSafe Proc. of the Network and Distributed System Security Symposium (NDSS). The Internet Society."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480706"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.72"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Mariam Kamkar Peter Fritzson and Nahid Shahmehri. 1993. Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing Proceedings of the Conference on Software Maintenance (ICSM' 93). 386--395.","DOI":"10.1109\/ICSM.1993.366924"},{"key":"e_1_3_2_2_18_1","volume-title":"Program Slicing in Understanding of Large Programs Proceedings of the 6th International Workshop on Program Comprehension (IWPC'89)","author":"Korel Bogdan","year":"1998","unstructured":"Bogdan Korel and Juergen Rilling 1998. Program Slicing in Understanding of Large Programs Proceedings of the 6th International Workshop on Program Comprehension (IWPC'89). 145--152."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Anh Le Janus Varmarken Simon Langhoff Anastasia Shuba Minas Gjoka and Athina Markopoulou. 2015. AntMonitor: A System for Monitoring from Mobile Devices Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data . 15--20.","DOI":"10.1145\/2787394.2787396"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884870"},{"key":"e_1_3_2_2_21_1","unstructured":"Envato Pty Ltd. 2017. Analyzing Android Network Traffic. http:\/\/code.tutsplus.comtutorials\/analyzing-android-network-traffic--mobile-10663. (2017)."},{"key":"e_1_3_2_2_22_1","volume-title":"Anna Rita Fasolino, and Malcolm Munro","author":"Lucia Andrea De","year":"1996","unstructured":"Andrea De Lucia, Anna Rita Fasolino, and Malcolm Munro. 1996. Understanding Function Behaviors through Program Slicing Proceedings of the 4th International Workshop on Program Comprehension (WPC'96). 9--10."},{"key":"e_1_3_2_2_23_1","volume-title":"AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic Proceedings of the 16th International Conference on Passive and Active Measurement (PAM'15)","author":"Miskovic Stanislav","year":"2015","unstructured":"Stanislav Miskovic, Gene Moo Lee, Yong Liao, and Mario Baldi 2015. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic Proceedings of the 16th International Conference on Passive and Active Measurement (PAM'15). 57--69."},{"key":"e_1_3_2_2_24_1","volume-title":"Enhancing the Performance of Mobile Traffic Identification with Communication Patterns Proceedings of the 39th IEEE Annual Computer Software and Applications Conference (COMPSAC'2015)","author":"Mongkolluksamee Sophon","year":"2015","unstructured":"Sophon Mongkolluksamee, Vasaka Visoottiviseth, and Kensuke Fukuda 2015. Enhancing the Performance of Mobile Traffic Identification with Communication Patterns Proceedings of the 39th IEEE Annual Computer Software and Applications Conference (COMPSAC'2015). 336--345."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"e_1_3_2_2_26_1","unstructured":"Palo Alto Networks. 2017. WildFire Analysis Categories. https:\/\/www.paloalto-networks.com\/documentation\/autofocus\/autofocus\/autofocus_admin_guide\/assess-autofocus-artifacts\/wildfire-analysis-categories.html. (2017)."},{"key":"e_1_3_2_2_27_1","volume-title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques Proceedings of the Network and Distributed System Security Symposium (NDSS'16)","author":"Rasthofer Siegfried","year":"2016","unstructured":"Siegfried Rasthofer, Steven Arzt, Marc Miltenberger, and Eric Bodden 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques Proceedings of the Network and Distributed System Security Symposium (NDSS'16)."},{"key":"e_1_3_2_2_28_1","unstructured":"RFC 2000. HTTP Over TLS. https:\/\/tools.ietf.org\/html\/rfc2818. (2000)."},{"volume-title":"Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics Proceedings of the 11th IEEE International Workshop on Program Comprehension","author":"Rilling Juergen","key":"e_1_3_2_2_29_1","unstructured":"Juergen Rilling and Tuomas Klemola 2003. Identifying comprehension bottlenecks using program slicing and cognitive complexity metrics Proceedings of the 11th IEEE International Workshop on Program Comprehension. IEEE, 115--124."},{"key":"e_1_3_2_2_30_1","unstructured":"Smali 2013. An assembler\/disassembler for Android's dex format. http:\/\/code.google.com\/p\/smali\/. (2013)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Manu Sridharan Stephen J. Fink and Rastislav Bod\u00edk. 2007. Thin slicing Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI'07). 112--122.","DOI":"10.1145\/1273442.1250748"},{"key":"e_1_3_2_2_32_1","volume-title":"Wenyong Zhong, Cheng Chang, Zhiwen Chen, Wentao Li, and Shuna Yao","author":"Sun Jianhua","year":"2015","unstructured":"Jianhua Sun, Lingjun She andHao Chen, Wenyong Zhong, Cheng Chang, Zhiwen Chen, Wentao Li, and Shuna Yao 2015. Automatically identifying apps in mobile traffic. Concurrency and Computation: Practice and Experience (2015)."},{"key":"e_1_3_2_2_33_1","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip Frank","year":"1995","unstructured":"Frank Tip. 1995. A survey of program slicing techniques. Journal of Program Language Vol. 3, 3 (1995).","journal-title":"Journal of Program Language"},{"key":"e_1_3_2_2_34_1","volume-title":"Understanding Mobile App Usage Patterns Using In-App Advertisements Proceedings of the 14th International Conference on Passive and Active Measurement (PAM'13)","author":"Tongaonkar Alok","year":"2013","unstructured":"Alok Tongaonkar, Shuaifu Dai, Antonio Nucci, and Dawn Song. 2013. Understanding Mobile App Usage Patterns Using In-App Advertisements Proceedings of the 14th International Conference on Passive and Active Measurement (PAM'13). 63--72."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19835-9_9"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/358557.358577"},{"key":"e_1_3_2_2_37_1","volume-title":"Mario Baldi, and Antonio Nucci","author":"Xu Qiang","year":"2014","unstructured":"Qiang Xu, Thomas Andrews, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, and Antonio Nucci 2014. FLOWR: a self-learning system for classifying mobileapplication traffic Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS'14). 569--570."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590312"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134002"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134009","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:33:51Z","timestamp":1750966431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":39,"alternative-id":["10.1145\/3133956.3134009","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134009","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}