{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:53:55Z","timestamp":1764402835311,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T00:00:00Z","timestamp":1519430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,24]]},"DOI":"10.1145\/3168820","type":"proceedings-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T20:06:04Z","timestamp":1519934764000},"page":"50-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Resilient decentralized Android application repackaging detection using logic bombs"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Zeng","sequence":"first","affiliation":[{"name":"Temple University, USA"}]},{"given":"Lannan","family":"Luo","sequence":"additional","affiliation":[{"name":"University of South Carolina, USA"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California at Riverside, USA"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Temple University, USA"}]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AndroidHooker. 2016. https:\/\/github.com\/AndroidHooker."},{"key":"e_1_3_2_1_2_1","unstructured":"Apktool. 2017. https:\/\/ibotpeaches.github.io\/Apktool\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Davide Balzarotti Marco Cova Christoph Karlberger Christopher Kruegel Engin Kirda and Giovanni Vigna. 2010. Efficient Detection of Split Personalities in Malware. In NDSS."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Zhenkai Liang, James Newsome, Pongsin Poosankam, Dawn Song, and Heng Yin.","author":"Brumley David","year":"2007","unstructured":"David Brumley, Cody Hartwig, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Dawn Song, and Heng Yin. 2007. BitScope: Automatically dissecting malicious binaries. In Tech. Rep. CMU-CS-07-133."},{"key":"e_1_3_2_1_6_1","unstructured":"David Brumley Cody Hartwig Zhenkai Liang James Newsome Dawn Song and Heng Yin. 2008. Automatically identifying trigger-based behavior in malware. In Botnet Detection."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647777.734775"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Kai Chen Peng Liu and Yingjun Zhang. 2014. Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets. In ICSE.","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_9_1","unstructured":"CLOC--Count Lines of Code. 2013. http:\/\/cloc.sourceforge.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime. In IMPS@ESSoS."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168918.1168862"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jonathan Crussell Clint Gibler and Hao Chen. 2012. Attack of the Clones: Detecting Cloned Applications on Android Markets. In ESORICS.","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Jonathan Crussell Clint Gibler and Hao Chen. 2013. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In ESORICS.","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_14_1","unstructured":"Dashboards. 2017. http:\/\/developer.android.com\/about\/dashboards\/index.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Key derivation function. 2017. https:\/\/en.wikipedia.org\/wiki\/Key_derivation_function."},{"key":"e_1_3_2_1_16_1","unstructured":"dex2jar. 2017. https:\/\/github.com\/pxb1988\/dex2jar."},{"key":"e_1_3_2_1_17_1","unstructured":"F-Droid. 2017. Free and Open Source Software Apps for Android. https:\/\/f-droid.org\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Parvez Faruki Vijay Ganmoor Vijay Laxmi M. S. Gaur and Ammar Bharmal. 2013. AndroSimilar: Robust statistical feature signature for Android malware detection. In SIN.","DOI":"10.1145\/2523514.2523539"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Yanick Fratantonio Antonio Bianchi William Robertson Engin Kirda Christopher Kruegel and Giovanni Vigna. 2016. TriggerScope: Towards Detecting Logic Bombs in Android Applications. In S&P.","DOI":"10.1109\/SP.2016.30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Heqing Huang Sencun Zhu Peng Liu and Dinghao Wu. 2013. A framework for evaluating mobile app repackaging detection algorithms. In Trust and Trustworthy Computing.","DOI":"10.1007\/978-3-642-38908-5_13"},{"key":"e_1_3_2_1_23_1","unstructured":"Javassist. 2017. http:\/\/jboss-javassist.github.io\/javassist\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081341"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883666"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Martina Lindorfer Stamatis Volanis Alessandro Sisto Matthias Neugschwandtner Elias Athanasopoulos Federico Maggi Christian Platzer Stefano Zanero and Sotiris Ioannidis. 2014. AndRadar: fast discovery of android applications in alternative markets. In DIMVA.","DOI":"10.1007\/978-3-319-08509-8_4"},{"key":"e_1_3_2_1_28_1","unstructured":"Lannan Luo Yu Fu Dinghao Wu Sencun Zhu and Peng Liu. 2016. Repackage-proofing Android Apps. In DSN."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081361"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Andreas Moser Christopher Kruegel and Engin Kirda. 2007. Exploring multiple execution paths for malware analysis. In S&P.","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_35_1","volume-title":"Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps. In NDSS.","author":"Pan Xiaorui","year":"2017","unstructured":"Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, and Heng Yin. 2017. Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps. In NDSS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Rahul Potharaju Andrew Newell Cristina Nita-Rotaru and Xiangyu Zhang. 2012. Plagiarizing smartphone applications: attack strategies and defense techniques. In In Engineering Secure Software and Systems.","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Siegfried Rasthofer Steven Arzt Marc Miltenberger and Eric Bodden. 2016. Harvesting runtime values in android applications that feature anti-analysis techniques. In NDSS.","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_2_1_38_1","unstructured":"Remote Application Removal Feature. 2010. http:\/\/android-developers.blogspot.com\/2010\/06\/exercising-our-remote-application.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642977"},{"key":"e_1_3_2_1_40_1","unstructured":"Monirul I. Sharif Andrea Lanzi Jonathon T. Giffin and Wenke Lee. 2008. Impeding Malware Analysis Using Conditional Code Obfuscation. In NDSS."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Chengyu Song Paul Royal and Wenke Lee. 2012. Impeding Automated Malware Analysis with Environment-sensitive Malware. In HotSec.","DOI":"10.5555\/2372387.2372391"},{"key":"e_1_3_2_1_42_1","unstructured":"Soot. 2017. http:\/\/sable.github.io\/soot\/."},{"key":"e_1_3_2_1_43_1","unstructured":"Top Manufacturers. 2017. http:\/\/www.appbrain.com\/stats\/top-manufacturers."},{"key":"e_1_3_2_1_44_1","unstructured":"Traceview. 2017. http:\/\/developer.android.com\/tools\/help\/traceview.html."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.46"},{"key":"e_1_3_2_1_46_1","unstructured":"UI\/Application Exerciser Monkey. 2017. http:\/\/developer.android.com\/tools\/help\/monkey.html."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776451"},{"key":"e_1_3_2_1_48_1","unstructured":"Maurice Vincent Wilkes. 1972. Time-sharing computer systems. (1972)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766089"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911743"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362820"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536881"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.16"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Chao Zhang Dawn Song Scott A Carr Mathias Payer Tongxin Li Yu Ding and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls. In NDSS.","DOI":"10.14722\/ndss.2016.23164"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Fangfang Zhang Heqing Huang Sencun Zhu Dinghao Wu and Peng Liu. 2014. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection. In WiSec.","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_56_1","volume-title":"Kemoge: Another Mobile Malicious Adware Infecting Over 20 Countries. https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/10\/kemoge_another_mobi.html.","author":"Zhang Yulong","year":"2015","unstructured":"Yulong Zhang. 2015. Kemoge: Another Mobile Malicious Adware Infecting Over 20 Countries. https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/10\/kemoge_another_mobi.html."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Wu Zhou Xinwen Zhang and Xuxian Jiang. 2013. AppInk: watermarking android apps for repackaging deterrence. In ASIA CCS.","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","unstructured":"Wu Zhou Yajin Zhou Michael Grace Xuxian Jiang and Shihong Zou. 2013. Fast Scalable Detection of \"Piggybacked\" Mobile Applications. In CODASPY.","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Wu Zhou Yajin Zhou Xuxian Jiang and Peng Ning. 2012. Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces. In CODASPY.","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Yajin Zhou and Xuxian Jiang. 2012. Dissecting Android Malware: Characterization and Evolution. In S&P.","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CGO '18: 16th Annual IEEE\/ACM International Symposium on Code Generation and Optimization","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS Computer Society"],"location":"Vienna Austria","acronym":"CGO '18"},"container-title":["Proceedings of the 2018 International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3168820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3168820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:33Z","timestamp":1750217433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3168820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,24]]},"references-count":60,"alternative-id":["10.1145\/3168820","10.1145\/3179541"],"URL":"https:\/\/doi.org\/10.1145\/3168820","relation":{},"subject":[],"published":{"date-parts":[[2018,2,24]]},"assertion":[{"value":"2018-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}