{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T12:25:41Z","timestamp":1770553541898,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176942","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"143-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Effectiveness of Android Obfuscation on Evading Anti-malware"],"prefix":"10.1145","author":[{"given":"Melissa","family":"Chua","sequence":"first","affiliation":[{"name":"Defence Science &amp; Technology Agency, Singapore, Singapore"}]},{"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"August","author":"Inc.","year":"2016","unstructured":"Inc. IDC Research. Smartphone os market share , August 2016 . Inc. IDC Research. Smartphone os market share, August 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"September","author":"Hatchimonji G.","year":"2013","unstructured":"G. Hatchimonji . Is mobile anti-virus even necessary? , September 2013 . G. Hatchimonji. Is mobile anti-virus even necessary?, September 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2661723"},{"key":"e_1_3_2_1_4_1","volume-title":"July","year":"2017","unstructured":"TrendMicro. Ransomware recap: Slocker copycats wannacry , July 2017 . TrendMicro. Ransomware recap: Slocker copycats wannacry, July 2017."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555157"},{"key":"e_1_3_2_1_7_1","volume-title":"Symposium on Network and Distributed System Security","author":"Daniel A.","year":"2014","unstructured":"A. Daniel : Effective and explainable detection of android malware in your pocket . Symposium on Network and Distributed System Security , Feb 2014 . A. Daniel et al. Drebin: Effective and explainable detection of android malware in your pocket. Symposium on Network and Distributed System Security, Feb 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"July","author":"Parkour M.","year":"2017","unstructured":"M. Parkour . Contagio mobile: Mobile malware minidump , July 2017 . M. Parkour. Contagio mobile: Mobile malware minidump, July 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the BALTIC CONFERENCE Network Security and Forensics","author":"Spreitzenbarth M.","year":"2012","unstructured":"M. Spreitzenbarth . The evil inside a droid - android malware: Past, present and future . In Proceedings of the BALTIC CONFERENCE Network Security and Forensics , 2012 . M. Spreitzenbarth. The evil inside a droid - android malware: Past, present and future. In Proceedings of the BALTIC CONFERENCE Network Security and Forensics, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_11_1","volume-title":"September","year":"2012","unstructured":"VirusTotal. Virustotal public api v2.0 , September 2012 . VirusTotal. Virustotal public api v2.0, September 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2014.20"},{"key":"e_1_3_2_1_13_1","first-page":"463","volume-title":"IEEE International Conference on Systems, Man and Cybernetics","author":"Balachandran V.","year":"2014","unstructured":"V. Balachandran Control flow obfuscation for android applications . IEEE International Conference on Systems, Man and Cybernetics , pages 463 -- 469 , Dec 2014 . V. Balachandran et al. Control flow obfuscation for android applications. IEEE International Conference on Systems, Man and Cybernetics, pages 463--469, Dec 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.003"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176942","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176942"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":14,"alternative-id":["10.1145\/3176258.3176942","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176942","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}