{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T03:55:18Z","timestamp":1754020518921,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vivek Balachandran"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176943","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"146-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["AEON"],"prefix":"10.1145","author":[{"given":"D","family":"Geethanjali","sequence":"first","affiliation":[{"name":"Singapore Institute of Technology Singapore, SINGAPORE, Singapore"}]},{"given":"Tan Li","family":"Ying","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology Singapore, SINGAPORE, Singapore"}]},{"given":"Chua Wan Jun","family":"Melissa","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Agency, SINGAPORE, Singapore"}]},{"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology Singapore, SINGAPORE, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"unstructured":"GartnerGartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of 2017 https:\/\/www.gartner.com\/newsroom\/id\/3725117  GartnerGartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of 2017 https:\/\/www.gartner.com\/newsroom\/id\/3725117","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.cose.2016.05.003"},{"key":"e_1_3_2_1_3_1","volume-title":"Man and Cybernetics (SMC)","author":"Balachandran S. Emmanuel","year":"2014","unstructured":"V. Balachandran , S. Emmanuel , and Ng Wee Keong . \" Obfuscation by code fragmentation to evade reverse engineering.\" In IEEE International Conference Systems , Man and Cybernetics (SMC) , 2014 . V. Balachandran, S. Emmanuel, and Ng Wee Keong. \"Obfuscation by code fragmentation to evade reverse engineering.\" In IEEE International Conference Systems, Man and Cybernetics (SMC), 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.guardsquare.com\/en\/dexguard (accessed on","author":"Dexguard","year":"2017","unstructured":"Dexguard , https:\/\/www.guardsquare.com\/en\/dexguard (accessed on 12 Nov 2017 ) Dexguard, https:\/\/www.guardsquare.com\/en\/dexguard (accessed on 12 Nov 2017)"},{"volume-title":"https:\/\/www.preemptive.com\/ (accessed on","year":"2017","unstructured":"DashO , https:\/\/www.preemptive.com\/ (accessed on 12 Nov 2017 ) DashO, https:\/\/www.preemptive.com\/ (accessed on 12 Nov 2017)","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.beanshell.org\/ (accessed on","author":"Beanshell","year":"2017","unstructured":"Beanshell , http:\/\/www.beanshell.org\/ (accessed on 12 Nov 2017 ) Beanshell, http:\/\/www.beanshell.org\/ (accessed on 12 Nov 2017)"},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/skylot\/jadx (accessed on","author":"JADX","year":"2017","unstructured":"JADX , https:\/\/github.com\/skylot\/jadx (accessed on 12 Nov 2017 ) JADX, https:\/\/github.com\/skylot\/jadx (accessed on 12 Nov 2017)"},{"volume-title":"https:\/\/github.com\/SITSecureSoftwareDevelopmentTeam\/AEON_Obfuscation (accessed on","year":"2017","unstructured":"AEON Source code , https:\/\/github.com\/SITSecureSoftwareDevelopmentTeam\/AEON_Obfuscation (accessed on 12 Nov 2017 ) AEON Source code, https:\/\/github.com\/SITSecureSoftwareDevelopmentTeam\/AEON_Obfuscation (accessed on 12 Nov 2017)","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"Man and Cybernetics (SMC)","author":"Balachandran S. Emmanuel","year":"2014","unstructured":"V. Balachandran , S. Emmanuel , and Ng Wee Keong . \" Obfuscation by code fragmentation to evade reverse engineering.\" In IEEE International Conference Systems , Man and Cybernetics (SMC) , 2014 . V. Balachandran, S. Emmanuel, and Ng Wee Keong. \"Obfuscation by code fragmentation to evade reverse engineering.\" In IEEE International Conference Systems, Man and Cybernetics (SMC), 2014."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '18","name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176943"}},"subtitle":["Android Encryption based Obfuscation"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":9,"alternative-id":["10.1145\/3176258.3176943","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176943","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}