{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:50:07Z","timestamp":1770270607911,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T00:00:00Z","timestamp":1527465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,28]]},"DOI":"10.1145\/3196398.3196433","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"265-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Leveraging historical versions of Android apps for efficient and precise taint analysis"],"prefix":"10.1145","author":[{"given":"Haipeng","family":"Cai","sequence":"first","affiliation":[{"name":"Washington State University, Pullman"}]},{"given":"John","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman"}]}],"member":"320","published-online":{"date-parts":[[2018,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568243"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158694"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Benjamin Bichsel Petar Tsankov Veselin Raychev and Martin Vechev. 2017. Statistical Deobfuscation for Android. http:\/\/apk-deguard.com\/. (2017).  Benjamin Bichsel Petar Tsankov Veselin Raychev and Martin Vechev. 2017. Statistical Deobfuscation for Android. http:\/\/apk-deguard.com\/. (2017).","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_1_5_1","volume-title":"Cost-effective dependency analysis for reliable software evolution","author":"Cai Haipeng"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3044222.3051229"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.20"},{"key":"e_1_3_2_1_9_1","first-page":"998","article-title":"Android security: a survey of issues, malware penetration, and defenses. Communications Surveys & Tutorials","volume":"17","author":"Faruki Parvez","year":"2015","journal-title":"IEEE"},{"key":"e_1_3_2_1_10_1","unstructured":"Caleb Fenton. 2018. Generic Android Deobfuscator. https:\/\/github.com\/CalebFenton\/simplify. (2018).  Caleb Fenton. 2018. Generic Android Deobfuscator. https:\/\/github.com\/CalebFenton\/simplify. (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael Gordon Deokhwan Kim Jeff Perkins Limei Gilhamy Nguyen Nguyen and Martin Rinard. 2015. Information-Flow Analysis of Android Applications in DroidSafe. In NDSS.  Michael Gordon Deokhwan Kim Jeff Perkins Limei Gilhamy Nguyen Nguyen and Martin Rinard. 2015. Information-Flow Analysis of Android Applications in DroidSafe. In NDSS.","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970332"},{"key":"e_1_3_2_1_13_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop.","author":"Lam Patrick","year":"2011"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/951952.952366"},{"key":"e_1_3_2_1_15_1","unstructured":"Kangjie Lu Zhichun Li Vasileios P. Kemerlis Zhenyu Wu Long Lu Cong Zheng Zhiyun Qian Wenke Lee and Guofei Jiang. 2015. Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.. In NDSS.  Kangjie Lu Zhichun Li Vasileios P. Kemerlis Zhenyu Wu Long Lu Cong Zheng Zhiyun Qian Wenke Lee and Guofei Jiang. 2015. Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993558"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58766"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.17"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/77726.255173"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00405-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 15th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196398.3196433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196398.3196433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:04Z","timestamp":1750210744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196398.3196433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,28]]},"references-count":21,"alternative-id":["10.1145\/3196398.3196433","10.1145\/3196398"],"URL":"https:\/\/doi.org\/10.1145\/3196398.3196433","relation":{},"subject":[],"published":{"date-parts":[[2018,5,28]]},"assertion":[{"value":"2018-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}