{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:01:32Z","timestamp":1777899692616,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416582","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"919-930","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Automated third-party library detection for Android applications"],"prefix":"10.1145","author":[{"given":"Xian","family":"Zhan","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Lingling","family":"Fan","sequence":"additional","affiliation":[{"name":"Nankai Univerisity, China and Nanyang Technological University, Singapore"}]},{"given":"Tianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Sen","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China and Nanyang Technological University, Singapore"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Yifei","family":"Xu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2007. survey. Guidelines for performing systematic literature reviews in software engineering."},{"key":"e_1_3_2_1_2_1","unstructured":"2010-2019. AppBrain. https:\/\/www.appbrain.com\/stats\/libraries\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. ART. https:\/\/source.android.com\/devices\/tech\/dalvik."},{"key":"e_1_3_2_1_4_1","unstructured":"2013. sdhash. http:\/\/roussev.net\/sdhash\/sdhash.html."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Androguard. https:\/\/github.com\/androguard\/androguard."},{"key":"e_1_3_2_1_6_1","unstructured":"2016. LibRadar. https:\/\/github.com\/pkumza\/LibRadar"},{"key":"e_1_3_2_1_7_1","unstructured":"2017. LibD. https:\/\/github.com\/IIE-LibD\/libd"},{"key":"e_1_3_2_1_8_1","unstructured":"2019. Allatori. http:\/\/www.allatori.com\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2019. Apktool. https:\/\/ibotpeaches.github.io\/Apktool\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2019. App Future. https:\/\/www.smashingmagazine.com\/2017\/02\/current-trends-future-prospects-mobile-app-market\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2019. Benchmark data. https:\/\/github.com\/presto-osu\/orlis-orcis\/tree\/master\/orlis\/open_source_benchmarks"},{"key":"e_1_3_2_1_12_1","unstructured":"2019. BitBucket. https:\/\/bitbucket.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2019. DashO. https:\/\/www.preemptive.com\/products\/dasho\/overview"},{"key":"e_1_3_2_1_14_1","unstructured":"2019. dex2jar. https:\/\/github.com\/pxb1988\/dex2jar"},{"key":"e_1_3_2_1_15_1","unstructured":"2019. F-Droid. https:\/\/f-droid.org\/en\/packages\/"},{"key":"e_1_3_2_1_16_1","unstructured":"2019. Github. https:\/\/github.com\/"},{"key":"e_1_3_2_1_17_1","unstructured":"2019. Google Mvn. https:\/\/dl.google.com\/dl\/android\/maven2\/index.html"},{"key":"e_1_3_2_1_18_1","unstructured":"2019. Jcenter. https:\/\/jcenter.bintray.com\/"},{"key":"e_1_3_2_1_19_1","unstructured":"2019. Library Scraper. https:\/\/github.com\/reddr\/LibScout\/blob\/master\/scripts\/library-scraper.py"},{"key":"e_1_3_2_1_20_1","unstructured":"2019. Maven. https:\/\/mvnrepository.com\/"},{"key":"e_1_3_2_1_21_1","unstructured":"2019. Proguard. https:\/\/www.guardsquare.com\/en\/products\/proguard"},{"key":"e_1_3_2_1_22_1","unstructured":"2019. Soot. https:\/\/github.com\/Sable\/soot"},{"key":"e_1_3_2_1_23_1","unstructured":"2019. statista. https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/."},{"key":"e_1_3_2_1_24_1","unstructured":"2020. Android App Bundle. https:\/\/developer.android.com\/platform\/technology\/app-bundle."},{"key":"e_1_3_2_1_25_1","unstructured":"2020. F1 score. https:\/\/en.wikipedia.org\/wiki\/F1_score."},{"key":"e_1_3_2_1_26_1","unstructured":"2020. gurobi. https:\/\/www.gurobi.com\/."},{"key":"e_1_3_2_1_27_1","unstructured":"2020. kotlin. https:\/\/kotlinlang.org\/."},{"key":"e_1_3_2_1_28_1","unstructured":"2020. LibDetect. https:\/\/sites.google.com\/view\/libdetect"},{"key":"e_1_3_2_1_29_1","unstructured":"2020. LibDetect. https:\/\/sites.google.com\/view\/libdetect\/."},{"key":"e_1_3_2_1_30_1","unstructured":"2020. LibID updated code. https:\/\/github.com\/MIchicho\/LibID"},{"key":"e_1_3_2_1_31_1","unstructured":"2020. National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_32_1","volume-title":"Questionnaire of User Study. https:\/\/forms.gle\/ueJAkuone9ZnCXn68","unstructured":"2020. Questionnaire of User Study. https:\/\/forms.gle\/ueJAkuone9ZnCXn68."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Sven Bugiel and Erik Derr. 2016. Reliable Third-Party Library Detection in Android and Its Security Applications. In CCS.","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.79"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355388"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. ICSE.","author":"Chen Kai","unstructured":"Kai Chen, Peng Liu, and Y. Zhang. 2014. Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets. In Proc. ICSE."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275523"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180222"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3288994.3289051"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. DIMVA.","author":"Hanna S.","unstructured":"S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song. 2012. Juxtapp: a scalable system for detecting code reuse among Android applications. In Proc. DIMVA."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. USENIX Security.","author":"Kai C.","year":"2015","unstructured":"C. Kai, W. Peng, L. Yeonjoon, Wang XiaoFeng, Zhang Nan, Huang Heqing, Zou Wei, and Liu Peng. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In Proc. USENIX Security."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Li Li Taegawende Bissyand\u00e9 Jacques Klein and Yves Le Traon. 2016. An Investigation into the Use of Common Libraries in Android Apps. In SANER.","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"L. Li T. F. Bissyande and J. Klein. 2019. Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering (2019) 1--1. 10.1109\/TSE.2019.2901679","DOI":"10.1109\/TSE.2019.2901679"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","unstructured":"M. Li P. Wang W. Wang S. Wang D. Wu J. Liu R. Xue W. Huo and W. Zou. 2018. Large-scale Third-party Library Detection in Android Markets. IEEE Transactions on Software Engineering (2018) 1--1. 10.1109\/TSE.2018.2872958","DOI":"10.1109\/TSE.2018.2872958"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. SOUPS.","author":"Lin J.","unstructured":"J. Lin, B. Liu, N. Sadeh, and J.I. Hong. 2014. Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings. In Proc. SOUPS."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"B. Liu B. Liu H. Jin and R. Govindan. 2015. Efficient privilege de-escalation for ad libraries in mobile apps. In MobiSys.","DOI":"10.1145\/2742647.2742668"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"C. Soh H. B. K. Tan Y. L. Arnatovich A. Narayanan and L. Wang. 2016. LibSift: Automated Detection of Third-Party Libraries in Android Applications. In APSEC.","DOI":"10.1109\/APSEC.2016.017"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3013438"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197248"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983958"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667975"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Yuan Zhang Jiarun Dai Xiaohan Zhang Sirong Huang Zhemin Yang Min Yang and Hao Chen. 2018. Detecting third-party libraries in Android applications with high precision and recall. In SANER.","DOI":"10.1109\/SANER.2018.8330204"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. CODASPY.","author":"Zhou W.","unstructured":"W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou. 2013. Fast, scalable detection of Piggybacked mobile applications. In Proc. CODASPY."},{"key":"e_1_3_2_1_66_1","volume-title":"Proc. CODASPY.","author":"Zhou W.","unstructured":"W. Zhou, Y. Zhou, X. Jiang, and P. Ning. 2012. Detecting repackaged smartphone applications in third-party Android marketplaces. In Proc. CODASPY."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416582"}},"subtitle":["are we there yet?"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":66,"alternative-id":["10.1145\/3324884.3416582","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416582","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}