{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:31:20Z","timestamp":1769067080882,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416637","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T18:39:02Z","timestamp":1611772742000},"page":"187-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Demystifying diehard Android apps"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zhou","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"given":"Lei","family":"Xue","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Background Execution Limits. https:\/\/developer.android.com\/about\/versions\/oreo\/background."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Broadcasts Overview. https:\/\/developer.android.com\/guide\/components\/broadcasts."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Don't kill my app! https:\/\/dontkillmyapp.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. F-Droid. https:\/\/f-droid.org."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Google Play Store https:\/\/play.google.com\/store."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Implicit Broadcast Exceptions https:\/\/developer.android.com\/guide\/components\/broadcast-exceptions."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Launch Instant App. https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/instantapps\/Launcher."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Recents Screen https:\/\/developer.android.com\/guide\/components\/activities\/recents."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Smartphone users still want long-lasting batteries more than shatterproof screens https:\/\/today.yougov.com\/topics\/technology\/articles-reports\/2018\/02\/20\/smartphone-users-still-want-longer-battery-life."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. Sticky Service https:\/\/developer.android.com\/reference\/android\/app\/Service#START_STICKY."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. Understand Tasks and Back Stack. https:\/\/developer.android.com\/guide\/components\/activities\/tasks-and-back-stack."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc PLDI.","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flow-Droid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proc PLDI."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. CCS.","author":"Yee Au Kathy Wain","year":"2012","unstructured":"Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. PScout: Analyzing the Android Permission Specification. In Proc. CCS."},{"key":"e_1_3_2_1_14_1","volume-title":"Clement Ballabriga, and Abhik Roychoudhury.","author":"Banerjee Abhijeet","year":"2018","unstructured":"Abhijeet Banerjee, Lee Kee Chong, Clement Ballabriga, and Abhik Roychoudhury. 2018. EnergyPatch: Repairing Resource Leaks to Improve Energy-Efficiency of Android Apps. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884614"},{"key":"e_1_3_2_1_16_1","volume-title":"Abram Hindle, and Zhen Ming Jiang.","author":"Chowdhury Shaiful","year":"2018","unstructured":"Shaiful Chowdhury, Silvia Di Nardo, Abram Hindle, and Zhen Ming Jiang. 2018. An exploratory study on assessing the energy impact of logging on Android applications. Empirical Software Engineering (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Mary Jean Harrold and Mary Lou Soffa. 1994. Efficient Computation of Interprocedural Definition-Use Chains. ACM Trans. Program. Lang. Syst. (1994).","DOI":"10.1145\/174662.174663"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. FSE.","author":"Jabbarvand Reyhaneh","year":"2017","unstructured":"Reyhaneh Jabbarvand and Sam Malek. 2017. &mu;Droid: An Energy-Aware Mutation Testing Framework for Android. In Proc. FSE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.66"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23529"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. USENIX Security.","author":"Ren Chuangang","year":"2015","unstructured":"Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In Proc. USENIX Security."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180214"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345452"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. EuroSys.","author":"Shao Yuru","unstructured":"Yuru Shao, Ruowen Wang, Xun Chen, Ahemd M. Azab, and Z. Morley Mao. 2019. A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications. In Proc. EuroSys."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2302311"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc USENIX Security.","author":"Wong Michelle Y","year":"2018","unstructured":"Michelle Y Wong and David Lie. 2018. Tackling runtime-based obfuscation in Android with TIRO. In Proc USENIX Security."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"e_1_3_2_1_31_1","unstructured":"L. Xue H. Zhou X. Luo L. Yu D. Wu Y. Zhou and X. Ma. 2020. PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"key":"e_1_3_2_1_33_1","unstructured":"L. Yu X. Luo J. Chen H. Zhou T. Zhang H. Chang and H. Leung. 2019. PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808125"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"L. Yu X Zhang X. Luo L. Xue and H. Chang. 2017. Towards Automatically Generating Privacy Policy for Android Apps. IEEE Transactions on Information Forensics and Security (2017).","DOI":"10.1109\/TIFS.2016.2639339"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416637","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:02:04Z","timestamp":1769011324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":36,"alternative-id":["10.1145\/3324884.3416637","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416637","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}