{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:28:01Z","timestamp":1769066881345,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416642","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T18:38:56Z","timestamp":1611772736000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["UI obfuscation and its effects on automated UI analysis for Android apps"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zhou","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Le","family":"Yu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. AAPT. https:\/\/developer.android.com\/\/studio\/command-line\/aapt2."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. ADB. https:\/\/developer.android.com\/studio\/command-line\/adb."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Amigo. https:\/\/github.com\/eleme\/Amigo."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. AndFix. https:\/\/github.com\/alibaba\/AndFix."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. androguard. https:\/\/github.com\/androguard\/androguard"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Apktool. https:\/\/ibotpeaches.github.io\/Apktool\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. CastScreen. https:\/\/github.com\/JonesChi\/CastScreen."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. F-Droid https:\/\/f-droid.org."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. InputMethodManager. http:\/\/androidxref.eom\/8.0.0_r4\/xref\/frameworks\/base\/core\/java\/android\/view\/inputmethod\/InputMethodManager.java."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. Instance Method. https:\/\/docs.oracle.com\/javase\/specs\/jls\/se7\/html\/jls-8.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. Monkey https:\/\/developer.android.com\/studio\/test\/monkey."},{"key":"e_1_3_2_1_12_1","unstructured":"2020. Nuwa. https:\/\/github.com\/jasonross\/Nuwa."},{"key":"e_1_3_2_1_13_1","unstructured":"2020. Overview - App resources. https:\/\/developer.android.com\/guide\/topics\/resources\/providing-resources."},{"key":"e_1_3_2_1_14_1","unstructured":"2020. ProGuard. https:\/\/www.guardsquare.com\/en\/products\/proguard."},{"key":"e_1_3_2_1_15_1","unstructured":"2020. scrcpy. https:\/\/github.com\/Genymobile\/scrcpy."},{"key":"e_1_3_2_1_16_1","unstructured":"2020. ScreenCapture. https:\/\/github.com\/googlesamples\/android-ScreenCapture."},{"key":"e_1_3_2_1_17_1","unstructured":"2020. Tinker. https:\/\/github.com\/Tencent\/tinker."},{"key":"e_1_3_2_1_18_1","unstructured":"2020. UIAutomator. https:\/\/developer.android.com\/training\/testing\/ui-automator.html."},{"key":"e_1_3_2_1_19_1","unstructured":"2020. zipalign. https:\/\/developer.android.com\/studio\/command-line\/zipalign."},{"key":"e_1_3_2_1_20_1","volume-title":"Porfirio Tramontana, Salvatore De Carmine, and Atif M. Memon.","author":"Amalfitano Domenico","year":"2012","unstructured":"Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Salvatore De Carmine, and Atif M. Memon. 2012. Using GUI Ripping for Automated Testing of Android Applications. In Proc. ASE."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00041"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. USENIX Security.","author":"Bhoraskar Ravi","year":"2014","unstructured":"Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, and David Wetherall. 2014. Brahmastra: Driving Apps to Test the Security of Third-Party Components. In Proc. USENIX Security."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180240"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380327"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. USENIX Security.","author":"Chen Kai","year":"2015","unstructured":"Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. In Proc. USENIX Security."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00070"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126651"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984581"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23296"},{"key":"e_1_3_2_1_33_1","volume-title":"Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. arXiv preprint arXiv:1611.10231","author":"Faruki Parvez","year":"2016","unstructured":"Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Mauro Conti, and Manoj Gaur. 2016. Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. arXiv preprint arXiv:1611.10231 (2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180228"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. USENIX Security.","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, KyuHyung Lee, and Taesoo Kim. 2019. Fuzzification: Anti-Fuzzing Techniques. In Proc. USENIX Security."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. ICSE.","author":"Li Yuanchun","year":"2017","unstructured":"Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen. 2017. DroidBot: A Lightweight UI-guided Test Input Generator for Android. In Proc. ICSE."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302363"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_11"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.32"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"John W. Pratt. 1959. Remarks on zeros and ties in the Wilcoxon signed rank procedures. J. Amer. Statist. Assoc. (1959).","DOI":"10.2307\/2282543"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23529"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. USENIX Sec.","author":"Ren Chuangang","year":"2015","unstructured":"Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In Proc. USENIX Sec."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544137.2544159"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.25"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766508"},{"key":"e_1_3_2_1_52_1","volume-title":"Us: Understanding the Threats of Instant Apps based Attacks. In Proc. ESEC\/FSE.","author":"Tang Y.","year":"2020","unstructured":"Y. Tang, Y. Sui, H. Wang, X. Luo, H. Zhou, and Z. Xu. 2020. All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks. In Proc. ESEC\/FSE."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46423-9_2"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180169"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240465"},{"key":"e_1_3_2_1_56_1","volume-title":"Individual comparisons by ranking methods. Breakthroughs in statistics","author":"Wilcoxon Frank","year":"1945","unstructured":"Frank Wilcoxon. 1945. Individual comparisons by ranking methods. Breakthroughs in statistics (1945)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"e_1_3_2_1_58_1","unstructured":"L. Xue H. Zhou X. Luo L. Yu D. Wu Y. Zhou and X. Ma. 2020. PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.31"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.76"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.76"},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. DSN.","author":"Yu L.","unstructured":"L. Yu, J. Chen, H. Zhou, X. Luo, and K. Liu. 2018. Localizing Function Errors in Mobile Apps with User Reviews. In Proc. DSN."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00103"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.16"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380411"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:04:29Z","timestamp":1769011469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":67,"alternative-id":["10.1145\/3324884.3416642","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416642","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}