{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:49:50Z","timestamp":1773470990286,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338501.3357373","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"25-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Robust Detection of Obfuscated Strings in Android Apps"],"prefix":"10.1145","author":[{"given":"Alireza","family":"Mohammadinodooshan","sequence":"first","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]},{"given":"Ulf","family":"Karg\u00e9n","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]},{"given":"Nahid","family":"Shahmehri","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Allatori. http:\/\/www.allatori.com\/.  [n.d.]. Allatori. http:\/\/www.allatori.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Allatori - String Encryption. http:\/\/www.allatori.com\/features\/string-encryption.html.  [n.d.]. Allatori - String Encryption. http:\/\/www.allatori.com\/features\/string-encryption.html."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Dalvik Executable format. https:\/\/source.android.com\/devices\/tech\/dalvik\/dex-format.  [n.d.]. Dalvik Executable format. https:\/\/source.android.com\/devices\/tech\/dalvik\/dex-format."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. DashO. https:\/\/www.preemptive.com\/products\/dasho\/overview.  [n.d.]. DashO. https:\/\/www.preemptive.com\/products\/dasho\/overview."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. DexGuard. https:\/\/www.guardsquare.com\/en\/products\/dexguard.  [n.d.]. DexGuard. https:\/\/www.guardsquare.com\/en\/products\/dexguard."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. DexProtector. https:\/\/dexprotector.com\/.  [n.d.]. DexProtector. https:\/\/dexprotector.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. F-Droid. Retrieved 2019-03-02 from https:\/\/f-droid.org  [n.d.]. F-Droid. Retrieved 2019-03-02 from https:\/\/f-droid.org"},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. KlassMaster - Java String Encryption. https:\/\/www.zelix.com\/klassmaster\/featuresStringEncryption.html.  [n.d.]. KlassMaster - Java String Encryption. https:\/\/www.zelix.com\/klassmaster\/featuresStringEncryption.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2019. The Unicode Standard Version 12.0 Chapter 4. https:\/\/www.unicode.org\/versions\/Unicode12.0.0\/ch04.pdf.  2019. The Unicode Standard Version 12.0 Chapter 4. https:\/\/www.unicode.org\/versions\/Unicode12.0.0\/ch04.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC). 1666--1671","author":"Amos B.","unstructured":"B. Amos , H. Turner , and J. White . 2013. Applying machine learning classifiers to dynamic Android malware detection at scale . In 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC). 1666--1671 . B. Amos, H. Turner, and J. White. 2013. Applying machine learning classifiers to dynamic Android malware detection at scale. In 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC). 1666--1671."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_40"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09290-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.20"},{"key":"e_1_3_2_1_14_1","volume-title":"Security and Privacy in Communication Networks","author":"Dong Shuaike","unstructured":"Shuaike Dong , Menghao Li , Wenrui Diao , Xiangyu Liu , Jian Liu , Zhou Li , Fenghao Xu , Kai Chen , XiaoFeng Wang , and Kehuan Zhang . 2018. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild . In Security and Privacy in Communication Networks . Springer International Publishing , 172--192. Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, XiaoFeng Wang, and Kehuan Zhang. 2018. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. In Security and Privacy in Communication Networks. Springer International Publishing, 172--192."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517314"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180228"},{"key":"e_1_3_2_1_18_1","volume-title":"Evaluating Methods for Distinguishing Between Human-Readable Text and Garbled Text. In The Twenty-Ninth International Flairs Conference.","author":"Henderson Jette L","year":"2016","unstructured":"Jette L Henderson , Daniel J Frazee , Nick P Siegel , Cheryl E Martin , and Alexander Y Liu . 2016 . Evaluating Methods for Distinguishing Between Human-Readable Text and Garbled Text. In The Twenty-Ninth International Flairs Conference. Jette L Henderson, Daniel J Frazee, Nick P Siegel, Cheryl E Martin, and Alexander Y Liu. 2016. Evaluating Methods for Distinguishing Between Human-Readable Text and Garbled Text. In The Twenty-Ninth International Flairs Conference."},{"key":"e_1_3_2_1_19_1","unstructured":"k00dr. 2016. Cracking the Allatori string encryption. https:\/\/forum.moparisthebest.com\/t\/cracking-the-allatori-string-encryption\/177659.  k00dr. 2016. Cracking the Allatori string encryption. https:\/\/forum.moparisthebest.com\/t\/cracking-the-allatori-string-encryption\/177659."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/479174"},{"key":"e_1_3_2_1_22_1","volume-title":"Shouhuai Xu, and Ravi Sandhu.","author":"Kartaltepe Erhan J.","year":"2010","unstructured":"Erhan J. Kartaltepe , Jose Andre Morales , Shouhuai Xu, and Ravi Sandhu. 2010 . Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In Applied Cryptography and Network Security,, Jianying Zhou and Moti Yung (Eds .). 511--528. Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, and Ravi Sandhu. 2010. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. In Applied Cryptography and Network Security,, Jianying Zhou and Moti Yung (Eds.). 511--528."},{"key":"e_1_3_2_1_23_1","volume-title":"Unmasking Android Obfuscation Tools Using Spatial Analysis. In 2018 16th Annual Conference on Privacy, Security and Trust (PST). 1--10","author":"Kaur R","year":"2018","unstructured":"R Kaur , Y Ning , H Gonzalez , and N Stakhanova . 2018 . Unmasking Android Obfuscation Tools Using Spatial Analysis. In 2018 16th Annual Conference on Privacy, Security and Trust (PST). 1--10 . R Kaur, Y Ning, H Gonzalez, and N Stakhanova. 2018. Unmasking Android Obfuscation Tools Using Spatial Analysis. In 2018 16th Annual Conference on Privacy, Security and Trust (PST). 1--10."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.066"},{"key":"e_1_3_2_1_26_1","volume-title":"VB2018","author":"Moses Yoni","year":"2018","unstructured":"Yoni Moses and Yaniv Mordekhay . 2018 . Android app deobfuscation using static-dynamic cooperation. https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/03\/vb2018-paper-android-app-deobfuscation-using-static-dynamic-cooperation\/ . In VB2018 . Yoni Moses and Yaniv Mordekhay. 2018. Android app deobfuscation using static-dynamic cooperation. https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/03\/vb2018-paper-android-app-deobfuscation-using-static-dynamic-cooperation\/. In VB2018."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0282-2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.109"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"e_1_3_2_1_32_1","volume-title":"The WiLI benchmark dataset for written language identification. arXiv preprint arXiv:1801.07779","author":"Thoma Martin","year":"2018","unstructured":"Martin Thoma . 2018. The WiLI benchmark dataset for written language identification. arXiv preprint arXiv:1801.07779 ( 2018 ). Martin Thoma. 2018. The WiLI benchmark dataset for written language identification. arXiv preprint arXiv:1801.07779 (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.18"},{"key":"e_1_3_2_1_34_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Wei Fengguo","unstructured":"Fengguo Wei , Yuping Li , Sankardas Roy , Xinming Ou , and Wu Zhou . 2017. Deep Ground Truth Analysis of Current Android Malware . In Detection of Intrusions and Malware, and Vulnerability Assessment . Springer International Publishing , Cham , 252--276. Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep Ground Truth Analysis of Current Android Malware. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, Cham, 252--276."},{"key":"e_1_3_2_1_35_1","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569--584.","author":"Yan Lok Kwong","unstructured":"Lok Kwong Yan and Heng Yin . 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569--584. Lok Kwong Yan and Heng Yin. 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569--584."},{"key":"e_1_3_2_1_36_1","volume-title":"Lui","author":"Zheng Min","year":"2013","unstructured":"Min Zheng , Patrick P. C. Lee , and John C. S . Lui . 2013 . ADAM : An Automatic and Extensible Platform to Stress Test Android Anti-Virus Systems. In Detection of Intrusions and Malware, and Vulnerability Assessment . 82--101. Min Zheng, Patrick P. C. Lee, and John C. S. Lui. 2013. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-Virus Systems. In Detection of Intrusions and Malware, and Vulnerability Assessment. 82--101."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338501.3357373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":36,"alternative-id":["10.1145\/3338501.3357373","10.1145\/3338501"],"URL":"https:\/\/doi.org\/10.1145\/3338501.3357373","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}