{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:06Z","timestamp":1750220586981,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1145\/3400286.3418266","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T16:46:55Z","timestamp":1606322815000},"page":"261-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["EDAroid"],"prefix":"10.1145","author":[{"given":"Heejin","family":"Kim","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Soongsil University, Seoul, South Korea"}]},{"given":"Kyuho","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Soongsil University, Seoul, South Korea"}]},{"given":"Jiman","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Soongsil University, Seoul, South Korea"}]},{"given":"Junyeong","family":"Heo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering Hansung University Seoul, South Korea"}]},{"given":"Joongjin","family":"Kook","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering Sangmyung University Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 145--147","author":"Ali-Gombe Aisha","year":"2016","unstructured":"Aisha Ali-Gombe , Irfan Ahmed , Golden G Richard III, and Vassil Roussev . 2016 . AspectDroid: Android App Analysis System . In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 145--147 . Aisha Ali-Gombe, Irfan Ahmed, Golden G Richard III, and Vassil Roussev. 2016. AspectDroid: Android App Analysis System. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 145--147."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074845"},{"key":"e_1_3_2_1_4_1","volume-title":"Nouran Abdeen, Hanan Hindy, and Islam Hegazy.","author":"Amin Amr","year":"2019","unstructured":"Amr Amin , Amgad Eldessouki , Menna Tullah Magdy , Nouran Abdeen, Hanan Hindy, and Islam Hegazy. 2019 . AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach , 326. Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. 2019. AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach, 326."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.36"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security. 20--28","author":"Costamagna Valerio","year":"2016","unstructured":"Valerio Costamagna and Cong Zheng . 2016 . ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime . In Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security. 20--28 . Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime. In Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security. 20--28."},{"key":"e_1_3_2_1_7_1","unstructured":"Anthony Desnos Geoffroy Gueguen and Sebastian Bachmannothers. 2020. Androguard. https:\/\/androguard.readthedocs.io\/en\/latest\/.  Anthony Desnos Geoffroy Gueguen and Sebastian Bachmannothers. 2020. Androguard. https:\/\/androguard.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Google. 2020. Android Logcat. https:\/\/developer.android.com\/studio\/command-line\/logcat?hl=ko.  Google. 2020. Android Logcat. https:\/\/developer.android.com\/studio\/command-line\/logcat?hl=ko."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. 2020. Android Native Development Kit. https:\/\/developer.android.com\/ndk\/guides?hl=ko.  Google. 2020. Android Native Development Kit. https:\/\/developer.android.com\/ndk\/guides?hl=ko."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. 2020. Android Open Source Project. https:\/\/source.android.com\/.  Google. 2020. Android Open Source Project. https:\/\/source.android.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. 2020. Monkeyrunner. https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/index.html.  Google. 2020. Monkeyrunner. https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/index.html."},{"key":"e_1_3_2_1_12_1","unstructured":"NCC Group. 2018. House. https:\/\/github.com\/nccgroup\/house.  NCC Group. 2018. House. https:\/\/github.com\/nccgroup\/house."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 4th IEEE International Conference on Mobile Services. 209--216","author":"Huang Chun-Ying","year":"2015","unstructured":"Chun-Ying Huang , Ching-Hsiang Chiu , Chih-Hung Lin , and Han-Wei Tzeng . 2015 . Code Coverage Measurement for Android Dynamic Analysis Tools . In Proceedings of the 4th IEEE International Conference on Mobile Services. 209--216 . Chun-Ying Huang, Ching-Hsiang Chiu, Chih-Hung Lin, and Han-Wei Tzeng. 2015. Code Coverage Measurement for Android Dynamic Analysis Tools. In Proceedings of the 4th IEEE International Conference on Mobile Services. 209--216."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Mobile Security Technologies. 1--10","author":"Kim Jinyung","year":"2012","unstructured":"Jinyung Kim , Yongho Yoon , Kwangkeun Yi , Junbum Shin , and SWRD Center . 2012 . SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications . In Proceedings of the Mobile Security Technologies. 1--10 . Jinyung Kim, Yongho Yoon, Kwangkeun Yi, Junbum Shin, and SWRD Center. 2012. SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. In Proceedings of the Mobile Security Technologies. 1--10."},{"key":"e_1_3_2_1_15_1","unstructured":"Yonatan V. Levin. 2019. Android CPU Compilers D8 & R8. https:\/\/proandroiddev.com\/android-cpu-compilers-d8-r8-a3aa2bfbc 109.  Yonatan V. Levin. 2019. Android CPU Compilers D8 & R8. https:\/\/proandroiddev.com\/android-cpu-compilers-d8-r8-a3aa2bfbc 109."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 37th International Conference on Software Engineering. 280--291","author":"Li Li","year":"2015","unstructured":"Li Li , Alexandre Bartel , Tegawend\u00e9 F Bissyand\u00e9 , Jacques Klein , Yves Le Traon , Steven Arzt , Siegfried Rasthofer , Eric Bodden , Damien Octeau , and Patrick McDaniel . 2015 . IccTA: Detecting Inter-Component Privacy Leaks in Android Apps . In Proceedings of the 37th International Conference on Software Engineering. 280--291 . Li Li, Alexandre Bartel, Tegawend\u00e9 F Bissyand\u00e9, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proceedings of the 37th International Conference on Software Engineering. 280--291."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 180--191","author":"Qian Chenxiong","year":"2014","unstructured":"Chenxiong Qian , Xiapu Luo , Yuru Shao , and Alvin TS Chan . 2014 . On Tracking Information Flows through JNI in Android Applications . In Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 180--191 . Chenxiong Qian, Xiapu Luo, Yuru Shao, and Alvin TS Chan. 2014. On Tracking Information Flows through JNI in Android Applications. In Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 180--191."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 209--220","author":"Rastogi Vaibhav","year":"2013","unstructured":"Vaibhav Rastogi , Yan Chen , and William Enck . 2013 . AppsPlayground: Automatic Security Analysis of Smartphone Applications . In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 209--220 . Vaibhav Rastogi, Yan Chen, and William Enck. 2013. AppsPlayground: Automatic Security Analysis of Smartphone Applications. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. 209--220."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"volume-title":"Introduction to Static Analysis: An Abstract Interpretation Perspective","author":"Rival Xavier","key":"e_1_3_2_1_20_1","unstructured":"Xavier Rival and Kwangkeun Yi. 2020. Introduction to Static Analysis: An Abstract Interpretation Perspective . MIT Press . Xavier Rival and Kwangkeun Yi. 2020. Introduction to Static Analysis: An Abstract Interpretation Perspective. MIT Press."},{"volume-title":"Investigating Android Bytecode Execution on Java Virtual Machines. Master's thesis","author":"Salim Salim Shaaban","key":"e_1_3_2_1_21_1","unstructured":"Salim Shaaban Salim . 2016. Investigating Android Bytecode Execution on Java Virtual Machines. Master's thesis , University of Manchester. Salim Shaaban Salim. 2016. Investigating Android Bytecode Execution on Java Virtual Machines. Master's thesis, University of Manchester."},{"key":"e_1_3_2_1_22_1","unstructured":"Patrick Schulz. 2012. Code Protection in Android. Insititute of Computer Science Rheinische Friedrich-Wilhelms-Universitgt Bonn Germany.  Patrick Schulz. 2012. Code Protection in Android. Insititute of Computer Science Rheinische Friedrich-Wilhelms-Universitgt Bonn Germany."},{"key":"e_1_3_2_1_23_1","volume-title":"Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families, 1104--1117.","author":"Suarez-Tangil Guillermo","year":"2014","unstructured":"Guillermo Suarez-Tangil , Juan E Tapiador , Pedro Peris-Lopez , and Jorge Blasco . 2014 . Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families, 1104--1117. Guillermo Suarez-Tangil, Juan E Tapiador, Pedro Peris-Lopez, and Jorge Blasco. 2014. Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families, 1104--1117."},{"key":"e_1_3_2_1_24_1","unstructured":"Wikipedia. 2020. Block programming. https:\/\/en.wikipedia.org\/wiki\/Block_(programming).  Wikipedia. 2020. Block programming. https:\/\/en.wikipedia.org\/wiki\/Block_(programming)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Shuwang Zhou Shumei Zhang Minglei Shu Jiyong Xu and Zhaoyang Liu. 2019. Research on Android Application Reinforcement Method for Mobile Medical Service 012195.  Shuwang Zhou Shumei Zhang Minglei Shu Jiyong Xu and Zhaoyang Liu. 2019. Research on Android Application Reinforcement Method for Mobile Medical Service 012195.","DOI":"10.1088\/1742-6596\/1314\/1\/012195"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Marwa Ziadia Jaouhar Fattahi Mohamed Mejri and Emil Pricop. 2020. Smali: an Operational Semantics for Low-level Code Generated from Reverse Engineering Android Applications+ 130.  Marwa Ziadia Jaouhar Fattahi Mohamed Mejri and Emil Pricop. 2020. Smali: an Operational Semantics for Low-level Code Generated from Reverse Engineering Android Applications+ 130.","DOI":"10.3390\/info11030130"}],"event":{"name":"RACS '20: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Gwangju Republic of Korea","acronym":"RACS '20"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400286.3418266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400286.3418266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:40Z","timestamp":1750195900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400286.3418266"}},"subtitle":["An Efficient Dynamic Analysis Tool for Android Applications"],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":26,"alternative-id":["10.1145\/3400286.3418266","10.1145\/3400286"],"URL":"https:\/\/doi.org\/10.1145\/3400286.3418266","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]},"assertion":[{"value":"2020-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}