{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:32:46Z","timestamp":1757590366245,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(NRF-2016R1D1A1B01016073)","award":["NRF-2016R1D1A1B01016073"],"award-info":[{"award-number":["NRF-2016R1D1A1B01016073"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507143","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"1190-1196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["R&amp;R tool for Android applications hiding malicious features"],"prefix":"10.1145","author":[{"given":"Jusuk","family":"Lee","sequence":"first","affiliation":[{"name":"Soongsil University, Seoul, Korea"}]},{"given":"Ajung","family":"Kim","sequence":"additional","affiliation":[{"name":"Soongsil University, Seoul, Korea"}]},{"given":"Sumin","family":"Lee","sequence":"additional","affiliation":[{"name":"Soongsil University, Seoul, Korea"}]},{"given":"Jiman","family":"Hong","sequence":"additional","affiliation":[{"name":"Soongsil University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041010"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"e_1_3_2_1_3_1","volume-title":"Anti-debugging scheme for protecting mobile apps on android platform. the Journal of Supercomputing 72, 1","author":"Cho Haehyun","year":"2016","unstructured":"Haehyun Cho, Jongsu Lim, Hyunki Kim, and Jeong Hyun Yi. 2016. Anti-debugging scheme for protecting mobile apps on android platform. the Journal of Supercomputing 72, 1 (2016), 232--246."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.21"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606553"},{"key":"e_1_3_2_1_6_1","unstructured":"Google. 2019. Android Developers adb. https:\/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_1_7_1","unstructured":"Google. 2021. getevent. https:\/\/source.android.com\/devices\/input\/getevent"},{"key":"e_1_3_2_1_8_1","unstructured":"Google. 2021. Google Source Reference Board. https:\/\/source.android.com\/setup\/build\/devices#845cdragonboard"},{"volume-title":"2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 215--224","author":"Halpern Matthew","key":"e_1_3_2_1_9_1","unstructured":"Matthew Halpern, Yuhao Zhu, Ramesh Peri, and Vijay J. Reddi. 2015. Mosaic: cross-platform user-interaction record and replay for the fragmented android ecosystem. In 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE, 215--224."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814320"},{"key":"e_1_3_2_1_12_1","first-page":"39","article-title":"Survey of Dynamic Anti-Analysis Schemes for Mobile Malware","volume":"9","author":"Lim Jongsu","year":"2018","unstructured":"Jongsu Lim, Yonggu Shin, Sunjun Lee, Kyuho Kim, and Jeong Hyun Yi. 2018. Survey of Dynamic Anti-Analysis Schemes for Mobile Malware. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9, 3 (2018), 39--49.","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Android rooting: An arms race between evasion and detection","volume":"2017","author":"Vu Long N.","year":"2017","unstructured":"Long N. Vu, Ngoc C. Tu, Seongeun Kang, and Souhwan Jung. 2017. Android rooting: An arms race between evasion and detection. Security and Communication Networks 2017 (2017), 1--13.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00022"},{"key":"e_1_3_2_1_15_1","unstructured":"Scottyab. 2021. RootBeer. https:\/\/github.com\/scottyab\/rootbeer"},{"key":"e_1_3_2_1_16_1","unstructured":"WaTF-Team. 2020. WaTF-Bank. https:\/\/github.com\/WaTF-Team\/WaTF-Bank"}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:29Z","timestamp":1750188689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":16,"alternative-id":["10.1145\/3477314.3507143","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507143","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}