{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:08Z","timestamp":1761582188059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512151","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:13:07Z","timestamp":1650863587000},"page":"3327-3335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit"],"prefix":"10.1145","author":[{"given":"Guosheng","family":"Xu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Siyi","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, China"}]},{"given":"Shucen","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[{"name":"ShanghaiTech University, China"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, China"}]},{"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Content sharing: what content people share and why. https:\/\/www.i-scoop.eu\/content-sharing-content-people-share\/. (2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. ApkTool:A tool for reverse engineering Android apk files.https:\/\/ibotpeaches.github.io\/Apktool\/. (2020)."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Content sharing and storytelling: why and how people share content. https:\/\/www.i-scoop.eu\/content-marketing\/content-sharing-storytelling\/. (2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Getting started with Credential Scanner (CredScan). https:\/\/secdevtools.azurewebsites.net\/helpcredscan.html. (2020)."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Alipay open platform documentation: third-party application. https:\/\/opendocs.alipay.com\/isv. (2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. DingTalk Sharing Introduction. https:\/\/developers.dingtalk.com\/document\/mobile-app-guide. (2021)."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. DroidBot:a lightweight test input generator for Android.https:\/\/github.com\/honeynet\/droidbot. (2021)."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Frida:Dynamic instrumentation toolkit for developers reverse-engineers and security researchers.https:\/\/frida.re\/. (2021)."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. How to link to whatsapp from a different app. https:\/\/faq.whatsapp.com\/iphone\/how-to-link-to-whatsapp-from-a-different-app. (2021)."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. Overview:Twitter Developer. https:\/\/developer.twitter.com\/en\/docs\/twitter-for-websites\/embedded-tweets\/overview. (2021)."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Tencent Open Platform. https:\/\/wiki.open.qq.com\/wiki\/. (2021)."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. This document introduces the Messaging API.https:\/\/developers.kakao.com\/docs\/latest\/en\/message\/common. (2021)."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Using Soot? Let us know about it!https:\/\/github.com\/soot-oss\/soot. (2021)."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. WeChat Android developer documentation: sharing and favorite functions. https:\/\/developers.weixin.qq.com\/doc\/oplatform\/Mobile_App\/Share_and_Favorites\/Android.html. (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"2021. Weibo open platform: mobile application.https:\/\/open.weibo.com\/development\/mobile. (2021)."},{"key":"e_1_3_2_1_16_1","unstructured":"2021. Yixin Open Platform: Development Documents. http:\/\/open.yixin.im\/document. (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.62"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_20_1","volume-title":"ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing. arXiv preprint arXiv:2104.02612(2021).","author":"de Vos Martijn","year":"2021","unstructured":"Martijn de Vos and Johan Pouwelse. 2021. ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing. arXiv preprint arXiv:2104.02612(2021)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236045"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384745"},{"key":"e_1_3_2_1_23_1","unstructured":"Yangyu Hu Haoyu Wang Yajin Zhou Yao Guo Li Li Bingxuan Luo and Fangren Xu. 2018. Dating with scambots: Understanding the ecosystem of fraudulent dating applications. arXiv preprint arXiv:1807.04901(2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Transcend: Detecting concept drift in malware classification models. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 625\u2013642.","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu\u00a0K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting concept drift in malware classification models. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 625\u2013642."},{"key":"e_1_3_2_1_25_1","volume-title":"Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark","author":"Li Li","year":"2019","unstructured":"Li Li, Tegawend\u00e9\u00a0F Bissyand\u00e9, and Jacques Klein. 2019. Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering (TSE) (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00017"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994472"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Michael Meli Matthew\u00a0R McNiece and Bradley Reaves. 2019. How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.. In NDSS.","DOI":"10.14722\/ndss.2019.23418"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329854"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Siegfried Rasthofer Steven Arzt Marc Miltenberger and Eric Bodden. 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.. In NDSS.","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.48"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805833"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3086677","article-title":"Understanding the purpose of permission use in mobile apps","volume":"35","author":"Wang Haoyu","year":"2017","unstructured":"Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, and Jason\u00a0I Hong. 2017. Understanding the purpose of permission use in mobile apps. ACM Transactions on Information Systems (TOIS) 35, 4 (2017), 1\u201340.","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00035"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097343"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363193"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Wenbo Yang Yuanyuan Zhang Juanru Li Hui Liu Qing Wang Yueheng Zhang and Dawu Gu. 2017. Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.. In NDSS.","DOI":"10.14722\/ndss.2017.23091"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Xinli Yang David Lo Li Li Xin Xia Tegawend\u00e9\u00a0F Bissyand\u00e9 and Jacques Klein. 2017. Characterizing malicious Android apps by mining topic-specific data flow signatures. Information and Software Technology(2017).","DOI":"10.1016\/j.infsof.2017.04.007"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"},{"key":"e_1_3_2_1_45_1","volume-title":"On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology (TOSEM)","author":"Zhao Yanjie","year":"2021","unstructured":"Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawende Bissyande, Jacques Klein, and John Grundy. 2021. On the Impact of Sample Duplication in Machine Learning based Android Malware Detection. ACM Transactions on Software Engineering and Methodology (TOSEM) (2021)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766499"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event, Lyon France","acronym":"WWW '22"},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:14Z","timestamp":1750188674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":47,"alternative-id":["10.1145\/3485447.3512151","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512151","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}