{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:47:56Z","timestamp":1772041676020,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"AFR","award":["14596679"],"award-info":[{"award-number":["14596679"]}]},{"name":"Luxembourg National Research Fund (FNR)","award":["C21\/IS\/16344458"],"award-info":[{"award-number":["C21\/IS\/16344458"]}]},{"name":"INTER Mobility project Sleepless@Seattle","award":["13999722"],"award-info":[{"award-number":["13999722"]}]},{"name":"European Research Council","award":["949014"],"award-info":[{"award-number":["949014"]}]},{"name":"ASP@European Union","award":["830892"],"award-info":[{"award-number":["830892"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3512766","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1232-1244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["JuCify"],"prefix":"10.1145","author":[{"given":"Jordan","family":"Samhi","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Jun","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Nadia","family":"Daoudi","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Pierre","family":"Graux","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg and Univ. Lille, CNRS, Centrale Lille, France"}]},{"given":"Henri","family":"Hoyez","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Kaiserslautern, Germany"}]},{"given":"Xiaoyu","family":"Sun","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Kevin","family":"Allix","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/androguard.readthedocs.io. Accessed","year":"2021","unstructured":"Androguard. [n.d.]. https:\/\/androguard.readthedocs.io. Accessed April 2021."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0012-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.1999.805197"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1922-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624245"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0203-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792435"},{"key":"e_1_3_2_1_14_1","unstructured":"Ira R Forman Nate Forman and John Vlissides Ibm. 2004. Java reflection in action. (2004)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397368"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jni\/spec\/functions.html. Accessed","author":"Functions JNI","year":"2021","unstructured":"JNI Functions. [n.d.]. https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jni\/spec\/functions.html. Accessed April 2021."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065019"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127577.1127590"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00019"},{"key":"e_1_3_2_1_23_1","volume-title":"https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/jni\/. Accessed","author":"JNI.","year":"2021","unstructured":"JNI. [n.d.]. https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/jni\/. Accessed April 2021."},{"key":"e_1_3_2_1_24_1","volume-title":"Automated deobfuscation of Android native binary code. arXiv preprint arXiv:1907.06828","author":"Kan Zeliang","year":"2019","unstructured":"Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, and Daniel Xiapu Luo. 2019. Automated deobfuscation of Android native binary code. arXiv preprint arXiv:1907.06828 (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2070671.2070678"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330572"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"key":"e_1_3_2_1_29_1","volume-title":"Pass the SALT","author":"K\u0159oustek J.","year":"2018","unstructured":"J. K\u0159oustek and P. Matula. 2018. RetDec: An Open-Source Machine-Code Decompiler. [talk]. Presented at Pass the SALT 2018, Lille, FR."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_31_1","volume-title":"2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 127--137","author":"Lee S.","unstructured":"S. Lee, H. Lee, and S. Ryu. 2020. Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 127--137."},{"key":"e_1_3_2_1_32_1","volume-title":"KSII The 9th International Conference on Internet (ICONI) 2017 Symposium.","author":"Lee Young Jun","year":"2017","unstructured":"Young Jun Lee, Sang-Hoon Choi, Chulwoo Kim, Seung-Ho Lim, and Ki-Woong Park. 2017. Learning binary code with deep learning to detect software weakness. In KSII The 9th International Conference on Internet (ICONI) 2017 Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.36"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_31"},{"key":"e_1_3_2_1_38_1","volume-title":"Victor Van Der Veen, and Christian Platzer","author":"Lindorfer Martina","year":"2014","unstructured":"Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor Van Der Veen, and Christian Platzer. 2014. Andrubis-1,000,000 apps later: A view on current Android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS). IEEE, 3--17."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_14"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594311"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"H. B. Mann and D. R. Whitney. 1947. On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other. Ann. Math. Statist. 18 1 (03 1947) 50--60. 10.1214\/aoms\/1177730491","DOI":"10.1214\/aoms\/1177730491"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/279310.279314"},{"key":"e_1_3_2_1_45_1","volume-title":"https:\/\/bitbucket.org\/yanniss\/doop\/src\/master\/. Accessed","author":"DOOP","year":"2021","unstructured":"DOOP Github page. [n.d.]. https:\/\/bitbucket.org\/yanniss\/doop\/src\/master\/. Accessed April 2021."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/github.com\/plast-lab\/native-scanner. Accessed","author":"Native Scanner","year":"2021","unstructured":"Native Scanner Github page. [n.d.]. https:\/\/github.com\/plast-lab\/native-scanner. Accessed April 2021."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3105821"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"e_1_3_2_1_51_1","volume-title":"https:\/\/github.com\/radareorg\/radare2. Accessed","year":"2021","unstructured":"Radare2. [n.d.]. https:\/\/github.com\/radareorg\/radare2. Accessed April 2021."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Siegfried Rasthofer Steven Arzt Marc Miltenberger and Eric Bodden. 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.. In NDSS.","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_17"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00126"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_58_1","volume-title":"JadX: Dex to Java decompiler, https:\/\/github.com\/skylot\/jadx. Accessed","year":"2021","unstructured":"Skylot. [n.d.]. JadX: Dex to Java decompiler, https:\/\/github.com\/skylot\/jadx. Accessed August 2021."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_62_1","volume-title":"Copperdroid: Automatic reconstruction of android malware behaviors.. In Ndss.","author":"Tam Kimberly","year":"2015","unstructured":"Kimberly Tam, Salahuddin J Khan, Aristide Fattori, and Lorenzo Cavallaro. 2015. Copperdroid: Automatic reconstruction of android malware behaviors.. In Ndss."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180243"},{"key":"e_1_3_2_1_64_1","volume-title":"Android Malware Evasion Techniques - Emulator Detection. https:\/\/www.oguzhantopgul.com\/2014\/12\/android-malware-evasion-techniques.html Accessed","author":"Topgul Oguzhan","year":"2020","unstructured":"Oguzhan Topgul. [n.d.]. Android Malware Evasion Techniques - Emulator Detection. https:\/\/www.oguzhantopgul.com\/2014\/12\/android-malware-evasion-techniques.html Accessed December 2020."},{"key":"e_1_3_2_1_65_1","unstructured":"Virus Total. 2021. Virus total free online virus malware and url scanner. https:\/\/www.virustotal.com\/en"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"e_1_3_2_1_67_1","volume-title":"Jimple: Simplifying Java bytecode for analyses and transformations.","author":"Vallee-Rai Raja","year":"1998","unstructured":"Raja Vallee-Rai and Laurie J Hendren. 1998. Jimple: Simplifying Java bytecode for analyses and transformations. (1998)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.59"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_71_1","volume-title":"2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). 87--98","author":"White M.","unstructured":"M. White, M. Tufano, C. Vendome, and D. Poshyvanyk. 2016. Deep learning code fragments for code clone detection. In 2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). 87--98."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892218"},{"key":"e_1_3_2_1_74_1","volume-title":"https:\/\/dotnet.microsoft.com\/apps\/xamarin. Accessed","author":"XAMARIN.","year":"2021","unstructured":"XAMARIN. [n.d.]. https:\/\/dotnet.microsoft.com\/apps\/xamarin. Accessed April 2021."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2661723"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896932"},{"key":"e_1_3_2_1_78_1","volume-title":"Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1106--1120","author":"Zhao Qingchuan","year":"2020","unstructured":"Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, and Zhiqiang Lin. 2020. Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1106--1120."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3512766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3512766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3512766"}},"subtitle":["a step towards Android code unification for enhanced static analysis"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":78,"alternative-id":["10.1145\/3510003.3512766","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3512766","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}