{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:50Z","timestamp":1775912810611,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534410","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"629-641","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["NCScope: hardware-assisted analyzer for native code in Android apps"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zhou","sequence":"first","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Shuohan","family":"Wu","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Washington State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. adeb. https:\/\/github.com\/joelagnel\/adeb.  \t\t\t\t\t  2021. adeb. https:\/\/github.com\/joelagnel\/adeb."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Advanced Debugging with ETM. http:\/\/ww1.microchip.com\/download s\/en\/AppNotes\/Atmel-44045-32-bit-Cortex-M7-Microcontroller-AdvancedDebugging\\-SAM-V71-V70-E70-S70-MCUs-with-ARM-ETM_App-Note.pdf. SamsungKnoxSecuritySolution.pdf.  \t\t\t\t\t  2021. Advanced Debugging with ETM. http:\/\/ww1.microchip.com\/download s\/en\/AppNotes\/Atmel-44045-32-bit-Cortex-M7-Microcontroller-AdvancedDebugging\\-SAM-V71-V70-E70-S70-MCUs-with-ARM-ETM_App-Note.pdf. SamsungKnoxSecuritySolution.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6534525"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. CWE-415 : Double Free. https:\/\/cwe.mitre.org\/data\/definitions\/415.html.  \t\t\t\t\t  2022. CWE-415 : Double Free. https:\/\/cwe.mitre.org\/data\/definitions\/415.html."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. CWE-416 : Use After Free. https:\/\/cwe.mitre.org\/data\/definitions\/416.html.  \t\t\t\t\t  2022. CWE-416 : Use After Free. https:\/\/cwe.mitre.org\/data\/definitions\/416.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Java Native Interface Specification. https:\/\/docs.oracle.com\/javase\/7\/doc s\/technotes\/guides\/jni\/spec\/jniTOC.html.  \t\t\t\t\t  2022. Java Native Interface Specification. https:\/\/docs.oracle.com\/javase\/7\/doc s\/technotes\/guides\/jni\/spec\/jniTOC.html."},{"key":"e_1_3_2_1_7_1","unstructured":"2022. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcount er.com\/os-market-share\/mobile\/worldwide.  \t\t\t\t\t  2022. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcount er.com\/os-market-share\/mobile\/worldwide."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. mprotect. https:\/\/man7.org\/linux\/man-pages\/man2\/mprotect.2.html.  \t\t\t\t\t  2022. mprotect. https:\/\/man7.org\/linux\/man-pages\/man2\/mprotect.2.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. ICSE.","author":"Almanee Sumaya","year":"2021","unstructured":"Sumaya Almanee , Arda Unal , Mathias Payer , and Joshua Garcia . 2021 . Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code . In Proc. ICSE. Sumaya Almanee, Arda Unal, Mathias Payer, and Joshua Garcia. 2021. Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code. In Proc. ICSE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.43"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Stefano Berlato and Mariano Ceccato. 2020. A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. Journal of Information Security and Applications 52 ( 2020 ) 102463.  \t\t\t\t\t  Stefano Berlato and Mariano Ceccato. 2020. A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. Journal of Information Security and Applications 52 ( 2020 ) 102463.","DOI":"10.1016\/j.jisa.2020.102463"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275523"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23296"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2003.1238018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. ACSAC.","author":"Falsina Luca","year":"2015","unstructured":"Luca Falsina , Yanick Fratantonio , Stefano Zanero , Christopher Kruegel , Giovanni Vigna , and Federico Maggi . 2015 . Grab'n run: Secure and practical dynamic code loading for android applications . In Proc. ACSAC. Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, and Federico Maggi. 2015. Grab'n run: Secure and practical dynamic code loading for android applications. In Proc. ACSAC."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397368"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. ASPLOS.","author":"Jiang Muhui","year":"2012","unstructured":"Muhui Jiang , Tianyi Xu , Yajin Zhou , Yufeng Hu , Ming Zhong , Lei Wu , Xiapu Luo , and Kui Ren . 2012 . EXAMINER: Automatically Locating Inconsistent Instructions between Real Devices and CPU Emulators for ARM . In Proc. ASPLOS. Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, and Kui Ren. 2012. EXAMINER: Automatically Locating Inconsistent Instructions between Real Devices and CPU Emulators for ARM. In Proc. ASPLOS."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397377"},{"key":"e_1_3_2_1_24_1","volume-title":"Hyeong-Chan Lee, and Jeong Hyun Yi.","author":"Jung Jin-Hyuk","year":"2013","unstructured":"Jin-Hyuk Jung , Ju Young Kim , Hyeong-Chan Lee, and Jeong Hyun Yi. 2013 . Repackaging attack on android banking applications and its countermeasures. Wireless Personal Communications 73, 4 ( 2013 ), 1421-1437. Jin-Hyuk Jung, Ju Young Kim, Hyeong-Chan Lee, and Jeong Hyun Yi. 2013. Repackaging attack on android banking applications and its countermeasures. Wireless Personal Communications 73, 4 ( 2013 ), 1421-1437."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00011"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Bodong Li Yuanyuan Zhang Juanru Li Wenbo Yang and Dawu Gu. 2018. AppSpear: automating the hidden-code extraction and reassembling of packed android malware. Journal of Systems and Software 140 ( 2018 ) 3-16.  \t\t\t\t\t  Bodong Li Yuanyuan Zhang Juanru Li Wenbo Yang and Dawu Gu. 2018. AppSpear: automating the hidden-code extraction and reassembling of packed android malware. Journal of Systems and Software 140 ( 2018 ) 3-16.","DOI":"10.1016\/j.jss.2018.02.040"},{"key":"e_1_3_2_1_28_1","volume-title":"Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark","author":"Li Li","year":"2020","unstructured":"Li Li , Tegawende Bissyande , and Jacques Klein . 2020. Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark . IEEE Transactions on Software Engineering ( 2020 ). Li Li, Tegawende Bissyande, and Jacques Klein. 2020. Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering ( 2020 )."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970299"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. USENIX Security.","author":"Ning Zhenyu","year":"2017","unstructured":"Zhenyu Ning and Fengwei Zhang . 2017 . Ninja: Towards Transparent Tracing and Debugging on ARM . In Proc. USENIX Security. Zhenyu Ning and Fengwei Zhang. 2017. Ninja: Towards Transparent Tracing and Debugging on ARM. In Proc. USENIX Security."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464842"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.14"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210321"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00015"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"e_1_3_2_1_46_1","unstructured":"Michelle Y Wong and David Lie. 2016. Intellidroid: a targeted input generator for the dynamic analysis of android malware. In Porc. NDSS.  \t\t\t\t\t  Michelle Y Wong and David Lie. 2016. Intellidroid: a targeted input generator for the dynamic analysis of android malware. In Porc. NDSS."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2015.7404721"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00105"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. USENIX Security.","author":"Xue Lei","year":"2017","unstructured":"Lei Xue , Yajin Zhou , Ting Chen , Xiapu Luo , and Guofei Gu . 2017 . Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART . In Proc. USENIX Security. Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, and Guofei Gu. 2017. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In Proc. USENIX Security."},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. USENIX Security.","author":"Yagemann Carter","year":"2021","unstructured":"Carter Yagemann , Matthew Pruett , Simon P Chung , Kennon Bittick , Brendan Saltaformaggio , and Wenke Lee . 2021 . ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems . In Proc. USENIX Security. Carter Yagemann, Matthew Pruett, Simon P Chung, Kennon Bittick, Brendan Saltaformaggio, and Wenke Lee. 2021. ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. In Proc. USENIX Security."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380347"},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. USENIX Security.","author":"Yan Lok-Kwong","year":"2012","unstructured":"Lok-Kwong Yan and Heng Yin . 2012 . DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis . In Proc. USENIX Security. Lok-Kwong Yan and Heng Yin. 2012. DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proc. USENIX Security."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906344"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. NDSS.","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . 2012 . Hey, you, get of of my market: detecting malicious apps in oficial and alternative android markets . In Proc. NDSS. Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get of of my market: detecting malicious apps in oficial and alternative android markets. In Proc. NDSS."}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":56,"alternative-id":["10.1145\/3533767.3534410","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534410","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}