{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:22Z","timestamp":1772039602878,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3558969","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"page":"1430-1440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["What did you pack in my app? a systematic analysis of commercial Android packers"],"prefix":"10.1145","author":[{"given":"Zikan","family":"Dong","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Hongxuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Liu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Kisskiss: Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0. https:\/\/github.com\/strazzere\/android-unpacker \t\t\t\t  2014. Kisskiss: Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0. https:\/\/github.com\/strazzere\/android-unpacker"},{"key":"e_1_3_2_1_2_1","unstructured":"2014. The Ultimate Disassembly Framework \u2013 Capstone. https:\/\/www.capstone-engine.org\/ \t\t\t\t  2014. The Ultimate Disassembly Framework \u2013 Capstone. https:\/\/www.capstone-engine.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2015. baksmali: an disassembler for the dex format used by dalvik.. https:\/\/github.com\/JesusFreke\/smali \t\t\t\t  2015. baksmali: an disassembler for the dex format used by dalvik.. https:\/\/github.com\/JesusFreke\/smali"},{"key":"e_1_3_2_1_4_1","unstructured":"2015. dex2jar: Tools to work with android .dex and java .class files. https:\/\/github.com\/pxb1988\/dex2jar \t\t\t\t  2015. dex2jar: Tools to work with android .dex and java .class files. https:\/\/github.com\/pxb1988\/dex2jar"},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Frida: A world-class dynamic instrumentation framework. https:\/\/frida.re\/ \t\t\t\t  2016. Frida: A world-class dynamic instrumentation framework. https:\/\/frida.re\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2016. Xposed: a framework for modules that can change the behavior of the system and apps without touching any APKs.. https:\/\/repo.xposed.info\/module\/de.robv.android.xposed.installer \t\t\t\t  2016. Xposed: a framework for modules that can change the behavior of the system and apps without touching any APKs.. https:\/\/repo.xposed.info\/module\/de.robv.android.xposed.installer"},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Qihoo packing service embeds charging advertisements for third-party applications. https:\/\/www.zhihu.com\/question\/55519031?sort=created \t\t\t\t  2017. Qihoo packing service embeds charging advertisements for third-party applications. https:\/\/www.zhihu.com\/question\/55519031?sort=created"},{"key":"e_1_3_2_1_8_1","unstructured":"2018. uiautomator2 - A library provided by Google for Android automated testing. https:\/\/github.com\/openatx\/uiautomator2 \t\t\t\t  2018. uiautomator2 - A library provided by Google for Android automated testing. https:\/\/github.com\/openatx\/uiautomator2"},{"key":"e_1_3_2_1_9_1","unstructured":"2019. Jadx: Dex to Java decompiler. https:\/\/github.com\/skylot\/jadx \t\t\t\t  2019. Jadx: Dex to Java decompiler. https:\/\/github.com\/skylot\/jadx"},{"key":"e_1_3_2_1_10_1","unstructured":"2020. Android Runtime (ART) and Dalvik. https:\/\/source.android.com\/devices\/tech\/dalvik \t\t\t\t  2020. Android Runtime (ART) and Dalvik. https:\/\/source.android.com\/devices\/tech\/dalvik"},{"key":"e_1_3_2_1_11_1","unstructured":"2022. ApkTool:A tool for reverse engineering Android apk files.. https:\/\/ibotpeaches.github.io\/Apktool\/ \t\t\t\t  2022. ApkTool:A tool for reverse engineering Android apk files.. https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. ART runtime. https:\/\/source.android.com\/docs\/core\/dalvik \t\t\t\t  2022. ART runtime. https:\/\/source.android.com\/docs\/core\/dalvik"},{"key":"e_1_3_2_1_13_1","unstructured":"2022. Baidu Inc. https:\/\/app.baidu.com \t\t\t\t  2022. Baidu Inc. https:\/\/app.baidu.com"},{"key":"e_1_3_2_1_14_1","unstructured":"2022. Bangcle Inc. https:\/\/www.bangcle.com\/ \t\t\t\t  2022. Bangcle Inc. https:\/\/www.bangcle.com\/"},{"key":"e_1_3_2_1_15_1","unstructured":"2022. F-Droid - Free and Open Source Android App Repository. https:\/\/f-droid.org\/ \t\t\t\t  2022. F-Droid - Free and Open Source Android App Repository. https:\/\/f-droid.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"2022. IDA:State-of-the-art binary code analysis tools. https:\/\/hex-rays.com\/ \t\t\t\t  2022. IDA:State-of-the-art binary code analysis tools. https:\/\/hex-rays.com\/"},{"key":"e_1_3_2_1_17_1","unstructured":"2022. Ijiami Inc. http:\/\/www.ijiami.cn\/ \t\t\t\t  2022. Ijiami Inc. http:\/\/www.ijiami.cn\/"},{"key":"e_1_3_2_1_18_1","unstructured":"2022. Manxi Inc. https:\/\/www.manxi-inc.com\/ \t\t\t\t  2022. Manxi Inc. https:\/\/www.manxi-inc.com\/"},{"key":"e_1_3_2_1_19_1","unstructured":"2022. NAGA IN Inc. http:\/\/www.nagain.com\/ \t\t\t\t  2022. NAGA IN Inc. http:\/\/www.nagain.com\/"},{"key":"e_1_3_2_1_20_1","unstructured":"2022. PackDiff. https:\/\/github.com\/PackDiff\/PackDiff \t\t\t\t  2022. PackDiff. https:\/\/github.com\/PackDiff\/PackDiff"},{"key":"e_1_3_2_1_21_1","unstructured":"2022. Qihoo360 Inc. https:\/\/dev.360.cn\/ \t\t\t\t  2022. Qihoo360 Inc. https:\/\/dev.360.cn\/"},{"key":"e_1_3_2_1_22_1","unstructured":"2022. Summary of App Upload App Market Issues. https:\/\/wenku.baidu.com\/view\/4bc04063cb50ad02de80d4d8d15abe23482f03db.html \t\t\t\t  2022. Summary of App Upload App Market Issues. https:\/\/wenku.baidu.com\/view\/4bc04063cb50ad02de80d4d8d15abe23482f03db.html"},{"key":"e_1_3_2_1_23_1","unstructured":"2022. Tencent Inc. https:\/\/cloud.tencent.com\/ \t\t\t\t  2022. Tencent Inc. https:\/\/cloud.tencent.com\/"},{"key":"e_1_3_2_1_24_1","unstructured":"2022. WeTest - one-stop quality open platform officially produced by Tencent. https:\/\/wetest.qq.com\/ \t\t\t\t  2022. WeTest - one-stop quality open platform officially produced by Tencent. https:\/\/wetest.qq.com\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang.","author":"Duan Yue","year":"2018","unstructured":"Yue Duan , Mu Zhang , Abhishek Vasisht Bhaskar , Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang. 2018 . Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.. In NDSS. Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang. 2018. Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.. In NDSS."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09760-3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00149"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_48"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464828"},{"key":"e_1_3_2_1_33_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wong Michelle Y","year":"2018","unstructured":"Michelle Y Wong and David Lie . 2018 . Tackling runtime-based obfuscation in android with $TIRO$ . In 27th USENIX Security Symposium (USENIX Security 18) . 1247\u20131262. Michelle Y Wong and David Lie. 2018. Tackling runtime-based obfuscation in android with $TIRO$. In 27th USENIX Security Symposium (USENIX Security 18). 1247\u20131262."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2996433"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_17"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Singapore Singapore","acronym":"ESEC\/FSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"]},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3558969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:04Z","timestamp":1750182544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3558969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":39,"alternative-id":["10.1145\/3540250.3558969","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3558969","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}