{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:20Z","timestamp":1750220240653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545951","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"252-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Odile: A scalable tracing tool for non-rooted and on-device Android phones"],"prefix":"10.1145","author":[{"given":"Alain","family":"Tchana","sequence":"first","affiliation":[{"name":"ENS Lyon, France"}]},{"given":"Lavoisier","family":"Wapet","sequence":"additional","affiliation":[{"name":"ENS Lyon, France"}]},{"given":"Y\u00e9rom-David","family":"Bromberg","sequence":"additional","affiliation":[{"name":"Univ. Rennes, Inria, CNRS, IRISA, France"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"volume-title":"10 Exclusive F-Droid Apps You Can\u2019t Get on Google Play Store. https:\/\/www.makeuseof.com\/tag\/exclusive-f-droid-apps\/. Visited on","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. 10 Exclusive F-Droid Apps You Can\u2019t Get on Google Play Store. https:\/\/www.makeuseof.com\/tag\/exclusive-f-droid-apps\/. Visited on October 2020 . [n.d.]. 10 Exclusive F-Droid Apps You Can\u2019t Get on Google Play Store. https:\/\/www.makeuseof.com\/tag\/exclusive-f-droid-apps\/. Visited on October 2020."},{"volume-title":"Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode. Visited on","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode. Visited on June 2020 . [n.d.]. Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode. Visited on June 2020."},{"volume-title":"Database of 298 Android Malwares. https:\/\/github.com\/ashishb\/android-malware. Visited on","year":"2020","key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Database of 298 Android Malwares. https:\/\/github.com\/ashishb\/android-malware. Visited on September 2020 . [n.d.]. Database of 298 Android Malwares. https:\/\/github.com\/ashishb\/android-malware. Visited on September 2020."},{"volume-title":"https:\/\/duktape.org\/. Visited on","year":"2020","key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Duktape. https:\/\/duktape.org\/. Visited on January 2020 . [n.d.]. Duktape. https:\/\/duktape.org\/. Visited on January 2020."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Frida URL. https:\/\/frida.re\/. Accessed: 2019-10-14.  [n.d.]. Frida URL. https:\/\/frida.re\/. Accessed: 2019-10-14."},{"volume-title":"Google\u2019s Bouncer For Android Shows Malware Apps the Door. https:\/\/mashable.com\/2012\/02\/02\/google-bouncer-for-android\/?europe=true. Visited on","year":"2020","key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Google\u2019s Bouncer For Android Shows Malware Apps the Door. https:\/\/mashable.com\/2012\/02\/02\/google-bouncer-for-android\/?europe=true. Visited on April 2020 . [n.d.]. Google\u2019s Bouncer For Android Shows Malware Apps the Door. https:\/\/mashable.com\/2012\/02\/02\/google-bouncer-for-android\/?europe=true. Visited on April 2020."},{"volume-title":"libffii. https:\/\/github.com\/libffi\/libffi. Visited on","year":"2020","key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. libffii. https:\/\/github.com\/libffi\/libffi. Visited on December 2020 . [n.d.]. libffii. https:\/\/github.com\/libffi\/libffi. Visited on December 2020."},{"volume-title":"Mobile Operating System Market Share Worldwide. https:\/\/developer.android.com\/studio\/test\/monkey. Visited on","year":"2019","key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. Mobile Operating System Market Share Worldwide. https:\/\/developer.android.com\/studio\/test\/monkey. Visited on June 2019 . [n.d.]. Mobile Operating System Market Share Worldwide. https:\/\/developer.android.com\/studio\/test\/monkey. Visited on June 2019."},{"volume-title":"SimpleTextEditor","key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. SimpleTextEditor use to evaluate the effectiveness of Odile . https:\/\/f-droid.org\/en\/packages\/com.maxistar.textpad\/. [n.d.]. SimpleTextEditor use to evaluate the effectiveness of Odile. https:\/\/f-droid.org\/en\/packages\/com.maxistar.textpad\/."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Visited on","author":"Monkey Application Exerciser","year":"2019","unstructured":"[n.d.]. UI\/ Application Exerciser Monkey . http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Visited on June 2019 . [n.d.]. UI\/Application Exerciser Monkey. http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide. Visited on June 2019."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.43"},{"key":"e_1_3_2_1_13_1","volume-title":"TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07795)","author":"Backes Michael","year":"2013","unstructured":"Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , and Philipp von Styp-Rekowsky . 2013 . AppGuard - Enforcing User Requirements on Android Apps. In Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference , TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07795) , Nir Piterman and Scott\u00a0A. Smolka (Eds.). Springer, 543\u2013548. https:\/\/doi.org\/10.1007\/978-3-642-36742-7_39 10.1007\/978-3-642-36742-7_39 Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky. 2013. AppGuard - Enforcing User Requirements on Android Apps. In Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07795), Nir Piterman and Scott\u00a0A. Smolka (Eds.). Springer, 543\u2013548. https:\/\/doi.org\/10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_1_14_1","volume-title":"DPM 2013, and 6th International Workshop, SETOP 2013","author":"Backes Michael","year":"2013","unstructured":"Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , and Philipp von Styp-Rekowsky . 2013 . AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. In Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop , DPM 2013, and 6th International Workshop, SETOP 2013 , Egham, UK , September 12-13, 2013, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a08247), Joaqu\u00edn Garc\u00eda-Alfaro, Georgios\u00a0V. Lioudakis, Nora Cuppens-Boulahia, Simon\u00a0N. Foley, and William\u00a0M. Fitzgerald (Eds.). Springer, 213\u2013231. https:\/\/doi.org\/10.1007\/978-3-642-54568-9_14 10.1007\/978-3-642-54568-9_14 Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky. 2013. AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. In Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a08247), Joaqu\u00edn Garc\u00eda-Alfaro, Georgios\u00a0V. Lioudakis, Nora Cuppens-Boulahia, Simon\u00a0N. Foley, and William\u00a0M. Fitzgerald (Eds.). Springer, 213\u2013231. https:\/\/doi.org\/10.1007\/978-3-642-54568-9_14"},{"key":"e_1_3_2_1_15_1","volume-title":"Crowdroid: Behavior-Based Malware Detection System for Android. SPSM \u201911, 15\u201326. https:\/\/doi.org\/10.1145\/2046614.2046619","author":"Burguera Iker","year":"2011","unstructured":"Iker Burguera , Urko Zurutuza , and Simin Nadjm-Tehrani . 2011 . Crowdroid: Behavior-Based Malware Detection System for Android. SPSM \u201911, 15\u201326. https:\/\/doi.org\/10.1145\/2046614.2046619 10.1145\/2046614.2046619 Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. 2011. Crowdroid: Behavior-Based Malware Detection System for Android. SPSM \u201911, 15\u201326. https:\/\/doi.org\/10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_16_1","unstructured":"Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime.. In IMPS@ ESSoS. 20\u201328.  Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime.. In IMPS@ ESSoS. 20\u201328."},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"I-arm-droid: A rewriting framework for in-app reference monitors for android applications","volume":"2012","author":"Davis Benjamin","year":"2012","unstructured":"Benjamin Davis , Ben Sanders , Armen Khodaverdian , and Hao Chen . 2012 . I-arm-droid: A rewriting framework for in-app reference monitors for android applications . Mobile Security Technologies 2012 , 2 (2012), 1 \u2013 7 . Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen. 2012. I-arm-droid: A rewriting framework for in-app reference monitors for android applications. Mobile Security Technologies 2012, 2 (2012), 1\u20137.","journal-title":"Mobile Security Technologies"},{"key":"e_1_3_2_1_18_1","unstructured":"Patrik Lantz. 2011. DroidBox: An Android Application Sandbox for Dynamic Analysis.. In Master\u2019s Thesis at Department of Electrical and Information Technology.  Patrik Lantz. 2011. DroidBox: An Android Application Sandbox for Dynamic Analysis.. In Master\u2019s Thesis at Department of Electrical and Information Technology."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"e_1_3_2_1_21_1","volume-title":"Victor van\u00a0der Veen, and Christian Platzer","author":"Lindorfer Martina","year":"2014","unstructured":"Martina Lindorfer , Matthias Neugschwandtner , Lukas Weichselbaum , Yanick Fratantonio , Victor van\u00a0der Veen, and Christian Platzer . 2014 . ANDRUBIS - 1, 000, 000 Apps Later : A View on Current Android Malware Behaviors. In BADGERS@ESORICS 2014, Wroclaw, Poland. IEEE , 3\u201317. Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van\u00a0der Veen, and Christian Platzer. 2014. ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors. In BADGERS@ESORICS 2014, Wroclaw, Poland. IEEE, 3\u201317."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249466"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_24_1","volume-title":"Copperdroid: Automatic reconstruction of android malware behaviors.. In Ndss.","author":"Tam Kimberly","year":"2015","unstructured":"Kimberly Tam , Salahuddin\u00a0 J Khan , Aristide Fattori , and Lorenzo Cavallaro . 2015 . Copperdroid: Automatic reconstruction of android malware behaviors.. In Ndss. Kimberly Tam, Salahuddin\u00a0J Khan, Aristide Fattori, and Lorenzo Cavallaro. 2015. Copperdroid: Automatic reconstruction of android malware behaviors.. In Ndss."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212504"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.051"},{"key":"e_1_3_2_1_27_1","unstructured":"Michelle\u00a0Y Wong and David Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.. In NDSS Vol.\u00a016. 21\u201324.  Michelle\u00a0Y Wong and David Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.. In NDSS Vol.\u00a016. 21\u201324."},{"key":"e_1_3_2_1_28_1","volume-title":"IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Y.","year":"2016","unstructured":"Michelle\u00a0 Y. Wong and David Lie. 2016 . IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016 , San Diego, California, USA , February 21-24, 2016 . Michelle\u00a0Y. Wong and David Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016."},{"key":"e_1_3_2_1_29_1","volume-title":"Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Xu Rubin","year":"2012","unstructured":"Rubin Xu , Hassen Sa\u00efdi , and Ross Anderson . 2012 . Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12) . USENIX Association, Bellevue, WA, 539\u2013552. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/xu_rubin Rubin Xu, Hassen Sa\u00efdi, and Ross Anderson. 2012. Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 539\u2013552. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/xu_rubin"},{"key":"e_1_3_2_1_30_1","volume-title":"Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Xue Lei","year":"2017","unstructured":"Lei Xue , Yajin Zhou , Ting Chen , Xiapu Luo , and Guofei Gu . 2017 . Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In 26th USENIX Security Symposium (USENIX Security 17) . 289\u2013306. Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, and Guofei Gu. 2017. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In 26th USENIX Security Symposium (USENIX Security 17). 289\u2013306."},{"key":"e_1_3_2_1_31_1","volume-title":"Droidscope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569\u2013584.","author":"Yan Lok\u00a0Kwong","year":"2012","unstructured":"Lok\u00a0Kwong Yan and Heng Yin . 2012 . Droidscope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569\u2013584. Lok\u00a0Kwong Yan and Heng Yin. 2012. Droidscope: Seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 569\u2013584."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906344"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557558"},{"key":"e_1_3_2_1_34_1","volume-title":"Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95\u2013109","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou and X. Jiang . 2012 . Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95\u2013109 . https:\/\/doi.org\/10.1109\/SP. 2012 .16 10.1109\/SP.2012.16 Y. Zhou and X. Jiang. 2012. Dissecting Android Malware: Characterization and Evolution. In 2012 IEEE Symposium on Security and Privacy. 95\u2013109. https:\/\/doi.org\/10.1109\/SP.2012.16"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":34,"alternative-id":["10.1145\/3545948.3545951","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545951","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}