{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:09Z","timestamp":1750220049646,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Satellite of Excellence in Mobile Systems Security and Cloud Security","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,22]]},"DOI":"10.1145\/3572864.3580338","type":"proceedings-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:18:37Z","timestamp":1676333917000},"page":"74-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["FA\n            <sup>3<\/sup>"],"prefix":"10.1145","author":[{"given":"Yan","family":"Lin","sequence":"first","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Joshua","family":"Wong","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"volume-title":"http:\/\/legu.qcloud.com\/","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"Baidu. http:\/\/legu.qcloud.com\/, 2015-12-12."},{"volume-title":"https:\/\/www.eclipse.org\/aspectj\/doc\/released\/adk15notebook\/index.html","year":"2017","key":"e_1_3_2_1_2_1","unstructured":"Aspectj. https:\/\/www.eclipse.org\/aspectj\/doc\/released\/adk15notebook\/index.html, 2017-11-01."},{"volume-title":"https:\/\/www.geekbench.com\/","year":"2017","key":"e_1_3_2_1_3_1","unstructured":"Geekbench 5. https:\/\/www.geekbench.com\/, 2017-12-18."},{"volume-title":"https:\/\/android.googlesource.com\/platform\/system\/extras\/+\/master\/simpleperf\/doc\/README.md","year":"2019","key":"e_1_3_2_1_4_1","unstructured":"Simpleperf. https:\/\/android.googlesource.com\/platform\/system\/extras\/+\/master\/simpleperf\/doc\/README.md, 2019-04-04."},{"volume-title":"https:\/\/developer.android.com\/studio\/test\/monkey","year":"2020","key":"e_1_3_2_1_5_1","unstructured":"Android monkey. https:\/\/developer.android.com\/studio\/test\/monkey, 2020-08-25."},{"volume-title":"https:\/\/developer.android.com\/studio\/profile\/android-profiler","year":"2021","key":"e_1_3_2_1_6_1","unstructured":"Android profiler. https:\/\/developer.android.com\/studio\/profile\/android-profiler, 2021-07-28."},{"key":"e_1_3_2_1_7_1","volume-title":"Droidnative: Automating and optimizing detection of android native code malware variants. computers & security, 65","author":"Alam S.","year":"2017","unstructured":"S. Alam, Z. Qu, R. Riley, Y. Chen, and V. Rastogi. Droidnative: Automating and optimizing detection of android native code malware variants. computers & security, 65, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_26"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.43"},{"key":"e_1_3_2_1_10_1","first-page":"61","author":"Balachandran V.","year":"2016","unstructured":"V. Balachandran, D. J. Tan, V. L. Thing, et al. Control flow obfuscation for android applications. Computers & Security, 61, 2016.","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_11_1","volume-title":"FREENIX Track","volume":"41","author":"Bellard F.","year":"2005","unstructured":"F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX annual technical conference, FREENIX Track, volume 41. Califor-nia, USA, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384745"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_2_1_20_1","volume-title":"SECRYPT","volume":"96435","author":"Sarwar G.","year":"2013","unstructured":"G. Sarwar, O. Mehani, R. Boreli, and M. A. Kaafar. On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. In SECRYPT, volume 96435, 2013."},{"issue":"5","key":"e_1_3_2_1_21_1","volume":"12","author":"Sun M.","year":"2016","unstructured":"M. Sun, X. Li, J. C. Lui, R. T. Ma, and Z. Liang. Monet: a user-oriented behavior-based malware variants detection system for android. IEEE Transactions on Information Forensics and Security, 12(5), 2016.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00105"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"Xue L.","year":"2017","unstructured":"L. Xue, Y. Zhou, T. Chen, X. Luo, and G. Gu. Malton: Towards on-device non-invasive mobile malware analysis for {ART}. In Proceedings of the 26th USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin. Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_4"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"}],"event":{"name":"HotMobile '23: The 24th International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Newport Beach California","acronym":"HotMobile '23"},"container-title":["Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572864.3580338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3572864.3580338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:10Z","timestamp":1750183690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572864.3580338"}},"subtitle":["Fine-Grained Android Application Analysis"],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":32,"alternative-id":["10.1145\/3572864.3580338","10.1145\/3572864"],"URL":"https:\/\/doi.org\/10.1145\/3572864.3580338","relation":{},"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"2023-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}