{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:21:39Z","timestamp":1770229299710,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100017642","name":"Spanish National Plan for Scientific and Technical Research and Innovation","doi-asserted-by":"publisher","award":["TED2021-132464B-I00"],"award-info":[{"award-number":["TED2021-132464B-I00"]}],"id":[{"id":"10.13039\/501100017642","id-type":"DOI","asserted-by":"publisher"}]},{"name":"panish Governement MCIN\/AEI\/10.13039\/501100011033\/ERDF","award":["PID2022-142290OB-I00"],"award-info":[{"award-number":["PID2022-142290OB-I00"]}]},{"name":"Madrid regional government program","award":["S2018\/TCS-4339"],"award-info":[{"award-number":["S2018\/TCS-4339"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616344","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1407-1418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["LibKit: Detecting Third-Party Libraries in iOS Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4440-3760","authenticated-orcid":false,"given":"Daniel","family":"Dom\u00ednguez-\u00c1lvarez","sequence":"first","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain \/ University of Verona, Verona, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1313-821X","authenticated-orcid":false,"given":"Alejandro","family":"de la Cruz","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6711-3080","authenticated-orcid":false,"given":"Alessandra","family":"Gorla","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2962-1348","authenticated-orcid":false,"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2013.6637558"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916629"},{"key":"e_1_3_2_2_3_1","unstructured":"2022. angr. https:\/\/github.com\/angr\/angr."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.79"},{"key":"e_1_3_2_2_6_1","volume-title":"Clemens Hlauschek, Christopher Kruegel, and Engin Kirda.","author":"Bayer Ulrich","year":"2009","unstructured":"Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, Behavior-Based Malware Clustering. In Network and Distributed System Security."},{"key":"e_1_3_2_2_7_1","volume-title":"CHI 2013: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 817\u2013822","author":"Benenson Zinaida","year":"2013","unstructured":"Zinaida Benenson, Freya Gassmann, and Lena Reinfelder. 2013. Android and iOS users\u2019 differences concerning security and privacy. In CHI 2013: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 817\u2013822."},{"key":"e_1_3_2_2_8_1","unstructured":"2022. Carthage Dependency Manager. https:\/\/github.com\/Carthage\/Carthage."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_2_11_1","unstructured":"2022. CocoaPods Dependency Manager. https:\/\/cocoapods.org\/."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340496.3342762"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM55253.2022.00026"},{"key":"e_1_3_2_2_14_1","unstructured":"Daniel Dom\u00ednguez-\u00c1lvarez Alessandra Gorla Juan Caballero and Roberto Giacobazzi. 2019. Are you Sure They are the Same? Identifying Differences Between iOS and Android Implementations. In Actas de las V Jornadas Nacionales de Ciberseguridad. 332\u2013333."},{"key":"e_1_3_2_2_15_1","unstructured":"2022. dsdump. https:\/\/github.com\/DerekSelander\/dsdump."},{"key":"e_1_3_2_2_16_1","volume-title":"NDSS 2011: 18th Annual Symposium on Network and Distributed System Security. 177\u2013183","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS 2011: 18th Annual Symposium on Network and Distributed System Security. 177\u2013183."},{"key":"e_1_3_2_2_17_1","unstructured":"2022. Frida Instrumentation Toolkit. https:\/\/frida.re\/."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953330"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.78"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012801612483"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866553"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.27"},{"key":"e_1_3_2_2_23_1","first-page":"6","article-title":"Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps","volume":"2022","author":"Kollnig Konrad","year":"2022","unstructured":"Konrad Kollnig, Anastasia Shuba, Reuben Binns, Max Van Kleek, and Nigel Shadbolt. 2022. Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps. PETS, 2022, 2 (2022), 6\u201324.","journal-title":"PETS"},{"key":"e_1_3_2_2_24_1","volume-title":"LibD: Scalable and Precise Third-party Library Detection in Android Markets. In ICSE 2017: Proceedings of the 39th International Conference on Software Engineering. 335\u2013346","author":"Li Menghao","year":"2017","unstructured":"Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, and Wei Huo. 2017. LibD: Scalable and Precise Third-party Library Detection in Android Markets. In ICSE 2017: Proceedings of the 39th International Conference on Software Engineering. 335\u2013346."},{"key":"e_1_3_2_2_25_1","volume-title":"NSS 2015: Proceedings of the 2015 International Conference on Network and System Security. 349\u2013362","author":"Li Yong","year":"2015","unstructured":"Yong Li, Yuanyuan Zhang, Juanru Li, and Dawu Gu. 2015. icryptotracer: Dynamic analysis on misuse of cryptography functions in ios applications. In NSS 2015: Proceedings of the 2015 International Conference on Network and System Security. 349\u2013362."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","unstructured":"2023. LibKit release URL. https:\/\/doi.org\/10.5281\/zenodo.7042015.","DOI":"10.5281\/zenodo.7042015"},{"key":"e_1_3_2_2_27_1","unstructured":"2023. LibKit Website. https:\/\/sites.google.com\/view\/libkit."},{"key":"e_1_3_2_2_28_1","volume-title":"LibRadar: Fast and Accurate Detection of Third-party Libraries in Android Apps. In ICSE 2016: Proceedings of the 38th International Conference on Software Engineering. 653\u2013656","author":"Ma Ziang","year":"2016","unstructured":"Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen. 2016. LibRadar: Fast and Accurate Detection of Third-party Libraries in Android Apps. In ICSE 2016: Proceedings of the 38th International Conference on Software Engineering. 653\u2013656."},{"key":"e_1_3_2_2_29_1","unstructured":"2022. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.123"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994473"},{"key":"e_1_3_2_2_32_1","volume-title":"Carthage and Swift PM. In MSR 2022: 19th International Conference on Mining Software Repositories. 393\u2013397","author":"Rahkema Kristiina","year":"2022","unstructured":"Kristiina Rahkema and Dietmar Pfahl. 2022. Dataset: Dependency Networks of Open Source Libraries Available Through CocoaPods, Carthage and Swift PM. In MSR 2022: 19th International Conference on Mining Software Repositories. 393\u2013397."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"e_1_3_2_2_34_1","unstructured":"2022. Swift Package Manager. https:\/\/www.swift.org\/package-manager\/."},{"key":"e_1_3_2_2_35_1","volume-title":"Applications. In USENIX Security: 29th USENIX Security Symposium. 2415\u20132432","author":"Tang Zhushou","year":"2020","unstructured":"Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, and Haojin Zhu. 2020. iOS, Your OS, Everybody\u2019s OS: Vetting and Analyzing Network Services of iOS Applications. In USENIX Security: 29th USENIX Security Symposium. 2415\u20132432."},{"key":"e_1_3_2_2_36_1","volume-title":"Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. 618\u2013625.","author":"Titze Dennis","year":"2017","unstructured":"Dennis Titze, Michael Lux, and Julian Schuette. 2017. Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. 618\u2013625."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180169"},{"key":"e_1_3_2_2_38_1","volume-title":"MobileSoft 2018: Proceedings of the 5th IEEE\/ACM International Conference on Mobile Software Engineering and Systems. 13\u201323.","author":"Wang Yan","unstructured":"Yan Wang, Haowei Wu, Hailong Zhang, and Atanas Rountev. 2018. ORLIS: obfuscation-resilient library detection for Android. In MobileSoft 2018: Proceedings of the 5th IEEE\/ACM International Conference on Mobile Software Engineering and Systems. 13\u201323."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00040"},{"key":"e_1_3_2_2_40_1","first-page":"167","article-title":"LibRoad: Rapid, Online, and Accurate Detection of TPLs on Android","volume":"21","author":"Xu Jian","year":"2020","unstructured":"Jian Xu and Qianting Yuan. 2020. LibRoad: Rapid, Online, and Accurate Detection of TPLs on Android. IEEE Transactions on Mobile Computing, 21, 1 (2020), 167\u2013180.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_2_41_1","article-title":"A Systematic Assessment on Android Third-party Library Detection Tools","author":"Zhan Xian","year":"2021","unstructured":"Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, and Xiapu Luo. 2021. A Systematic Assessment on Android Third-party Library Detection Tools. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330204"},{"key":"e_1_3_2_2_43_1","volume-title":"An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps. In ACM Conference on Security and Privacy in Wireless and Mobile Networks.","author":"Zhang Zicheng","year":"2020","unstructured":"Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, and Li Li. 2020. An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps. In ACM Conference on Security and Privacy in Wireless and Mobile Networks."}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":43,"alternative-id":["10.1145\/3611643.3616344","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616344","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}