{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T12:57:12Z","timestamp":1761569832003,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"name":"Frontier Technologies R&D Program of Jiangsu","award":["BF2024059"],"award-info":[{"award-number":["BF2024059"]}]},{"name":"National Natural Science Foundation of China","award":["62272218"],"award-info":[{"award-number":["62272218"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755882","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"36-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7896-3152","authenticated-orcid":false,"given":"Jun","family":"Ma","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6098-3940","authenticated-orcid":false,"given":"Weixiang","family":"Huang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3207-4059","authenticated-orcid":false,"given":"Chun","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Salvatore Carta Fang Lyu Yaping Lin and Junfeng Yang. 2017. An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach. Mobile Information Systems 2017 (2017) 6958698. 10.1155\/2017\/6958698","DOI":"10.1155\/2017\/6958698"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831185"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Jonathan Crussell Clint Gibler and Hao Chen. 2015. AnDarwin: Scalable Detection of Android Application Clones Based on Semantics. IEEE Transactions on Mobile Computing 14 10 (2015) 2007\u20132019. 10.1109\/TMC.2014.2381212","DOI":"10.1109\/TMC.2014.2381212"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23829-6_30"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-84"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Yuta Ishii Takuya Watanabe Mitsuaki Akiyama and Tatsuya Mori. 2017. APPraiser: A large scale analysis of android clone apps. IEICE Transactions on Information and Systems E100D 8 (Aug. 2017) 1703\u20131713. 10.1587\/transinf.2016ICP0012Publisher Copyright: Copyright \u00a9 2017 The Institute of Electronics Information and Communication Engineers..","DOI":"10.1587\/transinf.2016ICP0012"},{"key":"e_1_3_3_2_9_2","volume-title":"Information Security Practice and Experience","author":"Jiao Sibei","year":"2015","unstructured":"Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng. 2015. A Rapid and Scalable Method for Android Application Repackaging Detection. In Information Security Practice and Experience."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17533-1_24"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Kobra Khanmohammadi Neda Ebrahimi Abdelwahab Hamou-Lhadj and Rapha\u00ebl Khoury. 2019. Empirical study of android repackaged applications. Empirical Software Engineering 24 6 (2019) 3587\u20133629. 10.1007\/s10664-019-09760-3","DOI":"10.1007\/s10664-019-09760-3"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Daeyoung Kim Amruta Gokhale Vinod Ganapathy and Abhinav Srivastava. 2016. Detecting plagiarized mobile apps using API birthmarks. Automated Software Engineering (2016) 591\u2013618. 10.1007\/s10515-015-0182-6","DOI":"10.1007\/s10515-015-0182-6"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15943-0_15"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Li Li Tegawend\u00e9\u00a0F. Bissyand\u00e9 and Jacques Klein. 2021. Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark. IEEE Transactions on Software Engineering 47 4 (2021) 676\u2013693. 10.1109\/TSE.2019.2901679","DOI":"10.1109\/TSE.2019.2901679"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Jun Ma Qingwei Sun Chang Xu and Xianping Tao. 2022. GridDroid\u2014An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface. Journal of Computer Science and Technology 37 1 (2022) 147\u2013181. 10.1007\/s11390-021-1659-3","DOI":"10.1007\/s11390-021-1659-3"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3151137.3151138"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.25"},{"key":"e_1_3_3_2_20_2","volume-title":"Market share of mobile operating systems worldwide from 2009 to 2024, by quarter","year":"2024","unstructured":"Statista. 2024. Market share of mobile operating systems worldwide from 2009 to 2024, by quarter. Retrieved January 14, 2025 from https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766508"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-642-55415-5_12","volume-title":"ICT Systems Security and Privacy Protection","author":"Sun Xin","year":"2014","unstructured":"Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, and Li Xie. 2014. Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. In ICT Systems Security and Privacy Protection, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Sushil Jajodia, Anas Abou El\u00a0Kalam, and Thierry Sans (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 142\u2013155."},{"key":"e_1_3_3_2_23_2","unstructured":"Haruaki Tamada Masahide Nakamura and Akito Monden. 2004. Design and Evaluation of Birthmarks for Detecting Theft of Java Programs. 569\u2013574."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Tengfei Tu Hua Zhang Yangye Hu Dong Cui and Xilin Zhai. 2023. A detector for Android repackaged applications with layout-fingerprint. Journal of Information Security and Applications 76 (2023) 103527. 10.1016\/j.jisa.2023.103527","DOI":"10.1016\/j.jisa.2023.103527"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.16"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00041"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-662-43936-4_9","volume-title":"Data and Applications Security and Privacy XXVIII","author":"Zhauniarovich Yury","year":"2014","unstructured":"Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La\u00a0Spina, and Ermanno Moser. 2014. FSquaDRA: Fast Detection of Repackaged Applications. In Data and Applications Security and Privacy XXVIII, Vijay Atluri and G\u00fcnther Pernul (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 130\u2013145."},{"key":"e_1_3_3_2_30_2","first-page":"199","volume-title":"2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Zhou Hao","year":"2020","unstructured":"Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, and Wei Zhang. 2020. UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. In 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 199\u2013210."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","location":"Trondheim Norway","acronym":"Internetware 2025","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:20Z","timestamp":1761565580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":31,"alternative-id":["10.1145\/3755881.3755882","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755882","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}