{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:18Z","timestamp":1747459518471,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2015R1A2A1A15053738","IITP-2018-2015-0-00363"],"award-info":[{"award-number":["2015R1A2A1A15053738","IITP-2018-2015-0-00363"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2015R1A2A1A15053738","IITP-2018-2015-0-00363"],"award-info":[{"award-number":["2015R1A2A1A15053738","IITP-2018-2015-0-00363"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,6,20]]},"abstract":"<jats:p><jats:italic>Unity<\/jats:italic> is the most popular cross-platform development framework to develop games for multiple platforms such as Android, iOS, and Windows Mobile. While Unity developers can easily develop mobile apps for multiple platforms, adversaries can also easily build malicious apps based on the \u201c<jats:italic>write once, run anywhere<\/jats:italic>\u201d (WORA) feature. Even though malicious apps were discovered among<jats:italic> Android apps written with Unity framework (Unity apps)<\/jats:italic>, little research has been done on analysing the malicious apps. We propose static and dynamic reverse engineering techniques for malicious Unity apps. We first inspect the executable file format of a Unity app and present an effective static analysis technique of the Unity app. Then, we also propose a systematic technique to analyse dynamically the Unity app. Using the proposed techniques, the malware analyst can statically and dynamically analyse Java code, native code in C or C ++, and the Mono runtime layer where the C# code is running.<\/jats:p>","DOI":"10.1155\/2018\/6280768","type":"journal-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T19:33:38Z","timestamp":1529523218000},"page":"1-12","source":"Crossref","is-referenced-by-count":9,"title":["Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6230-3440","authenticated-orcid":true,"given":"Jaewoo","family":"Shim","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Dankook University, Yongin 16890, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9807-7599","authenticated-orcid":true,"given":"Kyeonghwan","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Dankook University, Yongin 16890, Republic of Korea"}]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Dankook University, Yongin 16890, Republic of Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Konkuk University, Chungju 27478, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7392-6742","authenticated-orcid":true,"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Konkuk University, Chungju 27478, Republic of Korea"}]}],"member":"311","reference":[{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2015.08.004"},{"year":"2016","key":"5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4900-9"},{"year":"2014","key":"7"},{"issue":"4","key":"8","first-page":"19","volume":"3","year":"2015","journal-title":"International Journal of Advance Research in Computer Science and Management Studies"},{"key":"15","first-page":"184","volume":"79","year":"2001","journal-title":"International Journal of Advanced Structural Engineering"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503274"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/52.976940"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_19"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0012-2"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"journal-title":"NDSS","year":"2009","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806598"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2010-0410"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"issue":"1","key":"28","volume":"2016","year":"2016","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2693388"},{"year":"2015","key":"30"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35755-8_16"},{"year":"2014","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2795383"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6280768.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6280768.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/6280768.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T19:33:48Z","timestamp":1529523228000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/6280768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":21,"alternative-id":["6280768","6280768"],"URL":"https:\/\/doi.org\/10.1155\/2018\/6280768","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018,6,20]]}}}