{"id":"https://openalex.org/W2532717356","doi":"https://doi.org/10.1145/2976749.2978333","title":"Reliable Third-Party Library Detection in Android and its Security Applications","display_name":"Reliable Third-Party Library Detection in Android and its Security Applications","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2532717356","doi":"https://doi.org/10.1145/2976749.2978333","mag":"2532717356"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]},{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I4210121786","display_name":"Max Planck Institute for Software Systems","ror":"https://ror.org/02pe2kf23","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210121786"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Michael Backes","raw_affiliation_strings":["CISPA, Saarland University &amp; MPI-SWS, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University &amp; MPI-SWS, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I4210121786","https://openalex.org/I91712215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085053271","display_name":"Sven Bugiel","orcid":"https://orcid.org/0000-0002-7151-9614"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sven Bugiel","raw_affiliation_strings":["CISPA, Saarland University, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000126700","display_name":"Erik Derr","orcid":null},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]},{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Erik Derr","raw_affiliation_strings":["CISPA, Saarland University, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004014878"],"corresponding_institution_ids":["https://openalex.org/I4210121786","https://openalex.org/I4210128801","https://openalex.org/I91712215"],"apc_list":null,"apc_paid":null,"fwci":29.2912,"has_fulltext":false,"cited_by_count":312,"citation_normalized_percentile":{"value":0.99841874,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"356","last_page":"367"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.797579288482666},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7758506536483765},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.5888674259185791},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5626095533370972},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5342565774917603},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.509526789188385},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4743800759315491},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46816086769104004},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37401267886161804},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17556455731391907}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.797579288482666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7758506536483765},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.5888674259185791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5626095533370972},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5342565774917603},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.509526789188385},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4743800759315491},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46816086769104004},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37401267886161804},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17556455731391907},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2976749.2978333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.mpg.de:item_2417025","is_oa":false,"landing_page_url":"http://hdl.handle.net/11858/00-001M-0000-002C-DEE1-1","pdf_url":null,"source":{"id":"https://openalex.org/S4306400654","display_name":"MPG.PuRe (Max Planck Society)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149899117","host_organization_name":"Max Planck Society","host_organization_lineage":["https://openalex.org/I149899117"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CCS'16","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6233540816","display_name":null,"funder_award_id":"16KIS0377K","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W101604734","https://openalex.org/W124941384","https://openalex.org/W183494281","https://openalex.org/W794140516","https://openalex.org/W1499707862","https://openalex.org/W1578479379","https://openalex.org/W1600255172","https://openalex.org/W1971497680","https://openalex.org/W1972350641","https://openalex.org/W1976596267","https://openalex.org/W1988036170","https://openalex.org/W2008810193","https://openalex.org/W2014390890","https://openalex.org/W2017025011","https://openalex.org/W2022309454","https://openalex.org/W2024385792","https://openalex.org/W2027538101","https://openalex.org/W2060727319","https://openalex.org/W2087804676","https://openalex.org/W2088479623","https://openalex.org/W2103370348","https://openalex.org/W2123134030","https://openalex.org/W2123437505","https://openalex.org/W2126123233","https://openalex.org/W2141554582","https://openalex.org/W2166743230","https://openalex.org/W2180124721","https://openalex.org/W2400269587","https://openalex.org/W2400808624","https://openalex.org/W2544992706","https://openalex.org/W2560459036","https://openalex.org/W2573983983","https://openalex.org/W2949838346"],"related_works":["https://openalex.org/W2894765413","https://openalex.org/W769484497","https://openalex.org/W2506128599","https://openalex.org/W2794864670","https://openalex.org/W2597596645","https://openalex.org/W4383744737","https://openalex.org/W4313563576","https://openalex.org/W2773184731","https://openalex.org/W2922039621","https://openalex.org/W2581685432"],"abstract_inverted_index":{"Third-party":[0],"libraries":[1],"on":[2,129,240],"Android":[3,242],"have":[4],"been":[5],"shown":[6],"to":[7,17,33,51,125,136,164,220,232],"be":[8,48],"security":[9,15,176,235],"and":[10,69,90,132,144],"privacy":[11],"hazards":[12],"by":[13,22,58],"adding":[14],"vulnerabilities":[16,177],"their":[18,44,133,162],"host":[19,45,203],"apps":[20,46,128,210],"or":[21,35,39],"misusing":[23],"inherited":[24],"access":[25],"rights.":[26],"Correctly":[27],"attributing":[28],"improper":[29],"app":[30,34,153],"behavior":[31],"either":[32],"library":[36,41,64,80,98,111,119,142,159],"developer":[37],"code":[38,42,88],"isolating":[40],"from":[43,108,116],"would":[47],"highly":[49],"desirable":[50],"mitigate":[52],"these":[53],"problems,":[54],"but":[55],"is":[56,67,84,92,230],"impeded":[57],"the":[59,96,117,126,185,202,223,234,241],"absence":[60],"of":[61,73,94,141,167,194,216,225,237],"a":[62,79,109,138,212],"third-party":[63,238],"detection":[65,81],"that":[66,83,91,113,152,173,192],"effective":[68],"reliable":[70],"in":[71,101,146,178,184,197],"spite":[72],"obfuscated":[74],"code.":[75],"This":[76],"paper":[77],"proposes":[78],"technique":[82,124],"resilient":[85],"against":[86],"common":[87],"obfuscations":[89],"capable":[93],"pinpointing":[95],"exact":[97],"version":[99],"used":[100],"apps.":[102,147,188],"Libraries":[103],"are":[104,181],"detected":[105],"with":[106,211],"profiles":[107],"comprehensive":[110],"database":[112],"we":[114,171,190],"generated":[115],"original":[118],"SDKs.":[120],"We":[121],"apply":[122],"our":[123,226,228],"top":[127,187,209],"Google":[130],"Play":[131],"complete":[134],"histories":[135],"conduct":[137],"longitudinal":[139],"study":[140],"usage":[143],"evolution":[145],"Our":[148],"results":[149],"particularly":[150],"show":[151],"developers":[154],"only":[155],"slowly":[156],"adapt":[157],"new":[158],"versions,":[160],"exposing":[161],"end-users":[163],"large":[165],"windows":[166],"vulnerability.":[168],"For":[169],"instance,":[170],"discovered":[172],"two":[174],"long-known":[175],"popular":[179],"libs":[180,239],"still":[182],"present":[183],"current":[186],"Moreover,":[189],"find":[191],"misuse":[193],"cryptographic":[195],"APIs":[196],"advertising":[198],"libs,":[199],"which":[200],"increases":[201],"apps'":[204],"attack":[205],"surface,":[206],"affects":[207],"296":[208],"cumulative":[213],"install":[214],"base":[215],"3.7bn":[217],"devices":[218],"according":[219],"Play.":[221],"To":[222],"best":[224],"knowledge,":[227],"work":[229],"first":[231],"quantify":[233],"impact":[236],"ecosystem.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":36},{"year":2022,"cited_by_count":25},{"year":2021,"cited_by_count":43},{"year":2020,"cited_by_count":44},{"year":2019,"cited_by_count":49},{"year":2018,"cited_by_count":44},{"year":2017,"cited_by_count":21},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
