{"id":"https://openalex.org/W2791171964","doi":"https://doi.org/10.1145/3168820","title":"Resilient decentralized Android application repackaging detection using logic bombs","display_name":"Resilient decentralized Android application repackaging detection using logic bombs","publication_year":2018,"publication_date":"2018-02-24","ids":{"openalex":"https://openalex.org/W2791171964","doi":"https://doi.org/10.1145/3168820","mag":"2791171964"},"language":"en","primary_location":{"id":"doi:10.1145/3168820","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3168820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Symposium on Code Generation and Optimization","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102018601","display_name":"Qiang Zeng","orcid":"https://orcid.org/0000-0001-9432-6017"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qiang Zeng","raw_affiliation_strings":["Temple University, USA"],"affiliations":[{"raw_affiliation_string":"Temple University, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067262852","display_name":"Lannan Luo","orcid":"https://orcid.org/0000-0003-2476-7831"},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lannan Luo","raw_affiliation_strings":["University of South Carolina, USA"],"affiliations":[{"raw_affiliation_string":"University of South Carolina, USA","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022038961","display_name":"Zhiyun Qian","orcid":"https://orcid.org/0000-0003-1506-2522"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyun Qian","raw_affiliation_strings":["University of California at Riverside, USA"],"affiliations":[{"raw_affiliation_string":"University of California at Riverside, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Temple University, USA"],"affiliations":[{"raw_affiliation_string":"Temple University, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036786337","display_name":"Zhoujun Li","orcid":"https://orcid.org/0000-0002-9603-9713"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhoujun Li","raw_affiliation_strings":["Beihang University, China"],"affiliations":[{"raw_affiliation_string":"Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102018601"],"corresponding_institution_ids":["https://openalex.org/I84392919"],"apc_list":null,"apc_paid":null,"fwci":3.1377,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92660611,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8355695009231567},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.6787827014923096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5630068182945251},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5228229761123657},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5208133459091187},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5019035339355469},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.452075719833374},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.41772398352622986},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3842744827270508},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.19949662685394287},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14405718445777893}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8355695009231567},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.6787827014923096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5630068182945251},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5228229761123657},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5208133459091187},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5019035339355469},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.452075719833374},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.41772398352622986},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3842744827270508},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.19949662685394287},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14405718445777893},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3168820","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3168820","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Symposium on Code Generation and Optimization","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W34283345","https://openalex.org/W101604734","https://openalex.org/W109909280","https://openalex.org/W110636400","https://openalex.org/W170652726","https://openalex.org/W183494281","https://openalex.org/W191656338","https://openalex.org/W199976391","https://openalex.org/W1515180657","https://openalex.org/W1522939654","https://openalex.org/W1578479379","https://openalex.org/W1892063863","https://openalex.org/W1971497680","https://openalex.org/W1984970810","https://openalex.org/W1994931937","https://openalex.org/W2009614414","https://openalex.org/W2013856010","https://openalex.org/W2056388267","https://openalex.org/W2064038877","https://openalex.org/W2068583268","https://openalex.org/W2084939909","https://openalex.org/W2088479623","https://openalex.org/W2090846184","https://openalex.org/W2096196901","https://openalex.org/W2099525266","https://openalex.org/W2101077503","https://openalex.org/W2101800210","https://openalex.org/W2111525908","https://openalex.org/W2117030266","https://openalex.org/W2120297918","https://openalex.org/W2125011234","https://openalex.org/W2140679274","https://openalex.org/W2145083214","https://openalex.org/W2166561215","https://openalex.org/W2243437504","https://openalex.org/W2518060702","https://openalex.org/W2528795537","https://openalex.org/W2574928120","https://openalex.org/W2577540292","https://openalex.org/W2578771209","https://openalex.org/W2579698096","https://openalex.org/W2613948935","https://openalex.org/W2626301739","https://openalex.org/W2626966626","https://openalex.org/W2733553512","https://openalex.org/W4243037076","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4321062042","https://openalex.org/W1588238984","https://openalex.org/W2160018797","https://openalex.org/W4200123977","https://openalex.org/W2961710371","https://openalex.org/W2241366172","https://openalex.org/W2306533882","https://openalex.org/W3194285038","https://openalex.org/W2573831620","https://openalex.org/W2919866608"],"abstract_inverted_index":{"Application":[0],"repackaging":[1,16,55,67,134,155,191],"is":[2,32,63,94,138,144,158,205],"a":[3,25,57,74,114,184],"severe":[4],"threat":[5],"to":[6,28,53,65,86,103,210],"Android":[7],"users":[8],"and":[9,22,34,96,110,165,198,208,219],"the":[10,40,88,98,105,108,120,129,133,141,148,154,161,178,190,199,203],"market.":[11],"Existing":[12],"countermeasures":[13],"mostly":[14],"detect":[15,54],"based":[17],"on":[18,24,119,126],"app":[19,163,179],"similarity":[20],"measurement":[21],"rely":[23],"central":[26],"party":[27],"perform":[29],"detection,":[30],"which":[31,80,137],"unscalable":[33],"imprecise.":[35],"We":[36,72,181],"instead":[37],"consider":[38],"building":[39],"detection":[41,68,135,156,192],"capability":[42],"into":[43,160,193],"apps,":[44],"such":[45,112],"that":[46,113,116,188,202],"user":[47,130],"devices":[48],"are":[49,81,101,151],"made":[50],"use":[51,76],"of":[52,77,128],"in":[56,84],"decentralized":[58],"fashion.":[59],"The":[60],"main":[61],"challenge":[62],"how":[64],"protect":[66],"code":[69,157,164,175],"from":[70],"attacks.":[71],"propose":[73],"creative":[75],"logic":[78],"bombs,":[79],"regularly":[82],"used":[83],"malware,":[85],"conquer":[87],"challenge.":[89],"A":[90],"novel":[91],"bomb":[92,115,142],"structure":[93],"invented":[95],"used:":[97],"trigger":[99,149],"conditions":[100,150],"constructed":[102],"exploit":[104],"differences":[106],"between":[107],"attacker":[109,121],"users,":[111],"lies":[117],"dormant":[118],"side":[122],"will":[123,176],"be":[124],"activated":[125],"one":[127],"devices,":[131],"while":[132],"code,":[136],"packed":[139],"as":[140],"payload,":[143],"kept":[145],"inactive":[146],"until":[147],"satisfied.":[152],"Moreover,":[153],"woven":[159],"original":[162],"gets":[166],"encrypted;":[167],"thus,":[168],"attacks":[169],"by":[170],"modifying":[171],"or":[172],"deleting":[173],"suspicious":[174],"corrupt":[177],"itself.":[180],"have":[182],"implemented":[183],"prototype,":[185],"named":[186],"BombDroid,":[187],"builds":[189],"apps":[194],"through":[195],"bytecode":[196],"instrumentation,":[197],"evaluation":[200],"shows":[201],"technique":[204],"effective,":[206],"efficient,":[207],"resilient":[209],"various":[211],"adversary":[212],"analysis":[213],"including":[214],"symbol":[215],"execution,":[216],"multi-path":[217],"exploration,":[218],"program":[220],"slicing.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
