{"id":"https://openalex.org/W4308644264","doi":"https://doi.org/10.1145/3540250.3558969","title":"What did you pack in my app? a systematic analysis of commercial Android packers","display_name":"What did you pack in my app? a systematic analysis of commercial Android packers","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308644264","doi":"https://doi.org/10.1145/3540250.3558969"},"language":"en","primary_location":{"id":"doi:10.1145/3540250.3558969","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3540250.3558969","pdf_url":null,"source":{"id":"https://openalex.org/S4363608883","display_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087522841","display_name":"Zikan Dong","orcid":"https://orcid.org/0000-0001-5232-7679"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zikan Dong","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107909617","display_name":"Hongxuan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongxuan Liu","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108761813","display_name":"Liu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021450973","display_name":"Yao Guo","orcid":"https://orcid.org/0000-0001-5064-5286"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Guo","raw_affiliation_strings":["Peking University, China"],"affiliations":[{"raw_affiliation_string":"Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102002679","display_name":"Guoai Xu","orcid":"https://orcid.org/0000-0002-9582-0698"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoai Xu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012621594","display_name":"Xusheng Xiao","orcid":"https://orcid.org/0000-0003-4797-4294"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xusheng Xiao","raw_affiliation_strings":["Case Western Reserve University, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115695530","display_name":"Haoyu Wang","orcid":"https://orcid.org/0000-0003-1100-8633"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5087522841"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.6129,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66382306,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1430","last_page":"1440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7265142798423767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5946565270423889},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5674062371253967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5310457348823547},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4614800810813904},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.44704440236091614},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42142346501350403}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7265142798423767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5946565270423889},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5674062371253967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5310457348823547},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4614800810813904},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44704440236091614},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42142346501350403}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3540250.3558969","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3540250.3558969","pdf_url":null,"source":{"id":"https://openalex.org/S4363608883","display_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2060692877","https://openalex.org/W2125011234","https://openalex.org/W2264131323","https://openalex.org/W2296128045","https://openalex.org/W2575599800","https://openalex.org/W2617476279","https://openalex.org/W2808012362","https://openalex.org/W2890664869","https://openalex.org/W2969694848","https://openalex.org/W3027862040","https://openalex.org/W3160885800","https://openalex.org/W3181963574","https://openalex.org/W4247464060"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W3212610863","https://openalex.org/W2493947570","https://openalex.org/W1565885216"],"abstract_inverted_index":{"Commercial":[0],"Android":[1,91,99],"packers":[2,148],"have":[3,61,149],"been":[4],"widely":[5],"used":[6],"by":[7,31,123,133],"developers":[8],"as":[9,26],"a":[10,76],"way":[11],"to":[12,45,80,116,128,168],"protect":[13],"their":[14,178],"apps":[15,37,100,131],"from":[16],"being":[17],"tampered":[18],"with.":[19],"However,":[20],"app":[21,68,147],"packer":[22],"is":[23,42,49],"usually":[24],"provided":[25],"an":[27],"online":[28],"service":[29],"developed":[30],"security":[32],"vendors,":[33],"and":[34,54,159,162,172],"the":[35,52,59,64,82,90,95,118,139],"packed":[36,50],"are":[38,113],"well":[39],"protected.":[40],"It":[41],"thus":[43],"hard":[44],"know":[46],"what":[47],"exactly":[48],"in":[51,58],"app,":[53],"few":[55],"existing":[56,143],"studies":[57],"community":[60],"systematically":[62],"analyzed":[63],"behaviors":[65,84,97,121,152],"of":[66,85,98,142],"commercial":[67,86,135,144],"packers.":[69,87,124,145],"In":[70],"this":[71],"paper,":[72],"we":[73,137],"propose":[74],"PackDiff,":[75],"dynamic":[77],"analysis":[78],"system":[79,103],"inspect":[81],"fine-grained":[83],"By":[88,125],"instrumenting":[89],"system,":[92],"PackDiff":[93,127],"records":[94],"runtime":[96],"(e.g.,":[101,153],"Linux":[102],"call":[104],"invocations,":[105],"Java":[106],"API":[107],"calls,":[108],"Binder":[109],"interactions,":[110],"etc.),":[111],"which":[112,175],"further":[114],"processed":[115],"pinpoint":[117],"additional":[119],"sensitive":[120,155],"introduced":[122,150],"applying":[126],"roughly":[129],"200":[130],"protected":[132],"seven":[134],"packers,":[136],"observe":[138],"disappointing":[140],"facts":[141],"Most":[146],"unnecessary":[151],"accessing":[154],"data),":[156],"serious":[157],"performance":[158],"compatibility":[160],"issues,":[161],"they":[163],"can":[164],"even":[165],"be":[166],"abused":[167],"create":[169],"evasive":[170],"malware":[171],"repackaged":[173],"apps,":[174],"contradicts":[176],"with":[177],"design":[179],"purposes.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
