{"id":"https://openalex.org/W4410357236","doi":"https://doi.org/10.1145/3672608.3707860","title":"State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play Store","display_name":"State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play Store","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4410357236","doi":"https://doi.org/10.1145/3672608.3707860"},"language":"en","primary_location":{"id":"doi:10.1145/3672608.3707860","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672608.3707860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008718833","display_name":"Akila Niroshan","orcid":"https://orcid.org/0000-0002-5014-3961"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Akila Niroshan","raw_affiliation_strings":["Electrical Engineering and Telecommunication, University of New South Wales, Kensington, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Telecommunication, University of New South Wales, Kensington, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038376039","display_name":"Suranga Seneviratne","orcid":"https://orcid.org/0000-0002-5485-5595"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Suranga Seneviratne","raw_affiliation_strings":["Computer Science, University of Sydney, Camperdown, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Computer Science, University of Sydney, Camperdown, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031507494","display_name":"Aruna Seneviratne","orcid":"https://orcid.org/0000-0001-6894-7987"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aruna Seneviratne","raw_affiliation_strings":["Electrical Engineering and Telecommunication, University of New South Wales, Kensington, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Telecommunication, University of New South Wales, Kensington, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008718833"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":1.5863,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81752701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"592","last_page":"596"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9620409607887268},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6932637095451355},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6205524206161499},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.6002597808837891},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5353574752807617},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23341169953346252}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9620409607887268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6932637095451355},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6205524206161499},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.6002597808837891},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5353574752807617},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23341169953346252},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672608.3707860","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672608.3707860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.4099999964237213}],"awards":[{"id":"https://openalex.org/G5942617238","display_name":null,"funder_award_id":"DP220102520","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2186979752","https://openalex.org/W2734558754","https://openalex.org/W2794718534","https://openalex.org/W2913090618","https://openalex.org/W2962830343","https://openalex.org/W2962909855","https://openalex.org/W3002912819","https://openalex.org/W3004005939","https://openalex.org/W3042068230","https://openalex.org/W3096660718","https://openalex.org/W4385692162","https://openalex.org/W6925907242"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666"],"abstract_inverted_index":{"The":[0],"Android":[1,39],"ecosystem":[2],"faces":[3],"threats":[4],"such":[5,93],"as":[6,94],"app":[7],"repackaging,":[8],"counterfeiting,":[9],"and":[10,28,51,64,77,106],"piracy,":[11],"prompting":[12],"developers":[13,105],"to":[14,47,74],"adopt":[15],"code":[16],"obfuscation.":[17],"While":[18],"it":[19],"protects":[20],"legitimate":[21],"apps,":[22,92],"obfuscation":[23,54,71,86],"can":[24],"hinder":[25],"security":[26,107],"analysis":[27],"be":[29],"misused":[30],"for":[31,104],"malicious":[32],"purposes.":[33],"This":[34,97],"study":[35,100],"analyzes":[36],"over":[37],"500,000":[38],"APKs":[40],"from":[41,72],"Google":[42],"Play,":[43],"spanning":[44],"eight":[45],"years,":[46],"investigate":[48],"the":[49,80],"evolution":[50],"prevalence":[52],"of":[53],"techniques.":[55],"Using":[56],"custom":[57],"classifiers,":[58],"we":[59],"detect":[60],"obfuscated":[61],"code,":[62],"tools,":[63,84],"techniques,":[65],"revealing":[66],"a":[67],"13%":[68],"increase":[69],"in":[70,90],"2016":[73],"2023.":[75],"ProGuard":[76],"Allatori":[78],"are":[79],"most":[81],"commonly":[82],"used":[83],"with":[85],"being":[87],"particularly":[88],"common":[89],"gaming":[91],"Casino":[95],"games.":[96],"first":[98],"large-scale":[99],"provides":[101],"critical":[102],"insights":[103],"analysts.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
