Page 325 - 《软件学报》2024年第6期
P. 325

徐建 等: LibPass: 基于包结构和签名的第三方库检测方法                                                2901


                     2627393.2627404]
                  [2]  Wang HY, Hong J, Guo Y. Using text mining to infer the purpose of permission use in mobile APPs. In: Proc. of the 2015 ACM Int’l
                     Joint Conf. on Pervasive and Ubiquitous Computing. Osaka: Association for Computing Machinery, 2015. 1107–1118. [doi: 10.1145/
                     2750858.2805833]
                  [3]  Li  L,  Bissyandé  TF,  Klein  J.  SimiDroid:  Identifying  and  explaining  similarities  in  Android  APPs.  In:  Proc.  of  the  2017  IEEE
                     Trustcom/BigDataSE/ICESS. Sydney: IEEE, 2017. 136–143. [doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.230]
                  [4]  Zheng X, Pan L, Yilmaz E. Security analysis of modern mission critical Android mobile applications. In: Proc. of the 2017 Australasian
                     Computer Science Week Multiconference. Geelong: Association for Computing Machinery, 2017. 2. [doi: 10.1145/3014812.3014814]
                  [5]  Zhou W, Zhou YJ, Jiang XX, Ning P. Detecting repackaged smartphone applications in third-party Android marketplaces. In: Proc. of the
                     2nd ACM Conf. on Data and Application Security and Privacy. San Antonio: Association for Computing Machinery, 2012. 317–326.
                     [doi: 10.1145/2133601.2133640]
                  [6]  Hanna S, Huang L, Wu E, Li S, Chen C, Song D. Juxtapp: A scalable system for detecting code reuse among Android applications. In:
                     Proc. of the 9th Int’l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment. Heraklion: Springer, 2013. 62–81.
                     [doi: 10.1007/978-3-642-37300-8_4]
                  [7]  Grace MC, Zhou W, Jiang XX, Sadeghi AR. Unsafe exposure analysis of mobile in-APP advertisements. In: Proc. of the 5th ACM Conf.
                     ProGuard. 2021. https://www.guardsquare.com/en/products/proguard
                     on Security and Privacy in Wireless and Mobile Networks. Tucson: Association for Computing Machinery, 2012. 101–112. [doi: 10.1145/
                     2185448.2185464]
                  [8]  Book T, Pridgen A, Wallach DS. Longitudinal analysis of Android ad library permissions. arXiv:1303.0857, 2013.
                  [9]  Ma ZA, Wang HY, Guo Y, Chen XQ. LibRadar: Fast and accurate detection of third-party libraries in Android APPs. In: Proc. of the 38th
                     Int’l Conf. on Software Engineering Companion. Austin: Association for Computing Machinery, 2016. 653–656. [doi: 10.1145/2889160.
                     2889178]
                 [10]  Li MH, Wang W, Wang P, Wang S, Wu DH, Liu J, Xue R, Huo W. LibD: Scalable and precise third-party library detection in Android
                     markets. In: Proc. of the 39th Int’l Conf. on Software Engineering. Buenos Aires: IEEE, 2017. 335–346. [doi: 10.1109/icse.2017.38]
                 [11]  Wang HY, Guo Y, Ma ZA, Chen XQ. WuKong: A scalable and accurate two-phase approach to Android APP clone detection. In: Proc.
                     of the 2015 Int’l Symp. on Software Testing and Analysis. Baltimore: Association for Computing Machinery, 2015. 71–82. [doi: 10.1145/
                     2771783.2771795]
                 [12]  Narayanan A, Chen LH, Chan CK. AdDetect: Automated detection of Android ad libraries using semantic analysis. In: Proc. of the 9th
                     IEEE Int’l Conf. on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP). Singapore: IEEE, 2014. 1–6. [doi: 10.
                     1109/ISSNIP.2014.6827639]
                 [13]  Liu B, Liu B, Jin HX, Govindan R. Efficient privilege de-escalation for Ad libraries in mobile apps. In: Proc. of the 13th Annual Int’l
                     Conf. on Mobile Systems, Applications, and Services. Florence: Association for Computing Machinery, 2015. 89–103. [doi: 10.1145/
                     2742647.2742668]
                 [14]  Backes M, Bugiel S, Derr E. Reliable third-party library detection in Android and its security applications. In: Proc. of the 2016 ACM
                     SIGSAC Conf. on Computer and Communications Security. Vienna: Association for Computing Machinery, 2016. 356–367. [doi: 10.
                     1145/2976749.2978333]
                 [15]  Zhang, Y, Dai JR, Zhang XH, Huang SR, Yang ZM, Yang M, Chen H. Detecting third-party libraries in Android applications with high
                     precision and recall. In: Proc. of the 25th IEEE Int’l Conf. on Software Analysis, Evolution and Reengineering (SANER). Campobasso:
                     IEEE, 2018. 141–152. [doi: 10.1109/SANER.2018.8330204]
                 [16]  Zhang JX, Beresford AR, Kollmann SA. LibID: Reliable identification of obfuscated third-party Android libraries. In: Proc. of the 28th
                     ACM SIGSOFT Int’l Symp. on Software Testing and Analysis. Beijing: Association for Computing Machinery, 2019. 55–65. [doi: 10.
                     1145/3293882.3330563]
                 [17]
                 [18]  Allatori Obfuscator. 2021. http://www.allatori.com/
                 [19]  DashO. 2021. https://www.preemptive.com/products/dasho/overview
                 [20]  Hammad M, Garcia J, Malek S. A large-scale empirical study on the effects of code obfuscations on Android APPs and anti-malware
                     products. In: Proc. of the 40th Int’l Conf. on Software Engineering. Gothenburg: Association for Computing Machinery, 2018. 421–431.
                     [doi: 10.1145/3180155.3180228]
                 [21]  Chen K, Liu P, Zhang YJ. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. In:
                     Proc. of the 36th Int’l Conf. on Software Engineering. Hyderabad: Association for Computing Machinery, 2014. 175–186. [doi: 10.1145/
                     2568225.2568286]
   320   321   322   323   324   325   326   327   328   329   330