Page 326 - 《软件学报》2024年第6期
P. 326

2902                                                       软件学报  2024  年第  35  卷第  6  期


                 [22]  Li L, Bissyandé TF, Klein J, Traon YL. An investigation into the use of common libraries in Android APPs. In: Proc. of the 23rd IEEE Int’l
                     Conf. on Software Analysis, Evolution, and Reengineering (SANER). Osaka: IEEE, 2016. 403–414. [doi: 10.1109/SANER.2016.52]
                 [23]  Zhong  H,  Wang  XY.  Boosting  complete-code  tool  for  partial  program.  In:  Proc.  of  the  32nd  IEEE/ACM  Int ’l  Conf.  on  Automated
                     Software Engineering (ASE). Urbana: IEEE, 2017. 671–681. [doi: 10.1109/ASE.2017.8115677]
                 [24]  Lin JL, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J. Expectation and purpose: Understanding users’ mental models of mobile APP
                     privacy through crowdsourcing. In: Proc. of the 2012 ACM Conf. on Ubiquitous Computing. Pittsburgh: Association for Computing
                     Machinery, 2012. 501–510. [doi: 10.1145/2370216.2370290]
                 [25]  Crussell J, Gibler C, Chen H. AnDarwin: Scalable detection of Android application clones based on semantics. IEEE Trans. on Mobile
                     Computing, 2015, 14(10): 2007–2019. [doi: 10.1109/TMC.2014.2381212]
                 [26]  Wang HY, Guo Y, Ma ZA, Chen XQ. Automated detection and classification of third-party libraries in large scale Android APPs. Ruan
                     Jian Xue Bao/Journal of Software, 2017, 28(6): 1373–1388 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5221.
                     htm [doi: 10.13328/j.cnki.jos.005221]
                 [27]  Li MH, Wang P, Wang W, Wang S, Wu DH, Liu J, Xue R, Huo W, Zou W. Large-scale third-party library detection in Android markets.
                     IEEE Trans. on Software Engineering, 2020, 46(9): 981–1003. [doi: 10.1109/TSE.2018.2872958]
                 [28]  Wang Y, Wu HW, Zhang HL, Rountev A. Orlis: Obfuscation-resilient library detection for Android. In: Proc. of the 5th Int’l Conf. on
                     Mobile Software Engineering and Systems. Gothenburg: Association for Computing Machinery, 2018. 13–23. [doi: 10.1145/3197231.
                             徐建(1979-), 男, 博士, 教授, 博士生导师, CCF
                     3197248]
                 [29]  Tang W, Luo P, Fu JL, Zhang D. LibDX: A cross-platform and accurate system to detect third-party libraries in binary code. In: Proc. of
                     the 27th IEEE Int’l Conf. on Software Analysis, Evolution and Reengineering (SANER). London: IEEE, 2020. 104–115. [doi: 10.1109/
                     SANER48275.2020.9054845]
                 [30]  Soh C, Tan HBK, Arnatovich YL, Narayanan A, Wang LP. LibSift: Automated detection of third-party libraries in Android applications.
                     In: Proc. of the 23rd Asia-Pacific Software Engineering Conf. Hamilton: IEEE, 2016. 41–48. [doi: 10.1109/APSEC.2016.017]
                 [31]  Glanz L, Amann S, Eichberg M, Reif M, Hermann B, Lerch J, Mezini M. CodeMatch: Obfuscation won’t conceal your repackaged app.
                     In: Proc. of the 11th Joint Meeting on Foundations of Software Engineering. Paderborn: Association for Computing Machinery, 2017.
                     638–648. [doi: 10.1145/3106237.3106305]
                 [32]  Tang ZS, Xue MH, Meng GZ, Ying CG, Liu YG, He JA, Zhu HJ, Liu Y. Securing Android applications via edge assistant third-party
                     library detection. Computers & Security, 2019, 80: 257–272. [doi: 10.1016/j.cose.2018.07.024]
                 [33]  Huang  SR,  Tao  FF,  Zhang  Y,  Yang  M.  LibSeeker:  Detecting  Android  third-party  libraries  using  parameter  auto-tuning.  Journal  of
                     Chinese Computer Systems, 2019, 40(2): 332–340 (in  Chinese  with  English  abstract). [doi: 10.3969/j.issn.1000-1220.2019.02.017]
                 [34]  Wang Y, Rountev A. Who Changed You? Obfuscator identification for Android. In: Proc. of the 4th IEEE/ACM Int’l Conf. on Mobile
                     Software Engineering and Systems (MOBILESoft). Buenos Aires: IEEE, 2017. 154–164. [doi: 10.1109/MOBILESoft.2017.18]
                 [35]  Wang P, Bao QK, Wang L, Wang S, Chen ZF, Wei T, Wu DH. Software protection on the go: A large-scale empirical study on mobile
                     APP obfuscation. In: Proc. of the 40th Int’l Conf. on Software Engineering. Gothenburg: Association for Computing Machinery, 2018.
                     26–36. [doi: 10.1145/3180155.3180169]

                 附中文参考文献:
                 [26]  王浩宇, 郭耀, 马子昂, 陈向群. 大规模移动应用第三方库自动检测和分类方法. 软件学报, 2017, 28(6): 1373–1388. http://www.jos.
                     org.cn/1000-9825/5221.htm [doi: 10.13328/j.cnki.jos.005221]
                 [33]  黄思荣, 陶非凡, 张源, 杨珉. LibSeeker: 参数自整定的安卓应用第三方库检测方法. 小型微型计算机系统, 2019, 40(2): 332–340.
                     [doi: 10.3969/j.issn.1000-1220.2019.02.017]

                                                                          袁倩婷(1994-), 女, 硕士, 主要研究领域为软件
                            专业会员, 主要研究领域为软件分析, 智能运维,                     分析, 数据挖掘.
                            数据挖掘.
   321   322   323   324   325   326   327   328   329   330   331