Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark

Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 appr...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on software engineering Vol. 47; no. 4; pp. 676 - 693
Main Authors Li, Li, Bissyande, Tegawende F., Klein, Jacques
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2021
IEEE Computer Society
Subjects
Online AccessGet full text
ISSN0098-5589
1939-3520
2326-3881
1939-3520
DOI10.1109/TSE.2019.2901679

Cover

Abstract Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 approaches which do not readily scale to millions of apps or are only evaluated on private datasets without, in general, tool support available to the community. Through a systematic literature review of the subject, we argue that the research is slowing down, where many state-of-the-art approaches have reported high-performance rates on closed datasets, which are unfortunately difficult to replicate and to compare against. In this work, we propose to reboot the research in repackaged app detection by providing a literature review that summarises the challenges and current solutions for detecting repackaged apps and by providing a large dataset that supports replications of existing solutions and implications of new research directions. We hope that these contributions will re-activate the direction of detecting repackaged apps and spark innovative approaches going beyond the current state-of-the-art.
AbstractList Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices, and increases the workload of market maintainers. In the space of six years, the research around this specific issue has produced 57 approaches which do not readily scale to millions of apps or are only evaluated on private datasets without, in general, tool support available to the community. Through a systematic literature review of the subject, we argue that the research is slowing down, where many state-of-the-art approaches have reported high-performance rates on closed datasets, which are unfortunately difficult to replicate and to compare against. In this work, we propose to reboot the research in repackaged app detection by providing a literature review that summarises the challenges and current solutions for detecting repackaged apps and by providing a large dataset that supports replications of existing solutions and implications of new research directions. We hope that these contributions will re-activate the direction of detecting repackaged apps and spark innovative approaches going beyond the current state-of-the-art.
Author Li, Li
Klein, Jacques
Bissyande, Tegawende F.
Author_xml – sequence: 1
  givenname: Li
  orcidid: 0000-0003-2990-1614
  surname: Li
  fullname: Li, Li
  email: li.li@monash.edu
  organization: Faculty of Information Technology, Monash University, Clayton, VIC, Australia
– sequence: 2
  givenname: Tegawende F.
  orcidid: 0000-0001-7270-9869
  surname: Bissyande
  fullname: Bissyande, Tegawende F.
  email: tegawende.bissyande@uni.lu
  organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg
– sequence: 3
  givenname: Jacques
  orcidid: 0000-0003-4052-475X
  surname: Klein
  fullname: Klein, Jacques
  email: jacques.klein@uni.lu
  organization: Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg
BookMark eNp9kM1LAzEQxYMo2FbvgpcFz1uTZtPdeKtaP6Ag-AHelkl2to3WZE1Sxf_elBYPCsLAwPDem8evT3ats0jIEaNDxqg8fXyYDkeUyeFIUjYu5Q7pMcllzsWI7pIepbLKhajkPumH8EIpFWUpeuT5HpVz0dh5do8BwetF5mx2iRH19tqBfoU5NtnENt6ZtLsunGUzE9FDXHlMmg-DnxnYJjtHqxdv4F8PyF4Ly4CH2z0gT1fTx4ubfHZ3fXsxmeWacx7zFjTySqVRjaYMFAqqigaERI1KMtUqCY0slYZGS6Aai7bgIBpWpgMWfEDYJndlO_j6hOWy7rxJDb5qRus1mjoGrNdo6i2a5DnZeDrv3lcYYv3iVt6mmvVIMFElZGORVHSj0t6F4LH9E5yY_w4e_7JoEyEaZ6MHs_zPeLwxGkT8-VOlFgWV_BtkqZFA
CODEN IESEDJ
CitedBy_id crossref_primary_10_3233_JCS_191313
crossref_primary_10_1109_ACCESS_2019_2944684
crossref_primary_10_1007_s10664_019_09760_3
crossref_primary_10_1109_TDSC_2024_3358979
crossref_primary_10_1109_TSE_2023_3236582
crossref_primary_10_1109_JIOT_2020_2981693
crossref_primary_10_26599_TST_2023_9010005
crossref_primary_10_1109_ACCESS_2024_3351945
crossref_primary_10_1145_3544968
crossref_primary_10_1016_j_cose_2020_101993
crossref_primary_10_1016_j_jisa_2023_103527
crossref_primary_10_1007_s12652_021_03023_0
crossref_primary_10_1016_j_eswa_2022_118705
crossref_primary_10_1109_TSE_2021_3114381
crossref_primary_10_1109_TDSC_2022_3178181
crossref_primary_10_1016_j_ins_2020_03_036
crossref_primary_10_1109_TSE_2021_3115506
crossref_primary_10_1007_s11390_021_1659_3
Cites_doi 10.1109/TMC.2014.2381212
10.1145/2568225.2568286
10.1109/AsiaJCIS.2012.18
10.1145/2642937.2642977
10.1109/ICSE.2017.38
10.1007/978-3-642-38908-5_13
10.1145/2931037.2931043
10.1109/ICSE.2007.30
10.1109/TIFS.2017.2656460
10.1007/978-3-319-24177-7_15
10.1145/2591971.2592003
10.1109/SANER.2016.52
10.1145/2983574
10.1145/2766498.2766508
10.1145/2556464.2556467
10.1016/j.scico.2009.02.007
10.1145/2133601.2133640
10.1587/transinf.2016ICP0012
10.1109/SPW.2016.33
10.1109/ICPC.2017.16
10.1145/1150402.1150522
10.1007/s11277-013-1258-x
10.1145/2771783.2771795
10.1145/3196398.3196412
10.1109/ICPC.2012.6240477
10.1016/j.jss.2006.07.009
10.1016/j.infsof.2017.04.001
10.1109/EISIC.2012.34
10.1145/2627393.2627395
10.1145/3151137.3151138
10.1109/TrustCom.2013.25
10.1145/2484313.2484315
10.1145/3106237.3106305
10.1016/j.cose.2013.08.010
10.1155/2017/6958698
10.1007/s10515-015-0182-6
10.1109/ICSM.1998.738528
10.1145/2751323.2751330
10.1109/ACSAC.2008.22
10.1109/ISSRE.2018.00031
10.1109/HICSS.2012.114
10.1109/SAI.2015.7237151
10.1007/978-3-319-45719-2_11
10.1145/2976749.2978333
10.1007/978-3-642-28166-2_11
10.1109/TrustCom.2016.0104
10.1109/ICPC.2016.7503721
10.1002/cpe.3447
10.1007/978-3-319-47560-8_9
10.1109/WCRE.1995.514697
10.1109/MS.2013.142
10.1109/ICPC.2015.25
10.1145/3106237.3121277
10.1109/ICPC.2011.26
10.1145/2931037.2931044
10.1145/2664243.2664275
10.1145/2568225.2568324
10.1145/2435349.2435378
10.1145/2597073.2597109
10.1145/2557547.2557558
10.1007/978-3-540-73547-2_48
10.1109/TDSC.2017.2745575
10.1109/ICSAI.2016.7811010
10.1109/DICTAP.2016.7544005
10.1007/s11623-013-0300-1
10.1109/TIFS.2017.2687880
10.1145/2435349.2435377
10.1007/978-3-319-26362-5_17
10.1007/978-3-319-30806-7_6
10.1007/978-3-319-04283-1_13
10.1109/79.543975
10.1002/sec.1170
10.1109/TSE.2009.16
10.1109/TR.2018.2865733
10.1109/Trustcom/BigDataSE/ICESS.2017.230
10.1145/2523514.2523539
10.1007/s11390-015-1573-7
10.1016/j.jisa.2014.10.011
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2021
Copyright_xml – notice: Copyright IEEE Computer Society 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
K9.
ADTOC
UNPAY
DOI 10.1109/TSE.2019.2901679
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
ProQuest Health & Medical Complete (Alumni)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
ProQuest Health & Medical Complete (Alumni)
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Health & Medical Complete (Alumni)
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1939-3520
EndPage 693
ExternalDocumentID oai:orbilu.uni.lu:10993/41965
10_1109_TSE_2019_2901679
8653409
Genre orig-research
GrantInformation_xml – fundername: University of Luxembourg, under the VulFix project
– fundername: Monash-Warwick Alliance Catalyst Fund (2018/2019)
– fundername: European Union, under the SPARTA project
– fundername: Fonds National de la Recherche, Luxembourg
  grantid: CHARACTERIZE C17/IS/11693861; Recommend C15/IS/10449467
  funderid: 10.13039/501100001866
GroupedDBID --Z
-DZ
-~X
.DC
0R~
29I
4.4
5GY
6IK
85S
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFO
ACGOD
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BKOMP
BPEOZ
CS3
DU5
EBS
EDO
EJD
HZ~
I-F
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
Q2X
RIA
RIE
RNS
RXW
S10
TAE
TN5
TWZ
UHB
UPT
WH7
YZZ
AAYXX
CITATION
JQ2
K9.
.4S
3EH
5VS
7WY
7X7
88E
88I
8FE
8FG
8FI
8FJ
8FL
8G5
9M8
ABFSI
ABJCF
ABUWG
ADBBV
ADTOC
AETIX
AFKRA
AGSQL
AI.
AIBXA
ALLEH
ARAPS
ARCSS
AZQEC
BENPR
BEZIV
BGLVJ
BPHCQ
BVXVI
CCPQU
DWQXO
E.L
FRNLG
FYUFA
GNUQQ
GROUPED_ABI_INFORM_RESEARCH
GUQSH
HCIFZ
HMCUK
H~9
IBMZZ
ICLAB
IFJZH
ITG
ITH
K60
K6V
K6~
K7-
L6V
M0C
M1P
M1Q
M2O
M2P
M7S
OHT
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PSQYO
PTHSS
RNI
RZB
UKHRP
UNPAY
UQL
VH1
XOL
YYP
ZCG
ID FETCH-LOGICAL-c333t-face38b38bbdc01abe50b4da59eceb91bfb9ad97bcadc9a0ce4f43a5d17adce43
IEDL.DBID UNPAY
ISSN 0098-5589
1939-3520
2326-3881
IngestDate Sun Oct 26 04:15:47 EDT 2025
Fri Oct 03 04:11:35 EDT 2025
Wed Oct 01 02:36:04 EDT 2025
Thu Apr 24 22:57:07 EDT 2025
Wed Aug 27 02:30:54 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
cc-by-nc-sa
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c333t-face38b38bbdc01abe50b4da59eceb91bfb9ad97bcadc9a0ce4f43a5d17adce43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7270-9869
0000-0003-4052-475X
0000-0003-2990-1614
OpenAccessLink https://proxy.k.utb.cz/login?url=http://orbilu.uni.lu/handle/10993/41965
PQID 2515852065
PQPubID 21418
PageCount 18
ParticipantIDs crossref_primary_10_1109_TSE_2019_2901679
crossref_citationtrail_10_1109_TSE_2019_2901679
proquest_journals_2515852065
unpaywall_primary_10_1109_tse_2019_2901679
ieee_primary_8653409
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-04-01
PublicationDateYYYYMMDD 2021-04-01
PublicationDate_xml – month: 04
  year: 2021
  text: 2021-04-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on software engineering
PublicationTitleAbbrev TSE
PublicationYear 2021
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref57
ref56
ref59
ref55
gibler (ref1) 2013
(ref79) 2016
ref51
chen (ref41) 2015
keele (ref13) 9
ref46
cochran (ref94) 1977
ref45
ref48
ref42
li (ref3) 2016
ref44
ref43
yang (ref85) 2015
ref49
ref8
ref7
ref9
allix (ref11) 2016
ref100
ref101
ref35
ref34
ref37
ref31
ref30
ref33
ref32
hanna (ref71) 2012
(ref90) 2016
ref39
ref38
ruiz (ref58) 2014; 31
roy (ref83) 2007
crussell (ref2) 2012
ref24
ref23
ref26
li (ref97) 2019
ref25
ref20
gonzalez (ref50) 2014
ref22
ref21
ref28
ref27
ref29
israel (ref95) 1992
zhauniarovich (ref53) 2014
lindorfer (ref47) 2014
gibler (ref60) 2013
ref15
ref14
ref96
ref99
(ref5) 2016
ref98
ref10
crussell (ref61) 2013
ref16
ref19
cesare (ref105) 2013; 127
ref18
desnos (ref74) 2011
jiao (ref40) 2015
ref91
kolter (ref106) 2006; 7
ref89
ref86
ref88
ref87
li (ref12) 2017
sun (ref52) 2014
kitchenham (ref17) 2004
ref82
ref81
ref84
ref108
ref78
ref109
gonzalez (ref36) 2015
ref107
ref75
ref104
ref77
ref102
ref103
(ref80) 2016
li (ref93) 2015
ref70
ref73
ref72
ref110
ref68
ref67
ref69
ref64
ref63
ref66
ref65
ankeny (ref4) 2012
(ref6) 2016
sebastián (ref92) 2016
kywe (ref54) 2014
ref62
ma (ref76) 2016
References_xml – ident: ref46
  doi: 10.1109/TMC.2014.2381212
– ident: ref48
  doi: 10.1145/2568225.2568286
– ident: ref69
  doi: 10.1109/AsiaJCIS.2012.18
– ident: ref9
  doi: 10.1145/2642937.2642977
– ident: ref75
  doi: 10.1109/ICSE.2017.38
– year: 2016
  ident: ref3
  article-title: Ungrafting malicious code from piggybacked android apps
  publication-title: Tech Rep
– ident: ref81
  doi: 10.1007/978-3-642-38908-5_13
– ident: ref110
  doi: 10.1145/2931037.2931043
– ident: ref103
  doi: 10.1109/ICSE.2007.30
– ident: ref96
  doi: 10.1109/TIFS.2017.2656460
– start-page: 468
  year: 2016
  ident: ref11
  article-title: AndroZoo: Collecting Millions of Android Apps for the Research Community
  publication-title: 2016 IEEE/ACM 13th Conference on Mining Software Repositories (MSR)
– ident: ref86
  doi: 10.1007/978-3-319-24177-7_15
– ident: ref56
  doi: 10.1145/2591971.2592003
– year: 2016
  ident: ref5
  article-title: Ustwo games
– ident: ref31
  doi: 10.1109/SANER.2016.52
– start-page: 142
  year: 2014
  ident: ref52
  article-title: Detecting code reuse in android applications using component-based control flow graph
  publication-title: Proc IFIP Int Inf Security Conf
– ident: ref99
  doi: 10.1145/2983574
– start-page: 659
  year: 2015
  ident: ref41
  article-title: Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
  publication-title: Proc 24th USENIX Conf Security Symp
– ident: ref39
  doi: 10.1145/2766498.2766508
– year: 2017
  ident: ref12
  article-title: Androzoo++: Collecting millions of android apps and their metadata for the research community
– ident: ref51
  doi: 10.1145/2556464.2556467
– ident: ref98
  doi: 10.1016/j.scico.2009.02.007
– ident: ref70
  doi: 10.1145/2133601.2133640
– ident: ref23
  doi: 10.1587/transinf.2016ICP0012
– ident: ref28
  doi: 10.1109/SPW.2016.33
– ident: ref24
  doi: 10.1109/ICPC.2017.16
– ident: ref82
  doi: 10.1145/1150402.1150522
– ident: ref7
  doi: 10.1007/s11277-013-1258-x
– ident: ref45
  doi: 10.1145/2771783.2771795
– start-page: 241
  year: 2014
  ident: ref54
  article-title: Detecting camouflaged applications on mobile application markets
  publication-title: Proc Int Conf Inf Security Cryptology
– ident: ref10
  doi: 10.1145/3196398.3196412
– ident: ref73
  doi: 10.1109/ICPC.2012.6240477
– ident: ref14
  doi: 10.1016/j.jss.2006.07.009
– ident: ref15
  doi: 10.1016/j.infsof.2017.04.001
– ident: ref108
  doi: 10.1109/EISIC.2012.34
– ident: ref59
  doi: 10.1145/2627393.2627395
– ident: ref26
  doi: 10.1145/3151137.3151138
– ident: ref65
  doi: 10.1109/TrustCom.2013.25
– start-page: 182
  year: 2013
  ident: ref61
  article-title: Andarwin: Scalable detection of semantically similar android applications
  publication-title: Proc Eur Symp Res Comput Security
– start-page: 653
  year: 2016
  ident: ref76
  article-title: LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps
  publication-title: 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C
– year: 9
  ident: ref13
  article-title: Guidelines for performing systematic literature reviews in software engineering
– start-page: 459
  year: 2013
  ident: ref60
  article-title: Adrob: Examining the landscape and impact of android application plagiarism
  publication-title: Proc 11th Annu Int Conf Mobile Syst Appl services
– ident: ref63
  doi: 10.1145/2484313.2484315
– ident: ref19
  doi: 10.1145/3106237.3106305
– start-page: 436
  year: 2014
  ident: ref50
  article-title: Droidkin: Lightweight detection of android apps similarity
  publication-title: Proc Int Conf Security Privacy Commun Syst
– ident: ref67
  doi: 10.1016/j.cose.2013.08.010
– ident: ref22
  doi: 10.1155/2017/6958698
– start-page: 280
  year: 2015
  ident: ref93
  article-title: IccTA: detecting inter-component privacy leaks in Android apps
  publication-title: Proceedings of the International Conference on Software Engineering ICSE'94
– year: 2016
  ident: ref79
  article-title: Dexguard
– ident: ref35
  doi: 10.1007/s10515-015-0182-6
– start-page: 37
  year: 2012
  ident: ref2
  article-title: Attack of the clones: Detecting cloned applications on android markets
  publication-title: Proc Eur Symp Res Comput Security
– ident: ref102
  doi: 10.1109/ICSM.1998.738528
– year: 2015
  ident: ref36
  article-title: Exploring reverse engineering symptoms in android apps
  publication-title: Proc 8th Eur Workshop Syst Security
  doi: 10.1145/2751323.2751330
– ident: ref109
  doi: 10.1109/ACSAC.2008.22
– ident: ref78
  doi: 10.1109/ISSRE.2018.00031
– ident: ref68
  doi: 10.1109/HICSS.2012.114
– ident: ref88
  doi: 10.1109/SAI.2015.7237151
– start-page: 230
  year: 2016
  ident: ref92
  article-title: Avclass: A tool for massive malware labeling
  publication-title: Proc Int Symp Res Attacks Intrusions Defenses
  doi: 10.1007/978-3-319-45719-2_11
– ident: ref77
  doi: 10.1145/2976749.2978333
– ident: ref72
  doi: 10.1007/978-3-642-28166-2_11
– start-page: 62
  year: 2012
  ident: ref71
  article-title: Juxtapp: A scalable system for detecting code reuse among android applications
  publication-title: Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment
– year: 2016
  ident: ref90
  article-title: Androguard: Reverse engineering, malware analysis of android applications
– year: 1992
  ident: ref95
  article-title: Determining sample size
  publication-title: Program Evaluation and Organizational Development IFAS University of Florida
– start-page: 349
  year: 2015
  ident: ref40
  article-title: A rapid and scalable method for android application repackaging detection
  publication-title: Proc Int Conf Inf Security Practice Experience
– start-page: 130
  year: 2014
  ident: ref53
  article-title: Fsquadra: Fast detection of repackaged applications
  publication-title: Proc IFIP Annu Conf Data Appl Security Privacy
– ident: ref34
  doi: 10.1109/TrustCom.2016.0104
– ident: ref27
  doi: 10.1109/ICPC.2016.7503721
– ident: ref42
  doi: 10.1002/cpe.3447
– ident: ref30
  doi: 10.1007/978-3-319-47560-8_9
– ident: ref101
  doi: 10.1109/WCRE.1995.514697
– volume: 31
  start-page: 78
  year: 2014
  ident: ref58
  article-title: A large scale empirical study on software reuse in mobile apps
  publication-title: IEEE Softw
  doi: 10.1109/MS.2013.142
– year: 2012
  ident: ref4
  article-title: Feds seize android app marketplaces applanet, appbucket in piracy sting
– ident: ref43
  doi: 10.1109/ICPC.2015.25
– ident: ref18
  doi: 10.1145/3106237.3121277
– start-page: 51
  year: 2014
  ident: ref47
  article-title: Andradar: Fast discovery of android applications in alternative markets
  publication-title: Detection of Intrusions and Malware and Vulnerability Assessment
– ident: ref89
  doi: 10.1109/ICPC.2011.26
– ident: ref84
  doi: 10.1145/2931037.2931044
– ident: ref57
  doi: 10.1145/2664243.2664275
– ident: ref100
  doi: 10.1145/2568225.2568324
– ident: ref64
  doi: 10.1145/2435349.2435378
– year: 2016
  ident: ref80
  article-title: Sandmark: A tool for the study of software protection algorithms
– ident: ref55
  doi: 10.1145/2597073.2597109
– year: 1977
  ident: ref94
  publication-title: Sampling Techniques
– year: 2007
  ident: ref83
  article-title: A survey on software clone detection research
– year: 2019
  ident: ref97
  article-title: Baseline approach for repackaged app detection: A supplement document of the research paper entitled "rebooting research on detecting repackaged android apps: Literature review and benchmark
– ident: ref49
  doi: 10.1145/2557547.2557558
– ident: ref107
  doi: 10.1007/978-3-540-73547-2_48
– ident: ref20
  doi: 10.1109/TDSC.2017.2745575
– ident: ref32
  doi: 10.1109/ICSAI.2016.7811010
– start-page: 431
  year: 2013
  ident: ref1
  article-title: Adrob: Examining the landscape and impact of android application plagiarism
  publication-title: Proc 11th Annu Int Conf Mobile Syst Appl Serv
– ident: ref29
  doi: 10.1109/DICTAP.2016.7544005
– start-page: 77
  year: 2011
  ident: ref74
  article-title: Android: From reversing to decompilation
  publication-title: Proc Black Hat Abu Dhabi
– ident: ref87
  doi: 10.1007/s11623-013-0300-1
– ident: ref8
  doi: 10.1145/2484313.2484315
– ident: ref21
  doi: 10.1109/TIFS.2017.2687880
– ident: ref66
  doi: 10.1145/2435349.2435377
– start-page: 359
  year: 2015
  ident: ref85
  article-title: Appspear: Bytecode decrypting and dex reassembling for packed android malware
  publication-title: Proc 18th Int Symp Res Attacks Intrusions Defenses
  doi: 10.1007/978-3-319-26362-5_17
– ident: ref33
  doi: 10.1007/978-3-319-30806-7_6
– volume: 127
  start-page: 197
  year: 2013
  ident: ref105
  article-title: Clonewise - detecting package-level clones using machine learning
  publication-title: Proc Int Conf Security Privacy Commun Netw
  doi: 10.1007/978-3-319-04283-1_13
– ident: ref91
  doi: 10.1109/79.543975
– ident: ref44
  doi: 10.1002/sec.1170
– ident: ref104
  doi: 10.1109/TSE.2009.16
– ident: ref16
  doi: 10.1109/TR.2018.2865733
– ident: ref25
  doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.230
– ident: ref62
  doi: 10.1145/2523514.2523539
– ident: ref38
  doi: 10.1007/s11390-015-1573-7
– ident: ref37
  doi: 10.1016/j.jisa.2014.10.011
– year: 2016
  ident: ref6
  article-title: Pokemon Go: New tampered apps & what you can do
– volume: 7
  start-page: 2721
  year: 2006
  ident: ref106
  article-title: Learning to detect and classify malicious executables in the wild
  publication-title: J Mach Learn Res
– year: 2004
  ident: ref17
  article-title: Procedures for performing systematic reviews
SSID ssj0005775
ssib053395008
Score 2.5488393
Snippet Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users' devices,...
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of their benefits, contributes to spreading malware on users’ devices,...
SourceID unpaywall
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 676
SubjectTerms Aging
Android
Applications programs
benchmark
Bibliographies
clone
Cloning
Datasets
Libraries
literature review
Literature reviews
Malware
repackaging
Systematics
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4tXMoFaAGxBSofegGR3QTbSXyEFoSqLgce0t6isT0RaJfsCrKq4Ndj51VoK1QpUiLLiZ2MnfnG83kG4Gto05TrRAQx5mkglJEBOlwfoNKkwhxzXiWDGV3E5zfix1iOe3DY7YUhoop8RgN_Wfny7cws_FLZMI0lF3633lKSxvVerd90jiSRbXxMKVPVuiRDNby-OvUcLjXwPsPYk7ZeqaAqp8obePlhUczx6RdOp680zdkajNo-1gSTyWBR6oF5_iN84_--xDqsNpCTHddj5CP0qPgEa206B9bM7g0YX3rPqadBs5aPx2YF-07ez1CXOgN74n5Alnke5OzOneeuK-xnF5uZ1b4GhoVlJ-6xt_f4MNmEm7PT62_nQZN4ITCc8zLI0RBPtTu0NWGEmmSohUWpyJBWkc61QqsSbdAahaEhkQuO0kaJKyDBt2C5mBW0DQwxj5watjyXJBw2RoHcWXmJ5dZERmIfhq0sMtNEJffJMaZZZZ2EKnPSy7z0skZ6fdjv7pjXETneqbvhBdDVa759H3ZbcWfNlH3MHNBzptORg2R9OOiGwF9NlI_0ponP_25iB1aOPPul4vjswnL5sKA9B19K_aUaty_je-30
  priority: 102
  providerName: IEEE
Title Rebooting Research on Detecting Repackaged Android Apps: Literature Review and Benchmark
URI https://ieeexplore.ieee.org/document/8653409
https://www.proquest.com/docview/2515852065
http://orbilu.uni.lu/handle/10993/41965
UnpaywallVersion submittedVersion
Volume 47
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1939-3520
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005775
  issn: 0098-5589
  databaseCode: RIE
  dateStart: 19750101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fi9QwEB5070FfPPUUV88jD74oZNtukm7zeOodi-ghegvrU5n8KHds7S57LaJ_vZP-WO9QFKFQCNMmZZLmG77JNwAvYpdlwswkT7HIuNRWcSRcz1Ebr-MCC9EWg_lwls4X8t1SLX-JJK235rJsApM7KZuoExqIAnkjIhm0727DXqoIdI9gb3H28fjLoIipVFvsjtCI5gQp4rak3DTlIsuSgZyMdVRfBWXMRE8Ce5iG9K1rm1FbXeUG0LzTVBv8_g3L8tqec7oP8-HkTpdqspo0tZnYH38QcvzH59yHez3uZMfdRHkAt3z1EPaHmg6sX-IHsPwU6NOQC82GpDy2rthbH8iGrpWi7BX9hRwLyZDrS7pvaJjs_U6gmXWEA6OBsNf02ouvuF09gsXpyfmbOe-rL3ArhKh5gdaLzNBlnI0TNF7FRjpU2ltvdGIKo9HpmbHorMbYellIgcolM2rwUjyGUbWu_BNgiEVCe7EThfKSADJKFBTqzZxwNrEKxxANbshtL00eKmSUeRuixDo__3ySB8flvePG8HL3xKaT5fiL7UHw7M4uS5WgqHYMh4On837dXuWE9ih-mhIuG8Ornfd_64Lm0Y0unv6P8TO4Ow2JMW36zyGM6m3jnxOyqc1Re_zwqJ_bPwEkcvM2
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED8h9gAvMAaIDjb8wMumpU2w3cSP2wAV1vKwFalv0dm-aFO7tIJUaPvrZ-eLT01IkRJZTuzk7NzvfD_fARyFNkm4jkXQxywJhDIyQIfrA1SaVJhhxstkMKPL_uBKXEzkZAU-tXthiKgkn1HXX5a-fDs3S79U1kv6kgu_W--VFELIarfWHaEjjmUTIVPKRDVOyVD1xj9OPYtLdb3XsO9pW_eUUJlV5QHAXFvmC_xzi7PZPV1ztgmjppcVxWTaXRa6a_4-CuD40td4DRs16GSfq1GyBSuUv4HNJqEDq-f3Nky-e9-pJ0KzhpHH5jk7Ie9pqEqdiT11vyDLPBNy_sudF64rbNhGZ2aVt4FhbtkX99ifv_F6ugNXZ6fjr4OgTr0QGM55EWRoiCfaHdqaMEJNMtTColRkSKtIZ1qhVbE2aI3C0JDIBEdpo9gVkOC7sJrPc9oDhphFThFbnkkSDh2jQO7svNhyayIjsQO9RhapqeOS-_QYs7S0T0KVOumlXnppLb0OfGjvWFQxOf5Td9sLoK1Xf_sOHDTiTutJe5M6qOeMp2MHyjrwsR0CT5oobuhBE2-fb-IQ1gbj0TAdnl9-24f1Y8-FKRk_B7BaXC_pnQMzhX5fjuF_es3xQQ
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1da9RAFL3o9kFfrFrFrVXmwReF2SQ7M9nMY9WWRbSIdmF9Cnc-gmVjdtkmFP313snH2qIoQiAwTJIJdyZzLufmHIAXscsyYWaSp1hkXGqrOBKu56iN13GBhWjNYD6cpfOFfLdUy18iSeutuSibwOROyibqhAaiQN6ISAbtu9uwlyoC3SPYW5x9PP4yKGIq1ZrdERrRnCBF3FrKTVMusiwZyMlYR_VlUMZM9CSwh2ko37q2GbXuKjeA5p2m2uD3KyzLa3vO6T7Mhz93ulKT1aSpzcT--IOQ4z9e5z7c63EnO-4mygO45auHsD94OrB-iR_A8lOgT0MtNBuK8ti6Ym99IBu6VsqyV_QVciwUQ64v6LyhYbL3O4Fm1hEOjAbCXtNtv37D7eoRLE5Pzt_Mee--wK0QouYFWi8yQ4dxNk7QeBUb6VBpb73RiSmMRqdnxqKzGmPrZSEFKpfMqMFL8RhG1bryT4AhFgntxU4UyksCyChRUKo3c8LZxCocQzSEIbe9NHlwyCjzNkWJdX7--SQPgcv7wI3h5e6KTSfL8Ze-ByGyu35ZqgRltWM4GiKd9-v2Mie0R_nTlHDZGF7tov_bI2ge3XjE4f90fgp3p6Ewpi3_OYJRvW38M0I2tXnez-qfdmXyNQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Rebooting+Research+on+Detecting+Repackaged+Android+Apps%3A+Literature+Review+and+Benchmark&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=Li%2C+Li&rft.au=Bissyande%2C+Tegawende+F&rft.au=Klein%2C+Jacques&rft.date=2021-04-01&rft.pub=IEEE+Computer+Society&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=47&rft.issue=4&rft.spage=676&rft_id=info:doi/10.1109%2FTSE.2019.2901679&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon