{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:59:41Z","timestamp":1730213981446,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/dasc.2014.20","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T22:54:22Z","timestamp":1415832862000},"page":"63-68","source":"Crossref","is-referenced-by-count":9,"title":["Android App Protection via Interpretation Obfuscation"],"prefix":"10.1109","author":[{"given":"Junliang","family":"Shu","sequence":"first","affiliation":[]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ida pro","year":"0","key":"3"},{"journal-title":"Code and Documentation from Android's Vm Team","year":"0","key":"2"},{"journal-title":"Comprehensive Benchmark Suite for Android","year":"0","key":"10"},{"key":"1","first-page":"17","article-title":"Dalvik vm internals","volume":"23","author":"bornstein","year":"2008","journal-title":"Google I\/O Developer Conference"},{"journal-title":"Jad Java Decompiler","year":"0","key":"7"},{"journal-title":"Android From Reversing to Decompilation","year":"2011","author":"desnos","key":"6"},{"journal-title":"Dedexer","year":"2012","author":"paller","key":"5"},{"journal-title":"Smali-An Assembler\/disassembler for Android's Dex Format","year":"0","key":"4"},{"key":"9","article-title":"A study of android application security","volume":"2011","author":"enck","year":"2011","journal-title":"Proceedings of the 20th USENIX Security Symposium"},{"journal-title":"Java decompiler","year":"0","key":"8"}],"event":{"name":"2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)","start":{"date-parts":[[2014,8,24]]},"location":"Dalian, China","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6933235\/6945641\/06945305.pdf?arnumber=6945305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T03:08:32Z","timestamp":1490324912000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6945305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":10,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/dasc.2014.20","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}