Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications. Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., & Song, D. In Proc. of the Ninth Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, 2012. biblatexdata[quality=1] bibtex: Hanna2012bibtex @inproceedings{hanna_juxtapp:_2012,
title = {Juxtapp: {A} {Scalable} {System} for {Detecting} {Code} {Reuse} {Among} {Android} {Applications}.},
booktitle = {Proc. of the {Ninth} {Conf}. on {Detection} of {Intrusions} and {Malware} \& {Vulnerability} {Assessment}},
author = {Hanna, Steve and Huang, Ling and Wu, Edward and Li, Saung and Chen, Charles and Song, Dawn},
year = {2012},
note = {biblatexdata[quality=1]
bibtex: Hanna2012},
keywords = {bdiff\_, program analysis, software similarity}
}
Downloads: 0
{"_id":"b6EnaCgN82B9NmXz3","bibbaseid":"hanna-huang-wu-li-chen-song-juxtappascalablesystemfordetectingcodereuseamongandroidapplications-2012","downloads":0,"creationDate":"2016-10-15T13:23:23.166Z","title":"Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications.","author_short":["Hanna, S.","Huang, L.","Wu, E.","Li, S.","Chen, C.","Song, D."],"year":2012,"bibtype":"inproceedings","biburl":"http://bibbase.org/zotero/pentarious","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Juxtapp: A Scalable System for Detecting Code Reuse Among Android Applications.","booktitle":"Proc. of the Ninth Conf. on Detection of Intrusions and Malware & Vulnerability Assessment","author":[{"propositions":[],"lastnames":["Hanna"],"firstnames":["Steve"],"suffixes":[]},{"propositions":[],"lastnames":["Huang"],"firstnames":["Ling"],"suffixes":[]},{"propositions":[],"lastnames":["Wu"],"firstnames":["Edward"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Saung"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Charles"],"suffixes":[]},{"propositions":[],"lastnames":["Song"],"firstnames":["Dawn"],"suffixes":[]}],"year":"2012","note":"biblatexdata[quality=1] bibtex: Hanna2012","keywords":"bdiff_, program analysis, software similarity","bibtex":"@inproceedings{hanna_juxtapp:_2012,\n\ttitle = {Juxtapp: {A} {Scalable} {System} for {Detecting} {Code} {Reuse} {Among} {Android} {Applications}.},\n\tbooktitle = {Proc. of the {Ninth} {Conf}. on {Detection} of {Intrusions} and {Malware} \\& {Vulnerability} {Assessment}},\n\tauthor = {Hanna, Steve and Huang, Ling and Wu, Edward and Li, Saung and Chen, Charles and Song, Dawn},\n\tyear = {2012},\n\tnote = {biblatexdata[quality=1] \nbibtex: Hanna2012},\n\tkeywords = {bdiff\\_, program analysis, software similarity}\n}\n\n","author_short":["Hanna, S.","Huang, L.","Wu, E.","Li, S.","Chen, C.","Song, D."],"key":"hanna_juxtapp:_2012","id":"hanna_juxtapp:_2012","bibbaseid":"hanna-huang-wu-li-chen-song-juxtappascalablesystemfordetectingcodereuseamongandroidapplications-2012","role":"author","urls":{},"keyword":["bdiff_","program analysis","software similarity"],"downloads":0},"search_terms":["juxtapp","scalable","system","detecting","code","reuse","android","applications","hanna","huang","wu","li","chen","song"],"keywords":["bdiff_","program analysis","software similarity"],"authorIDs":[],"dataSources":["QiRZ7m7shEMvADZkd"]}