{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2015:3PH6ILFXWU3JE7FIBHJFFMVQ66","short_pith_number":"pith:3PH6ILFX","schema_version":"1.0","canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","source":{"kind":"arxiv","id":"1511.06554","version":1},"attestation_state":"computed","paper":{"title":"An Investigation into the Use of Common Libraries in Android Apps","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Jacques Klein, Li Li, Tegawend\\'e F. Bissyand\\'e, Yves Le Traon","submitted_at":"2015-11-20T10:49:27Z","abstract_excerpt":"The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part of the functionality delivered by the app. Such code is often contributed by the common libraries which are used pervasively by all apps. Unfortunately, Android analyses, e.g., for piggybacking detection and malware detection, can produce inaccurate results if they do not take into account the case of library code, which constitute noise in app features. Despite some efforts on investigat"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1511.06554","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-11-20T10:49:27Z","cross_cats_sorted":[],"title_canon_sha256":"96f86a21173ca3ef1bebcc87ef11c60718c3e08a7884468282b44836d0ed95ea","abstract_canon_sha256":"0f85e906627da05019d1f38e7bbcbe5326f3f38c66d3265cebfed971180ea709"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:26:24.286151Z","signature_b64":"sPjk9eZtUxcOW30sQH1lAwBFJACON6KB8MnED779YSaJzk+fRnW+Sbnd+/8mK0cpJBFH0EfeA+7hU014LZMUAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"dbcfe42cb7b536927ca809d252b2b0f7b72273eb1c6fab4a0e6ddee0bb2e491e","last_reissued_at":"2026-05-18T01:26:24.285648Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:26:24.285648Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"An Investigation into the Use of Common Libraries in Android Apps","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Jacques Klein, Li Li, Tegawend\\'e F. Bissyand\\'e, Yves Le Traon","submitted_at":"2015-11-20T10:49:27Z","abstract_excerpt":"The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part of the functionality delivered by the app. Such code is often contributed by the common libraries which are used pervasively by all apps. Unfortunately, Android analyses, e.g., for piggybacking detection and malware detection, can produce inaccurate results if they do not take into account the case of library code, which constitute noise in app features. Despite some efforts on investigat"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.06554","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1511.06554","created_at":"2026-05-18T01:26:24.285706+00:00"},{"alias_kind":"arxiv_version","alias_value":"1511.06554v1","created_at":"2026-05-18T01:26:24.285706+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.06554","created_at":"2026-05-18T01:26:24.285706+00:00"},{"alias_kind":"pith_short_12","alias_value":"3PH6ILFXWU3J","created_at":"2026-05-18T12:29:02.477457+00:00"},{"alias_kind":"pith_short_16","alias_value":"3PH6ILFXWU3JE7FI","created_at":"2026-05-18T12:29:02.477457+00:00"},{"alias_kind":"pith_short_8","alias_value":"3PH6ILFX","created_at":"2026-05-18T12:29:02.477457+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66","json":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66.json","graph_json":"https://pith.science/api/pith-number/3PH6ILFXWU3JE7FIBHJFFMVQ66/graph.json","events_json":"https://pith.science/api/pith-number/3PH6ILFXWU3JE7FIBHJFFMVQ66/events.json","paper":"https://pith.science/paper/3PH6ILFX"},"agent_actions":{"view_html":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66","download_json":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66.json","view_paper":"https://pith.science/paper/3PH6ILFX","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1511.06554&json=true","fetch_graph":"https://pith.science/api/pith-number/3PH6ILFXWU3JE7FIBHJFFMVQ66/graph.json","fetch_events":"https://pith.science/api/pith-number/3PH6ILFXWU3JE7FIBHJFFMVQ66/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/action/timestamp_anchor","attest_storage":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/action/storage_attestation","attest_author":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/action/author_attestation","sign_citation":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/action/citation_signature","submit_replication":"https://pith.science/pith/3PH6ILFXWU3JE7FIBHJFFMVQ66/action/replication_record"}},"created_at":"2026-05-18T01:26:24.285706+00:00","updated_at":"2026-05-18T01:26:24.285706+00:00"}