{"id":"https://openalex.org/W3137792064","doi":"https://doi.org/10.1109/bigdata50022.2020.9377952","title":"Understanding and Mitigating Threats from Android Hybrid Apps Using Machine Learning","display_name":"Understanding and Mitigating Threats from Android Hybrid Apps Using Machine Learning","publication_year":2020,"publication_date":"2020-12-10","ids":{"openalex":"https://openalex.org/W3137792064","doi":"https://doi.org/10.1109/bigdata50022.2020.9377952","mag":"3137792064"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata50022.2020.9377952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9377952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060198895","display_name":"Ashish Kumar Singh","orcid":"https://orcid.org/0000-0003-3856-2896"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"A K Singh","raw_affiliation_strings":["dept, of CSIS, BITS Pilani, India"],"affiliations":[{"raw_affiliation_string":"dept, of CSIS, BITS Pilani, India","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053105431","display_name":"Navneet Goyal","orcid":"https://orcid.org/0000-0002-0006-8211"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Navneet Goyal","raw_affiliation_strings":["dept, of CSIS, BITS Pilani, India"],"affiliations":[{"raw_affiliation_string":"dept, of CSIS, BITS Pilani, India","institution_ids":["https://openalex.org/I74796645"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060198895"],"corresponding_institution_ids":["https://openalex.org/I74796645"],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57472021,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.9086524248123169},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.6924742460250854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.678878128528595},{"id":"https://openalex.org/keywords/android-beam","display_name":"Android Beam","score":0.5463373064994812},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5370520353317261},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5348113775253296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4290025234222412},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3828316032886505}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.9086524248123169},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.6924742460250854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.678878128528595},{"id":"https://openalex.org/C65902250","wikidata":"https://www.wikidata.org/wiki/Q4759452","display_name":"Android Beam","level":3,"score":0.5463373064994812},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5370520353317261},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5348113775253296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4290025234222412},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3828316032886505}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata50022.2020.9377952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9377952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W36948825","https://openalex.org/W2109676405","https://openalex.org/W2535838896","https://openalex.org/W2606064939","https://openalex.org/W2620844046","https://openalex.org/W2754689772","https://openalex.org/W2766169223","https://openalex.org/W2774305940","https://openalex.org/W2778171139","https://openalex.org/W2792117458","https://openalex.org/W2808406842","https://openalex.org/W2888390988","https://openalex.org/W2945430668","https://openalex.org/W3106490093","https://openalex.org/W4297687186","https://openalex.org/W6601484750","https://openalex.org/W6729007826"],"related_works":["https://openalex.org/W2114381667","https://openalex.org/W2808406842","https://openalex.org/W1565885216","https://openalex.org/W2354350616","https://openalex.org/W771153674","https://openalex.org/W2387651243","https://openalex.org/W2151339002","https://openalex.org/W2258874213","https://openalex.org/W2474415876","https://openalex.org/W2339936825"],"abstract_inverted_index":{"The":[0],"Android":[1,33,39,60,72,76,81,95,108,153,182,210,217,244],"platform":[2,10],"has":[3,12],"emerged":[4],"as":[5],"the":[6,21,59,66,132,181],"most":[7],"popular":[8,139],"computing":[9],"that":[11,68,91,227],"more":[13,54],"than":[14],"2.5":[15],"billion":[16],"devices":[17,24],"[1]":[18],"working":[19],"across":[20],"globe.":[22],"These":[23,97],"include":[25],"not":[26],"only":[27],"mobiles":[28],"and":[29,45,56,62,113,117,231,249,254],"tablets,":[30],"but":[31],"even":[32,147,195],"Auto":[34],"modules":[35],"in":[36,84],"cars,":[37],"various":[38,69,157],"versions":[40,70],"running":[41],"on":[42,131,259],"Televisions,":[43],"watches":[44],"host":[46],"of":[47,71,225],"other":[48],"smart":[49],"devices.":[50],"What":[51],"makes":[52],"things":[53],"challenging":[55],"interesting":[57],"for":[58,103,155,176],"Developers":[61],"security":[63,220],"experts":[64],"is":[65,135],"fact":[67],"Operating":[73],"System,":[74],"from":[75,93,128,192,196],"2.3.3":[77],"(Ginger":[78],"Bread)":[79],"to":[80,115,125,151,165,179,204,233],"11.0":[82],"coexist":[83],"this":[85,160,206,213],"ecosystem.":[86],"This":[87],"paper":[88,214],"discusses":[89],"threats":[90],"emanate":[92],"Hybrid":[94,98,168],"Apps.":[96,109],"Apps":[99],"use":[100],"WebView":[101,110,146],"Component":[102],"handling":[104],"web":[105],"content":[106,127,178],"within":[107],"allows":[111,148],"HTML":[112],"JavaScript":[114,149,186],"run":[116],"render":[118],"webpages":[119],"inside":[120],"Apps,":[121,140,169,245],"thereby":[122],"allowing":[123],"them":[124],"download":[126],"Web":[129,218],"Servers":[130],"Internet.":[133],"It":[134],"used":[136],"by":[137],"several":[138],"like":[141],"Facebook,":[142],"Twitter,":[143],"Instagram,":[144],"etc.":[145],"code":[150,154],"call":[152],"completing":[156],"tasks.":[158],"While":[159],"feature":[161],"gives":[162],"tremendous":[163],"capability":[164],"create":[166],"interactive":[167],"however,":[170],"it":[171,228],"also":[172],"opens":[173],"a":[174],"route":[175],"malicious":[177,190],"infect":[180],"Platform":[183],"using":[184],"targeted":[185],"based":[187,258],"malwares.":[188],"Any":[189],"JavaScript,":[191],"untrusted":[193],"or":[194],"trusted":[197],"source,":[198],"can":[199,229],"thus":[200],"find":[201],"its":[202],"way":[203],"exploit":[205],"unique":[207],"linkage":[208],"with":[209],"Platform.":[211],"In":[212],"we":[215,240],"analyze":[216],"View's":[219],"vulnerabilities,":[221],"access":[222],"authorization,":[223],"kind":[224],"attacks":[226],"encounter,":[230],"mechanisms":[232,256],"prevent":[234],"these":[235],"attacks.":[236],"To":[237],"do":[238],"so,":[239],"have":[241],"developed":[242],"two":[243],"viz.,":[246],"\"WebView":[247,250],"Tool\"":[248],"Monitor\".":[251],"Our":[252],"analysis":[253],"detection":[255],"are":[257],"Machine":[260],"Learning":[261],"techniques.":[262]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
