{"id":"https://openalex.org/W2614354826","doi":"https://doi.org/10.1109/cybersecpods.2017.8074845","title":"Improving dynamic analysis of android apps using hybrid test input generation","display_name":"Improving dynamic analysis of android apps using hybrid test input generation","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2614354826","doi":"https://doi.org/10.1109/cybersecpods.2017.8074845","mag":"2614354826"},"language":"en","primary_location":{"id":"doi:10.1109/cybersecpods.2017.8074845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersecpods.2017.8074845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/129531813/Improving_Dynamic_Analysis_of_Android_Apps_Using_Hybrid_Test_Input_Generation.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076877194","display_name":"Mohammed K. Alzaylaee","orcid":"https://orcid.org/0000-0002-3791-3458"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mohammed K. Alzaylaee","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072809002","display_name":"Suleiman Y. Yerima","orcid":"https://orcid.org/0000-0003-0346-1219"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suleiman Y. Yerima","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, Northern Ireland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076877194"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8027,"has_fulltext":true,"cited_by_count":28,"citation_normalized_percentile":{"value":0.91634747,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.837446928024292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568222880363464},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7175894975662231},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6350865364074707},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5933591723442078},{"id":"https://openalex.org/keywords/random-testing","display_name":"Random testing","score":0.44070079922676086},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4235672354698181},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35518017411231995},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.35043269395828247},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.32869839668273926},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.18833404779434204},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09387373924255371}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.837446928024292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568222880363464},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7175894975662231},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6350865364074707},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5933591723442078},{"id":"https://openalex.org/C106159264","wikidata":"https://www.wikidata.org/wiki/Q17146789","display_name":"Random testing","level":4,"score":0.44070079922676086},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4235672354698181},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35518017411231995},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.35043269395828247},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.32869839668273926},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.18833404779434204},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09387373924255371},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/cybersecpods.2017.8074845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersecpods.2017.8074845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/0e61a52c-23d3-4190-b237-c6638d0e9cbb","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/0e61a52c-23d3-4190-b237-c6638d0e9cbb","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/129531813/Improving_Dynamic_Analysis_of_Android_Apps_Using_Hybrid_Test_Input_Generation.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Alzaylaee, M K, Yerima, S Y & Sezer, S 2017, Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation. in International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. Institute of Electrical and Electronics Engineers Inc., pp. 1-8, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), London, United Kingdom, 19/06/2017. https://doi.org/10.1109/CyberSecPODS.2017.8074845","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:dora.dmu.ac.uk:2086/16863","is_oa":false,"landing_page_url":"http://hdl.handle.net/2086/16863","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/0e61a52c-23d3-4190-b237-c6638d0e9cbb","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/0e61a52c-23d3-4190-b237-c6638d0e9cbb","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/129531813/Improving_Dynamic_Analysis_of_Android_Apps_Using_Hybrid_Test_Input_Generation.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Alzaylaee, M K, Yerima, S Y & Sezer, S 2017, Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation. in International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. Institute of Electrical and Electronics Engineers Inc., pp. 1-8, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), London, United Kingdom, 19/06/2017. https://doi.org/10.1109/CyberSecPODS.2017.8074845","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5334834590","display_name":null,"funder_award_id":"EP/H049606/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G745166385","display_name":null,"funder_award_id":"EP/G034303/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2614354826.pdf","grobid_xml":"https://content.openalex.org/works/W2614354826.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1508584952","https://openalex.org/W1943233084","https://openalex.org/W1963971515","https://openalex.org/W1999728176","https://openalex.org/W2002278076","https://openalex.org/W2013856010","https://openalex.org/W2070386561","https://openalex.org/W2088749975","https://openalex.org/W2091932246","https://openalex.org/W2101800210","https://openalex.org/W2122672392","https://openalex.org/W2161963160","https://openalex.org/W2164170598","https://openalex.org/W2164539435","https://openalex.org/W2166743230","https://openalex.org/W2168649891","https://openalex.org/W2227887088","https://openalex.org/W2598119844","https://openalex.org/W2998501028","https://openalex.org/W3004939941","https://openalex.org/W3104213016","https://openalex.org/W4244726870","https://openalex.org/W4300607852","https://openalex.org/W6641190993","https://openalex.org/W6650823230","https://openalex.org/W6785441188"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W4327939473","https://openalex.org/W4382940931","https://openalex.org/W2610659201","https://openalex.org/W65788704","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W2955731880"],"abstract_inverted_index":{"The":[0,148],"Android":[1,20,34,68,154,165],"OS":[2],"has":[3,74],"become":[4],"the":[5,17,49,67,120,164,191,196,209],"most":[6],"popular":[7],"mobile":[8],"operating":[9],"system":[10,122,149],"leading":[11],"to":[12,32,47,84,94,111,138,182],"a":[13,89,103,125,131],"significant":[14],"increase":[15],"in":[16,45,92,98,136],"spread":[18],"of":[19,198],"malware.":[21,35],"Consequently,":[22],"several":[23,75],"static":[24],"and":[25,142,159,175,205,211],"dynamic":[26,37,56,113,199],"analysis":[27,57,114],"systems":[28,58],"have":[29],"been":[30],"developed":[31],"detect":[33],"With":[36],"analysis,":[38],"efficient":[39],"test":[40,106,215],"input":[41,61,72,107,216],"generation":[42,62,73,108,217],"is":[43,150],"needed":[44],"order":[46,93,137],"trigger":[48],"potential":[50],"run-time":[51],"malicious":[52,146],"behaviours.":[53,147],"Most":[54],"existing":[55],"employ":[59],"random-based":[60],"methods":[63],"usually":[64],"built":[65],"using":[66,152],"Monkey":[69],"tool.":[70],"Random-based":[71],"shortcomings":[76],"including":[77],"limited":[78],"code":[79,140],"coverage,":[80],"which":[81],"motivates":[82],"us":[83],"explore":[85],"combining":[86],"it":[87],"with":[88,130],"state-based":[90,173,210],"method":[91],"improve":[95,112,139],"efficiency.":[96],"Hence,":[97],"this":[99],"paper,":[100],"we":[101],"present":[102],"novel":[104],"hybrid":[105,121,178,192],"approach":[109,179,193],"designed":[110],"on":[115],"real":[116],"devices.":[117],"We":[118],"implemented":[119],"by":[123],"integrating":[124],"random":[126,171,214],"based":[127,133],"tool":[128,134],"(Monkey)":[129],"state":[132],"(DroidBot)":[135],"coverage":[141],"potentially":[143],"uncover":[144],"more":[145],"evaluated":[151],"2,444":[153],"apps":[155],"containing":[156],"1222":[157,160],"benign":[158,204],"malware":[161,166,206],"samples":[162,207],"from":[163,202],"genome":[167],"project.":[168],"Three":[169],"scenarios,":[170],"only,":[172,174],"our":[176],"proposed":[177],"were":[180],"investigated":[181],"comparatively":[183],"evaluate":[184],"their":[185],"performances.":[186],"Our":[187],"study":[188],"shows":[189],"that":[190],"significantly":[194],"improved":[195],"amount":[197],"features":[200],"extracted":[201],"both":[203],"over":[208],"commonly":[212],"used":[213],"method.":[218]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
