{"id":"https://openalex.org/W4387064059","doi":"https://doi.org/10.1109/icsecs58457.2023.10256304","title":"Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach","display_name":"Cloud of Word vs DroidKungfu: Performance Evaluation in Detecting Root Exploit Malware with Deep Learning Approach","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4387064059","doi":"https://doi.org/10.1109/icsecs58457.2023.10256304"},"language":"en","primary_location":{"id":"doi:10.1109/icsecs58457.2023.10256304","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsecs58457.2023.10256304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107933271","display_name":"Che Akmal Che Yahaya","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Che Akmal Che Yahaya","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100562838","display_name":"Ahmad Firdaus","orcid":null},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ahmad Firdaus","raw_affiliation_strings":["Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia","Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia","institution_ids":["https://openalex.org/I102913810"]},{"raw_affiliation_string":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059701632","display_name":"Azlee Zabidi","orcid":"https://orcid.org/0000-0002-2709-3708"},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azlee Zabidi","raw_affiliation_strings":["Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia","Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Computing,Pekan,Pahang,Malaysia","institution_ids":["https://openalex.org/I102913810"]},{"raw_affiliation_string":"Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah, Pekan, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113009340","display_name":"Noor Akma Bt Abu Bakar","orcid":null},"institutions":[{"id":"https://openalex.org/I102913810","display_name":"Universiti Malaysia Pahang Al-Sultan Abdullah","ror":"https://ror.org/01704wp68","country_code":"MY","type":"education","lineage":["https://openalex.org/I102913810"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Noor Akma Bt Abu Bakar","raw_affiliation_strings":["Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Industry and Management,Gambang,Pahang,Malaysia","Faculty of Industry and Management, Universiti Malaysia Pahang Al-Sultan Abdullah, Gambang, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Malaysia Pahang Al-Sultan Abdullah,Faculty of Industry and Management,Gambang,Pahang,Malaysia","institution_ids":["https://openalex.org/I102913810"]},{"raw_affiliation_string":"Faculty of Industry and Management, Universiti Malaysia Pahang Al-Sultan Abdullah, Gambang, Pahang, Malaysia","institution_ids":["https://openalex.org/I102913810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113009341","display_name":"Mukrimah Nawir","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mukrimah Bt Nawir","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104174398","display_name":"Philimal Normelissa Ani Abdul Malek","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Philimal Normelissa Ani Abdul Malek","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Faculty of Computing and Information Technology,Kuantan,Pahang,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Faculty of Computing and Information Technology, Tunku Abdul Rahman University of Management and Technology, Kuantan, Pahang, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5107933271"],"corresponding_institution_ids":["https://openalex.org/I927443849"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45051643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"217","last_page":"222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9488566517829895},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9141201376914978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.816012978553772},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6894287467002869},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5842041969299316},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.5177135467529297},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49765923619270325},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.467220664024353},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4590418040752411},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.45723092555999756},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.43960732221603394},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4285678267478943},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4235316216945648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4166072607040405},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2665688991546631}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9488566517829895},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9141201376914978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816012978553772},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6894287467002869},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5842041969299316},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.5177135467529297},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49765923619270325},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.467220664024353},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4590418040752411},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.45723092555999756},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.43960732221603394},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4285678267478943},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4235316216945648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4166072607040405},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2665688991546631},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsecs58457.2023.10256304","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsecs58457.2023.10256304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2599823825","https://openalex.org/W2735043505","https://openalex.org/W2800912855","https://openalex.org/W2811313356","https://openalex.org/W2825974271","https://openalex.org/W2910564901","https://openalex.org/W2944407972","https://openalex.org/W2968263527","https://openalex.org/W2998961572","https://openalex.org/W3003798257","https://openalex.org/W3011624874","https://openalex.org/W3031098679","https://openalex.org/W3037028657","https://openalex.org/W3127411523","https://openalex.org/W3170286125","https://openalex.org/W3182057223","https://openalex.org/W3198467934","https://openalex.org/W4256538432"],"related_works":["https://openalex.org/W4200054778","https://openalex.org/W2233081671","https://openalex.org/W2395100307","https://openalex.org/W2717179875","https://openalex.org/W3195586271","https://openalex.org/W4249118297","https://openalex.org/W2810666735","https://openalex.org/W2968504645","https://openalex.org/W2067547021","https://openalex.org/W4200197138"],"abstract_inverted_index":{"Android":[0,25],"mobile":[1,26],"malware":[2,7],"is":[3,50,56,141,163,169,231],"a":[4,182,198],"type":[5],"of":[6,32,65,80,87,106,161,205,218,245],"that":[8,91],"execute":[9],"malicious":[10],"activities":[11],"(stealing":[12],"and":[13,16,43,75,98,111,149,196,216,239],"collecting":[14],"data":[15],"running":[17],"programs":[18],"without":[19,212],"the":[20,51,62,103,123,130,134,144,158,192,214,221,228,249],"user's":[21],"knowledge)":[22],"in":[23,129,137,194,220,226,235,248],"victims'":[24],"device.":[27],"There":[28],"are":[29,84,151],"several":[30],"types":[31,79,86],"malware,":[33],"for":[34],"instance;":[35],"1)":[36],"Root":[37],"exploit;":[38],"2)":[39],"Botnet;":[40],"3)":[41],"Trojan;":[42],"4)":[44],"Ransomware.":[45],"Among":[46,223],"these,":[47],"root":[48,63,88,139],"exploit":[49,89,140],"most":[52],"dangerous":[53],"as":[54,95,143,165,167],"it":[55,168],"able":[57,112,170],"to":[58,113,153,171,180,185,208,241],"gain":[59],"control":[60],"over":[61],"privileges":[64],"an":[66],"operating":[67],"system":[68,147],"(OS)":[69],"stealthily,":[70],"avoids":[71],"security":[72],"software":[73],"scanning,":[74],"further":[76],"installs":[77],"other":[78,109],"malware.":[81],"Moreover,":[82,156],"there":[83],"multiple":[85],"families":[90,110],"attack":[92],"Android,":[93],"such":[94],"Droidkungfu,":[96],"Droiddream,":[97],"Asroot.":[99],"However,":[100],"Droidkungfu":[101,188,238],"possesses":[102],"highest":[104,229],"number":[105,160,217],"samples":[107],"among":[108],"survive":[114],"with":[115,203],"updated":[116,124],"versions":[117,244],"(version":[118],"one":[119],"until":[120],"six).":[121],"Therefore,":[122],"version":[125],"could":[126],"be":[127],"increasing":[128],"future.":[131,250],"Furthermore,":[132],"finding":[133,157],"best":[135],"features":[136,162,210,219],"detecting":[138],"challenging,":[142],"categories":[145,215],"(permission,":[146],"calls,":[148],"intent)":[150],"many":[152],"choose":[154],"from.":[155],"ideal":[159],"challenging":[164],"well,":[166],"affect":[172],"machine":[173],"learning":[174],"detection.":[175],"Thus,":[176],"this":[177,246],"study":[178],"focuses":[179],"develop":[181],"solid":[183],"model":[184],"predict":[186],"undiscovered":[187],"by":[189],"converting":[190],"all":[191,224],"codes":[193],"images":[195],"adopted":[197],"Convolutional":[199],"neural":[200],"network":[201],"(CNN)":[202],"Word":[204],"Cloud":[206],"(WoC)":[207],"discover":[209],"automatically":[211],"considering":[213],"code.":[222],"parameters":[225],"evaluation,":[227],"result":[230],"96":[232],"%":[233],"accuracy":[234],"predicting":[236],"unknown":[237],"proved":[240],"detect":[242],"new":[243],"family":[247]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
