{"id":"https://openalex.org/W3108389992","doi":"https://doi.org/10.1109/iscisc51277.2020.9261909","title":"Enhancing Monkey to trigger malicious payloads in Android malware","display_name":"Enhancing Monkey to trigger malicious payloads in Android malware","publication_year":2020,"publication_date":"2020-09-09","ids":{"openalex":"https://openalex.org/W3108389992","doi":"https://doi.org/10.1109/iscisc51277.2020.9261909","mag":"3108389992"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc51277.2020.9261909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc51277.2020.9261909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041128791","display_name":"Hayyan Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Hayyan Hasan","raw_affiliation_strings":["Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran","institution_ids":["https://openalex.org/I39268498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054438232","display_name":"Behrouz Tork Ladani","orcid":"https://orcid.org/0000-0003-2280-8839"},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Behrouz Tork Ladani","raw_affiliation_strings":["Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran","institution_ids":["https://openalex.org/I39268498"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025430523","display_name":"Bahman Zamani","orcid":"https://orcid.org/0000-0001-6424-1442"},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Bahman Zamani","raw_affiliation_strings":["Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran","institution_ids":["https://openalex.org/I39268498"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041128791"],"corresponding_institution_ids":["https://openalex.org/I39268498"],"apc_list":null,"apc_paid":null,"fwci":0.4546,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62718894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.849887490272522},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8454145193099976},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7904326915740967},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.647412121295929},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.543485164642334},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.49984312057495117},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47821447253227234},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4512363076210022},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43748739361763},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42387765645980835},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4149303436279297},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4119291305541992},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3285216689109802},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14350104331970215}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.849887490272522},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8454145193099976},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7904326915740967},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.647412121295929},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.543485164642334},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.49984312057495117},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47821447253227234},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4512363076210022},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43748739361763},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42387765645980835},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4149303436279297},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4119291305541992},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3285216689109802},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14350104331970215},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc51277.2020.9261909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc51277.2020.9261909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2017025011","https://openalex.org/W2083755826","https://openalex.org/W2185052282","https://openalex.org/W2213145342","https://openalex.org/W2608204476","https://openalex.org/W2614354826","https://openalex.org/W2617190760","https://openalex.org/W2618126787","https://openalex.org/W2620844046","https://openalex.org/W2621123093","https://openalex.org/W2765271136","https://openalex.org/W2770445302","https://openalex.org/W2791662519","https://openalex.org/W2794730535","https://openalex.org/W2803054784","https://openalex.org/W2898749215","https://openalex.org/W2904583559","https://openalex.org/W2963989339","https://openalex.org/W2990954041","https://openalex.org/W4294403277","https://openalex.org/W6686254684","https://openalex.org/W6688421259","https://openalex.org/W6739289765","https://openalex.org/W6745111697"],"related_works":["https://openalex.org/W4285507391","https://openalex.org/W2610659201","https://openalex.org/W3107556205","https://openalex.org/W2311926078","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W3200508744","https://openalex.org/W2183925834","https://openalex.org/W2765174411","https://openalex.org/W2067547021"],"abstract_inverted_index":{"Dynamic":[0],"analysis":[1,85,127],"is":[2,27,34],"a":[3,110],"prominent":[4],"approach":[5,105],"in":[6,36,49,53,147],"analyzing":[7],"the":[8,24,28,54,77,80,84,118,121,126,131,148,153,160],"behavior":[9],"of":[10,56,79,120,134,150,155],"Android":[11,37],"apps.":[12],"To":[13,129],"perform":[14],"dynamic":[15,38],"analysis,":[16,58],"we":[17,90,136],"need":[18],"an":[19],"event":[20,31],"generator":[21,32],"to":[22,92,95,184],"execute":[23],"app.":[25],"Monkey":[26,40,59,94,108,180],"most":[29],"popular":[30],"that":[33,178],"used":[35],"analysis.":[39],"provides":[41],"high":[42,47],"code":[43,161,191],"coverage,":[44],"and":[45,116,159,188],"yet":[46],"speed":[48],"generating":[50],"events.":[51,72],"However,":[52],"case":[55,149],"malware":[57,151,173],"suffers":[60],"from":[61,171],"several":[62],"limitations.":[63],"It":[64],"only":[65],"considers":[66],"UI":[67],"events":[68,115],"but":[69],"no":[70],"system":[71,114],"Moreover,":[73],"it":[74,138],"causes":[75],"disconnecting":[76],"connectivity":[78,119],"test":[81,122],"environment":[82,123],"during":[83,125],"process.":[86,128],"In":[87],"this":[88],"paper,":[89],"try":[91],"enhance":[93],"reduce":[96],"its":[97,101,140,182,190],"limitations":[98],"while":[99],"preserving":[100],"advantages.":[102],"The":[103,163,175],"proposed":[104],"includes":[106],"preparing":[107],"with":[109,139],"facility":[111],"for":[112],"handling":[113],"keeping":[117],"up":[124],"evaluate":[130],"extended":[132],"version":[133,142],"Monkey,":[135],"compare":[137],"original":[141],"regarding":[143],"two":[144],"important":[145],"criteria":[146],"analysis:":[152],"number":[154],"called":[156],"sensitive":[157,186],"APIs,":[158,187],"coverage.":[162,192],"evaluation":[164],"process":[165],"uses":[166],"100":[167],"randomly":[168],"selected":[169],"samples":[170],"AMD":[172],"dataset.":[174],"results":[176],"show":[177],"enhanced":[179],"improves":[181],"ability":[183],"trigger":[185],"increases":[189]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
