{"id":"https://openalex.org/W4205443255","doi":"https://doi.org/10.1109/iwbis53353.2021.9631860","title":"Is WhatsApp Plus Malicious? A Review Using Static Analysis","display_name":"Is WhatsApp Plus Malicious? A Review Using Static Analysis","publication_year":2021,"publication_date":"2021-10-23","ids":{"openalex":"https://openalex.org/W4205443255","doi":"https://doi.org/10.1109/iwbis53353.2021.9631860"},"language":"en","primary_location":{"id":"doi:10.1109/iwbis53353.2021.9631860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbis53353.2021.9631860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 6th International Workshop on Big Data and Information Security (IWBIS)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072095366","display_name":"Rizaldi Wahaz","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rizaldi Wahaz","raw_affiliation_strings":["Cybersecurity Engineering, Politeknik Siber dan Sandi Negara"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Engineering, Politeknik Siber dan Sandi Negara","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033938955","display_name":"Rakha Nadhifa Harmana","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rakha Nadhifa Harmana","raw_affiliation_strings":["Cybersecurity Engineering, Politeknik Siber dan Sandi Negara"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Engineering, Politeknik Siber dan Sandi Negara","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704605","display_name":"Amiruddin Amiruddin","orcid":"https://orcid.org/0000-0003-4635-3760"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amiruddin Amiruddin","raw_affiliation_strings":["Cybersecurity Engineering, Politeknik Siber dan Sandi Negara"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Engineering, Politeknik Siber dan Sandi Negara","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056165787","display_name":"Ardya Suryadinata","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ardya Suryadinata","raw_affiliation_strings":["Cybersecurity Engineering, University of Maryland, College Park"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Engineering, University of Maryland, College Park","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072095366"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4571,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63373901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7901344299316406},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7876825332641602},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6648557186126709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6492626667022705},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6430062055587769},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.6146628260612488},{"id":"https://openalex.org/keywords/malice","display_name":"Malice","score":0.5864920616149902},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.49100640416145325},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3926122188568115},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1694168746471405},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09856969118118286}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7901344299316406},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7876825332641602},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6648557186126709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6492626667022705},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6430062055587769},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.6146628260612488},{"id":"https://openalex.org/C2778068216","wikidata":"https://www.wikidata.org/wiki/Q55019500","display_name":"Malice","level":2,"score":0.5864920616149902},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.49100640416145325},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3926122188568115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1694168746471405},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09856969118118286},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwbis53353.2021.9631860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbis53353.2021.9631860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 6th International Workshop on Big Data and Information Security (IWBIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2086221640","https://openalex.org/W2889599747","https://openalex.org/W2922344003","https://openalex.org/W2970567945","https://openalex.org/W2974046190","https://openalex.org/W2995172056","https://openalex.org/W3016972006","https://openalex.org/W3036603968","https://openalex.org/W3042961859","https://openalex.org/W3044551040","https://openalex.org/W3095334931","https://openalex.org/W3097711322","https://openalex.org/W3159337581","https://openalex.org/W3160936156","https://openalex.org/W3194832539","https://openalex.org/W4240241597"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2768892939","https://openalex.org/W3164408430","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726","https://openalex.org/W2883822334","https://openalex.org/W2134874482"],"abstract_inverted_index":{"For":[0],"cybersecurity":[1],"activists,":[2],"reviewing":[3],"whether":[4,97,168],"an":[5,81],"application,":[6],"including":[7],"modified":[8,24],"applications,":[9],"is":[10,14,20,42,54,134],"malicious":[11,73,110,180,209],"or":[12,49,98,108],"not":[13,99],"a":[15,21],"challenging":[16],"job.":[17],"WhatsApp":[18,28,36,41,53,89,91,100,185,202],"Plus":[19,37,92,101,203],"messenger":[22],"application":[23],"from":[25],"the":[26,31,35,39,61,84,88,115,120,124,137,141,144,156,205,212],"official":[27,40],"application.":[29],"Comparing":[30],"source":[32,85,121,157],"code":[33,86,122,158,181,210],"of":[34,63,83,87,123,146],"with":[38,105],"one":[43],"way":[44],"to":[45,71,94,166,211],"review":[46],"its":[47],"security":[48],"malice.":[50],"Considering":[51],"that":[52],"very":[55,67],"popular":[56],"and":[57,90,130,140,200],"has":[58,102],"many":[59],"users,":[60],"results":[62],"this":[64,76],"investigation":[65],"are":[66,160],"useful":[68],"for":[69,163,173],"users":[70,190],"avoid":[72],"applications.":[74],"In":[75],"study,":[77,189],"we":[78],"have":[79],"conducted":[80],"exploration":[82,113],"applications":[93,126],"find":[95],"out":[96],"been":[103],"inserted":[104],"malware,":[106],"spyware,":[107],"other":[109],"code.":[111],"The":[112,132,153],"used":[114],"static":[116],"analysis":[117],"method,":[118],"where":[119],"two":[125],"were":[127],"decompiled,":[128],"compared,":[129],"analyzed.":[131],"de-compilation":[133],"done":[135],"using":[136,143,201],"MobSF":[138],"tool":[139],"comparison":[142],"extension":[145],"Visual":[147],"Studio":[148],"Code":[149],"called":[150],"Compare":[151],"Folders.":[152],"differences":[154],"in":[155,187,198],"found":[159,183],"then":[161],"analyzed":[162],"possible":[164],"behavior":[165],"determine":[167],"it":[169],"can":[170],"cause":[171],"harm,":[172],"example":[174],"stealing":[175],"user":[176],"credentials.":[177],"Although":[178],"no":[179],"was":[182],"on":[184],"Plus,":[186],"our":[188],"must":[191],"stay":[192],"alert":[193],"since":[194],"they":[195],"remain":[196],"vigilant":[197],"installing":[199],"because":[204],"developer":[206],"may":[207],"add":[208],"next":[213],"version":[214],"update.":[215]},"counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
