{"id":"https://openalex.org/W1588586079","doi":"https://doi.org/10.1109/malware.2009.5403026","title":"Smartphone malware evolution revisited: Android next target?","display_name":"Smartphone malware evolution revisited: Android next target?","publication_year":2009,"publication_date":"2009-10-01","ids":{"openalex":"https://openalex.org/W1588586079","doi":"https://doi.org/10.1109/malware.2009.5403026","mag":"1588586079"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2009.5403026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2009.5403026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 4th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110225126","display_name":"A.-D. Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Aubrey-Derrick Schmidt","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110669963","display_name":"Hans-Gunterh Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hans-Gunther Schmidt","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071297062","display_name":"Leonid Batyuk","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Leonid Batyuk","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067844145","display_name":"Jan Hendrik Clausen","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Hendrik Clausen","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084022157","display_name":"Seyit Camtepe","orcid":"https://orcid.org/0000-0001-6353-8359"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Seyit Ahmet Camtepe","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089847337","display_name":"\u015eahin Albayrak","orcid":"https://orcid.org/0000-0001-5092-4584"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sahin Albayrak","raw_affiliation_strings":["Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4 Berlin-DAI-Labor, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Technische Universit\u00e4 Berlin - DAI-Labor, Ernst-Reuter-Platz 7, 10587, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006614213","display_name":"Can Brochmann Yildizli","orcid":null},"institutions":[{"id":"https://openalex.org/I134235054","display_name":"Sabanc\u0131 \u00dcniversitesi","ror":"https://ror.org/049asqa32","country_code":"TR","type":"education","lineage":["https://openalex.org/I134235054"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Can Yildizli","raw_affiliation_strings":["Sabanci University, Istanbul, Turkey","Sabanci Univ., Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Sabanci University, Istanbul, Turkey","institution_ids":["https://openalex.org/I134235054"]},{"raw_affiliation_string":"Sabanci Univ., Istanbul, Turkey","institution_ids":["https://openalex.org/I134235054"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5110225126"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.05134623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9059887528419495},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.9025014638900757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6645557880401611},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.6175804138183594},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.566162109375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5487788319587708},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5265731811523438},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.51189124584198},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4821555018424988},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4614606499671936},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3516608476638794},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3239101767539978}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9059887528419495},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.9025014638900757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6645557880401611},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.6175804138183594},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.566162109375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5487788319587708},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5265731811523438},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.51189124584198},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4821555018424988},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4614606499671936},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3516608476638794},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3239101767539978},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/malware.2009.5403026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2009.5403026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 4th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},{"id":"mag:1588586079","is_oa":false,"landing_page_url":"https://eprints.qut.edu.au/58111/","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1808253285","https://openalex.org/W1976978659","https://openalex.org/W1993112187","https://openalex.org/W1994212665","https://openalex.org/W2016763420","https://openalex.org/W2061022487","https://openalex.org/W2068011000","https://openalex.org/W2069903162","https://openalex.org/W2093467338","https://openalex.org/W2119330522","https://openalex.org/W2123557610","https://openalex.org/W2123608102","https://openalex.org/W2156449948","https://openalex.org/W6645042299","https://openalex.org/W6683537732"],"related_works":["https://openalex.org/W2151124070","https://openalex.org/W2590911331","https://openalex.org/W2717179875","https://openalex.org/W2948902258","https://openalex.org/W1866429171","https://openalex.org/W2902781267","https://openalex.org/W2028727337","https://openalex.org/W2514967451","https://openalex.org/W2537663130","https://openalex.org/W2992598062","https://openalex.org/W2340245023","https://openalex.org/W3195586271","https://openalex.org/W2171389360","https://openalex.org/W2214970942","https://openalex.org/W2890494234","https://openalex.org/W2805843504","https://openalex.org/W1963923654","https://openalex.org/W3184559050","https://openalex.org/W2997466180","https://openalex.org/W3016972006"],"abstract_inverted_index":{"Smartphones":[0],"started":[1],"being":[2],"targets":[3],"for":[4,23,61,78,103,108],"malware":[5,10,52,60,76,91],"in":[6,26,58],"June":[7],"2004":[8],"while":[9],"count":[11],"increased":[12],"steadily":[13],"until":[14,83],"the":[15,80,105,161],"introduction":[16],"of":[17,43,68,85,115],"a":[18,147],"mandatory":[19],"application":[20,125],"signing":[21],"mechanism":[22],"Symbian":[24],"OS":[25],"2006.":[27],"From":[28],"this":[29,39,71,95,150],"point":[30],"on,":[31],"only":[32],"few":[33],"news":[34],"could":[35],"be":[36,133],"read":[37],"on":[38,100,127],"topic.":[40],"Even":[41],"despite":[42],"new":[44],"emerging":[45],"smartphone":[46,75,90],"platforms,":[47],"e.g.":[48],"android":[49],"and":[50,140],"iPhone,":[51],"writers":[53],"seemed":[54],"to":[55,89,121,135,145,159],"lose":[56],"interest":[57],"writing":[59],"smartphones":[62],"giving":[63],"users":[64],"an":[65],"unappropriate":[66],"feeling":[67],"safety.":[69],"In":[70,149],"paper,":[72],"we":[73,93,152],"revisit":[74],"evolution":[77],"completing":[79],"appearance":[81],"list":[82,96],"end":[84],"2008.":[86],"For":[87],"contributing":[88],"research,":[92],"continue":[94],"by":[97,165],"adding":[98],"descriptions":[99],"possible":[101,158],"techniques":[102],"creating":[104],"first":[106],"malware(s)":[107],"Android":[109,117,129,162],"platform.":[110],"Our":[111],"approach":[112],"involves":[113],"usage":[114],"undocumented":[116],"functions":[118],"enabling":[119],"us":[120],"execute":[122],"native":[123,167],"Linux":[124,138,168],"even":[126],"retail":[128],"devices.":[130],"This":[131],"can":[132],"exploited":[134],"create":[136],"malicious":[137],"applications":[139],"daemons":[141],"using":[142,166],"various":[143],"methods":[144],"attack":[146],"device.":[148],"manner,":[151],"also":[153],"show":[154],"that":[155],"it":[156],"is":[157],"bypass":[160],"permission":[163],"system":[164],"applications.":[169]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-01-03T23:08:47.215875","created_date":"2025-10-10T00:00:00"}
