{"id":"https://openalex.org/W2034507087","doi":"https://doi.org/10.1109/malware.2014.6999415","title":"MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android","display_name":"MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2034507087","doi":"https://doi.org/10.1109/malware.2014.6999415","mag":"2034507087"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2014.6999415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027791813","display_name":"Jihwan Jeong","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jihwan Jeong","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108712073","display_name":"Dong-Won Seo","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongwon Seo","raw_affiliation_strings":["FDCC, Seoul, Republic of Korea","Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"FDCC, Seoul, Republic of Korea","institution_ids":[]},{"raw_affiliation_string":"Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101822126","display_name":"Chanyoung Lee","orcid":"https://orcid.org/0009-0009-2756-5136"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Chanyoung Lee","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055794339","display_name":"Jonghoon Kwon","orcid":"https://orcid.org/0000-0002-3853-242X"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jonghoon Kwon","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101630726","display_name":"Heejo Lee","orcid":"https://orcid.org/0000-0002-5831-0787"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heejo Lee","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Korea University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Dept.of Computer Science and Engineering, Korea University, Seoul, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053918567","display_name":"John Milburn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"John Milburn","raw_affiliation_strings":["FDCC, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"FDCC, Seoul, Republic of Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027791813"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.2911,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.55219907,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"4","issue":null,"first_page":"50","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8502835035324097},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7250020503997803},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6100855469703674},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5348604321479797},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.5070095062255859},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4934955835342407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46013396978378296},{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.4222007691860199},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39073237776756287}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8502835035324097},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7250020503997803},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6100855469703674},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5348604321479797},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.5070095062255859},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4934955835342407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46013396978378296},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.4222007691860199},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39073237776756287},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2014.6999415","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2014.6999415","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W176483260","https://openalex.org/W194233933","https://openalex.org/W1522249641","https://openalex.org/W1522824317","https://openalex.org/W1555061247","https://openalex.org/W1963971515","https://openalex.org/W2099613071","https://openalex.org/W2108403445","https://openalex.org/W2114312434","https://openalex.org/W2115175416","https://openalex.org/W2116602342","https://openalex.org/W2152149943","https://openalex.org/W2274673463","https://openalex.org/W2491014750","https://openalex.org/W6633495138","https://openalex.org/W6641190993","https://openalex.org/W6694724835"],"related_works":["https://openalex.org/W1995270367","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4312334973","https://openalex.org/W1849042743","https://openalex.org/W1565885216","https://openalex.org/W2942010890","https://openalex.org/W2734812495","https://openalex.org/W2135356309","https://openalex.org/W2898697275"],"abstract_inverted_index":{"The":[0],"number":[1],"of":[2,62,93,201],"malicious":[3],"applications,":[4],"sometimes":[5],"known":[6,197],"as":[7],"malapps,":[8,203],"in":[9,15,51,100],"Android":[10],"smartphones":[11],"has":[12],"increased":[13],"significantly":[14],"recent":[16],"years.":[17],"Malapp":[18],"writers":[19],"abuse":[20],"repackaging":[21],"techniques":[22],"to":[23,43,58,102,195],"rebuild":[24],"applications":[25,31,207],"with":[26,64,134,174],"code":[27,60,94,104],"changes.":[28],"Existing":[29],"anti-malware":[30,206],"do":[32],"not":[33],"successfully":[34],"defeat":[35],"or":[36],"defend":[37],"against":[38],"the":[39,91,98,129,139,143,160,163,166,170,179,183,211],"repackaged":[40,202],"malapps":[41],"due":[42],"numerous":[44],"variants.":[45,212],"Software-based":[46],"attestation":[47,76,83,111,126,140,155,164,172],"approaches":[48],"widely":[49],"used":[50],"a":[52,73,123,135,148,153,175],"resource-constrained":[53],"environment":[54],"have":[55],"been":[56],"developed":[57],"detect":[59,196,210],"changes":[61,97],"software":[63],"low":[65],"resource":[66],"consumption.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71],"propose":[72],"novel":[74],"software-based":[75],"approach,":[77],"called":[78],"MysteryChecker,":[79],"leveraging":[80],"an":[81],"unpredictable":[82,87,110],"algorithm.":[84,156],"For":[85],"its":[86],"attestation,":[88],"MysteryChecker":[89,191],"applies":[90],"concept":[92],"obfuscation,":[95],"which":[96],"syntax":[99],"order":[101],"avoid":[103],"analysis":[105,180],"by":[106,114,182],"adversaries.":[107],"More":[108],"precisely,":[109],"is":[112,192],"achieved":[113],"chaining":[115],"randomly":[116,124],"selected":[117],"crypto":[118],"functions.":[119],"A":[120],"verifier":[121],"sends":[122],"generated":[125],"module,":[127,165],"and":[128,178,198],"target":[130,144,167],"application":[131,145,168],"must":[132],"reply":[133],"correct":[136],"response":[137],"using":[138],"module.":[141],"Also,":[142],"periodically":[146],"receives":[147],"new":[149,176],"module":[150,173],"that":[151,190],"contains":[152],"different":[154],"Thus,":[157],"even":[158],"if":[159],"attacker":[161,184],"analyzes":[162],"replaces":[169],"existing":[171,205],"one":[177],"done":[181],"becomes":[185],"invalid.":[186],"Experimental":[187],"results":[188],"show":[189],"completely":[193],"able":[194],"unknown":[199],"variants":[200],"while":[204],"only":[208],"partially":[209]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
