{"id":"https://openalex.org/W2292287463","doi":"https://doi.org/10.1109/malware.2015.7413695","title":"Counterfeit mobile devices - the duck test","display_name":"Counterfeit mobile devices - the duck test","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2292287463","doi":"https://doi.org/10.1109/malware.2015.7413695","mag":"2292287463"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2015.7413695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2015.7413695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014262891","display_name":"John T. O\u2019Brien","orcid":"https://orcid.org/0000-0002-0837-5080"},"institutions":[{"id":"https://openalex.org/I4210109507","display_name":"Microsoft (Ireland)","ror":"https://ror.org/017fqk185","country_code":"IE","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210109507"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"John O'brien","raw_affiliation_strings":["MMO Product Safety and Security Microsoft, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"MMO Product Safety and Security Microsoft, Dublin, Ireland","institution_ids":["https://openalex.org/I4210109507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111649643","display_name":"Kimmo Lehtonen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109507","display_name":"Microsoft (Ireland)","ror":"https://ror.org/017fqk185","country_code":"IE","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210109507"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Kimmo Lehtonen","raw_affiliation_strings":["MMO Product Safety and Security Microsoft, Ireland"],"affiliations":[{"raw_affiliation_string":"MMO Product Safety and Security Microsoft, Ireland","institution_ids":["https://openalex.org/I4210109507"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014262891"],"corresponding_institution_ids":["https://openalex.org/I4210109507"],"apc_list":null,"apc_paid":null,"fwci":0.2872,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5911847,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"144","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9672999978065491,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.955994188785553},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.7539482116699219},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.687079906463623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6556469798088074},{"id":"https://openalex.org/keywords/purchasing","display_name":"Purchasing","score":0.5284654498100281},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5102865695953369},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4495037794113159},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35159236192703247},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2460838258266449},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18994760513305664},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16883406043052673}],"concepts":[{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.955994188785553},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.7539482116699219},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.687079906463623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6556469798088074},{"id":"https://openalex.org/C2778813691","wikidata":"https://www.wikidata.org/wiki/Q1369832","display_name":"Purchasing","level":2,"score":0.5284654498100281},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5102865695953369},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4495037794113159},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35159236192703247},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2460838258266449},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18994760513305664},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16883406043052673},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2015.7413695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2015.7413695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3191226418","https://openalex.org/W2357749344","https://openalex.org/W1539823648","https://openalex.org/W2362200800","https://openalex.org/W4323356230","https://openalex.org/W4290078996","https://openalex.org/W4372352523","https://openalex.org/W1579156572","https://openalex.org/W4387328388","https://openalex.org/W3013232399"],"abstract_inverted_index":{"A":[0],"well-known":[1],"proverb":[2,45,57],"says":[3],"\u201cIf":[4],"it":[5,19],"looks":[6,94],"like":[7,11,16,68,75,85],"a":[8,12,17,21,40,51,62,69,76,86,101,247],"duck,":[9,18],"walks":[10],"duck":[13],"and":[14,42,80,89,111,115,135,155,165,190,205,226,252],"quacks":[15],"is":[20,64],"duck\u201d.":[22],"This":[23,92],"statement":[24],"raises":[25],"an":[26],"interesting":[27],"approach":[28],"to":[29,46,58,239,258,265],"identifying":[30,108],"counterfeit":[31,102,117,147,189,262],"mobile":[32,150],"devices.":[33,175,192,244],"If":[34],"we":[35,53],"substitute":[36],"the":[37,44,47,56,124,127,142,171,185,188,194,202,210,214,222,229,232,236,260],"\u201cduck\u201d":[38],"for":[39],"device":[41,63,134,163],"map":[43],"following":[48],"characteristics":[49,98,125],"of":[50,123,173,187,231,249],"device,":[52],"can":[54,99],"use":[55],"help":[59],"validate":[60],"if":[61],"counterfeit:":[65],"1)":[66],"Looks":[67],"duck:":[70,77,87],"user":[71],"interface":[72],"2)":[73],"Walks":[74],"safety,":[78],"compliance":[79],"physical":[81],"testing":[82,233],"3)":[83],"Quacks":[84],"OS":[88],"pre-installed":[90],"applications":[91],"paper":[93,105,139,179],"at":[95],"how":[96,114,156],"these":[97,109,243],"identify":[100],"device.":[103],"The":[104,138],"starts":[106],"by":[107,132,161,213,242],"characteristics,":[110],"then":[112],"determining":[113],"where":[116],"devices":[118],"deviate":[119],"in":[120],"their":[121],"representation":[122],"from":[126],"legitimate":[128],"norm,":[129],"as":[130,199,201],"identified":[131],"official":[133],"software":[136,195],"manufacturers.":[137],"also":[140],"explores":[141],"risks":[143,158,237,261],"associated":[144],"with":[145,246],"purchasing":[146],"or":[148,169],"substandard":[149,191],"devices,":[151],"suppositions":[152],"on":[153,167,184,221,228],"why":[154],"those":[157],"are":[159],"exploited":[160],"illegitimate":[162,174],"manufacturers,":[164],"mitigations":[166,251],"reducing":[168],"removing":[170],"availability":[172],"In":[176],"particular,":[177],"this":[178],"will:":[180],"Provide":[181],"background":[182],"information":[183],"sourcing":[186],"Discuss":[193,209],"extraction":[196],"technologies":[197],"used":[198],"well":[200],"malware":[203],"scanning":[204],"analysis":[206],"tests":[207,211],"performed.":[208],"performed":[212],"Microsoft":[215],"Mobile":[216],"Operations":[217],"Product":[218],"Safety":[219],"team":[220],"devices'":[223],"hardware.":[224],"Analyze":[225],"report":[227],"results":[230],"performed;":[234],"specifically":[235],"posed":[238],"end":[240,266],"users":[241],"Finish":[245],"discussion":[248],"some":[250],"steps":[253],"that":[254],"could":[255],"be":[256],"taken":[257],"minimize":[259],"phones":[263],"pose":[264],"users.":[267]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
