{"id":"https://openalex.org/W2886976570","doi":"https://doi.org/10.1109/tifs.2019.2932228","title":"Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection","display_name":"Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection","publication_year":2019,"publication_date":"2019-07-31","ids":{"openalex":"https://openalex.org/W2886976570","doi":"https://doi.org/10.1109/tifs.2019.2932228","mag":"2886976570"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2932228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2932228","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.1808.04218","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100373723","display_name":"Xiao Chen","orcid":"https://orcid.org/0000-0002-4224-6450"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Xiao Chen","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Swinburne Univ. of Technology#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne Univ. of Technology#TAB#","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006173142","display_name":"Chaoran Li","orcid":"https://orcid.org/0000-0001-9118-5386"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chaoran Li","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081805488","display_name":"Derui Wang","orcid":"https://orcid.org/0000-0003-1388-7715"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Derui Wang","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076576641","display_name":"Sheng Wen","orcid":"https://orcid.org/0000-0003-0655-666X"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sheng Wen","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400217","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0001-7835-9871"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Epping, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Epping, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Faculty of Science Engineering and Technology, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Department of Computer Science and Engineering, University at Buffalo, State University of New York, Buffalo, NY, USA","Dept. of Comput. Sci. & Eng., Univ. at Buffalo-State Univ. of New York, Buffalo, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University at Buffalo, State University of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Univ. at Buffalo-State Univ. of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100373723"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":1.9701611,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86649905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":null,"first_page":"987","last_page":"1001"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8932716846466064},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8520649075508118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8186976909637451},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7435536980628967},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6798461675643921},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.6271607875823975},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5924204587936401},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5877478718757629},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.572723925113678},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5273602604866028},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4538986086845398},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.41416653990745544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38918033242225647},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20192769169807434},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19435453414916992},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.18343058228492737}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8932716846466064},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8520649075508118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8186976909637451},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7435536980628967},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6798461675643921},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.6271607875823975},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5924204587936401},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5877478718757629},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.572723925113678},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5273602604866028},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4538986086845398},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.41416653990745544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38918033242225647},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20192769169807434},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19435453414916992},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.18343058228492737}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2019.2932228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2932228","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:3da55058-9c95-42ff-923d-85f0d3d32476/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/451071","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, Vol. 15 (2019), pp. 987-1001","raw_type":""},{"id":"doi:10.48550/arxiv.1808.04218","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1808.04218","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:2886976570","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.48550/arxiv.1808.04218","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1808.04218","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W121173099","https://openalex.org/W2002478203","https://openalex.org/W2007857904","https://openalex.org/W2020224119","https://openalex.org/W2038296020","https://openalex.org/W2060537671","https://openalex.org/W2092942461","https://openalex.org/W2095470000","https://openalex.org/W2116668505","https://openalex.org/W2122672392","https://openalex.org/W2125908420","https://openalex.org/W2141554582","https://openalex.org/W2146502635","https://openalex.org/W2151298633","https://openalex.org/W2168103835","https://openalex.org/W2171389360","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2293940443","https://openalex.org/W2308726246","https://openalex.org/W2460937040","https://openalex.org/W2585223762","https://openalex.org/W2591788621","https://openalex.org/W2601621757","https://openalex.org/W2617675595","https://openalex.org/W2725069636","https://openalex.org/W2735533479","https://openalex.org/W2736899637","https://openalex.org/W2738015883","https://openalex.org/W2744095836","https://openalex.org/W2772265308","https://openalex.org/W2775261393","https://openalex.org/W2775467454","https://openalex.org/W2777449390","https://openalex.org/W2949190449","https://openalex.org/W2950864148","https://openalex.org/W2963207607","https://openalex.org/W2963461515","https://openalex.org/W2963777745","https://openalex.org/W2963834268","https://openalex.org/W2963857521","https://openalex.org/W2964153729","https://openalex.org/W2999585024","https://openalex.org/W3103836116","https://openalex.org/W4240601173","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6681435938","https://openalex.org/W6684801420","https://openalex.org/W6732855312","https://openalex.org/W6734028196","https://openalex.org/W6747385936","https://openalex.org/W6747489574"],"related_works":["https://openalex.org/W3152624640","https://openalex.org/W2772265308","https://openalex.org/W3005813672","https://openalex.org/W2767571811","https://openalex.org/W3083836500","https://openalex.org/W2747287993","https://openalex.org/W2611170103","https://openalex.org/W1978762841","https://openalex.org/W2786564904","https://openalex.org/W2765325603","https://openalex.org/W2806548100","https://openalex.org/W2731848812","https://openalex.org/W2794495257","https://openalex.org/W3165433688","https://openalex.org/W3122262291","https://openalex.org/W2904179520","https://openalex.org/W2981331478","https://openalex.org/W3021364840","https://openalex.org/W2981087594","https://openalex.org/W3000431252"],"abstract_inverted_index":{"Machine":[0],"learning":[1,17,135,167],"based":[2,168],"solutions":[3],"have":[4],"been":[5],"successfully":[6,131],"employed":[7],"for":[8],"automatic":[9],"detection":[10,207,218],"of":[11,104,122,239],"malware":[12,71,106,206,217],"on":[13,47,75,172,202],"Android.":[14],"However,":[15],"machine":[16,134,166],"models":[18],"lack":[19],"robustness":[20],"to":[21,32,142,152,193,223,230,241],"adversarial":[22,39,102,145,156],"examples,":[23],"which":[24],"are":[25,87],"crafted":[26,158],"by":[27,63,111,159],"adding":[28],"carefully":[29],"chosen":[30],"perturbations":[31,58,125,179],"the":[33,38,57,112,133,144,155,216,245],"normal":[34],"inputs.":[35],"So":[36],"far,":[37],"examples":[40,103,146,157],"can":[41,59,130,162,180],"only":[42,60],"deceive":[43,132,164],"detectors":[44,72,169],"that":[45,100,129,170,215],"rely":[46,73,171],"syntactic":[48],"features":[49,77,174],"(e.g.,":[50],"requested":[51],"permissions,":[52],"API":[53],"calls,":[54],"etc),":[55],"and":[56,107,210,227],"be":[61,182,242],"implemented":[62,183],"simply":[64],"modifying":[65],"application's":[66],"manifest.":[67],"While":[68],"recent":[69,165,196],"Android":[70,105,127,191,205],"more":[74],"semantic":[76,173],"from":[78,195,221,228],"Dalvik":[79,187],"bytecode":[80,188],"rather":[81,189],"than":[82,190],"manifest,":[83],"existing":[84,153],"attacking/defending":[85],"methods":[86],"no":[88],"longer":[89],"effective.":[90],"In":[91,150],"this":[92,116],"paper,":[93],"we":[94,118],"introduce":[95],"a":[96,120,236],"new":[97],"attacking":[98],"method":[99,121,161],"generates":[101],"evades":[108],"being":[109],"detected":[110],"current":[113],"models.":[114],"To":[115],"end,":[117],"propose":[119],"applying":[123],"optimal":[124],"onto":[126,185],"APK":[128],"detectors.":[136,197],"We":[137,198],"develop":[138],"an":[139],"automated":[140],"tool":[141],"generate":[143],"without":[147],"human":[148],"intervention.":[149],"contrast":[151],"works,":[154],"our":[160,200],"also":[163,181],"such":[175],"as":[176],"control-flow-graph.":[177],"The":[178],"directly":[184],"APK's":[186],"manifest":[192],"evade":[194],"demonstrate":[199],"attack":[201],"two":[203],"state-of-the-art":[204],"schemes,":[208],"MaMaDroid":[209],"Drebin.":[211],"Our":[212],"results":[213],"show":[214],"rates":[219],"decreased":[220],"96%":[222],"0%":[224,231],"in":[225,232],"MaMaDroid,":[226],"97%":[229],"Drebin,":[233],"with":[234],"just":[235],"small":[237],"number":[238],"codes":[240],"inserted":[243],"into":[244],"APK.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
