{"id":"https://openalex.org/W2295915781","doi":"https://doi.org/10.1109/tmc.2015.2444847","title":"Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware","display_name":"Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295915781","doi":"https://doi.org/10.1109/tmc.2015.2444847","mag":"2295915781"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2015.2444847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2015.2444847","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kclpure.kcl.ac.uk/portal/en/publications/a6f4fae7-07a9-4862-a75b-9ded7f2e6a2f","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004037873","display_name":"Guillermo Su\u00e1rez\u2010Tangil","orcid":"https://orcid.org/0000-0002-0455-2553"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Guillermo Suarez-Tangil","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070199150","display_name":"Juan Tapiador","orcid":"https://orcid.org/0000-0002-4573-3967"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Tapiador","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Leganes, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053363798","display_name":"Flavio Lombardi","orcid":"https://orcid.org/0000-0003-0723-7847"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flavio Lombardi","raw_affiliation_strings":["IAC-CNR, via dei Taurini 19, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"IAC-CNR, via dei Taurini 19, Rome, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Bell Labs, Cyber Security Research, Nozay, Paris, France","Maths Department, University of Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Cyber Security Research, Nozay, Paris, France","institution_ids":[]},{"raw_affiliation_string":"Maths Department, University of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004037873"],"corresponding_institution_ids":["https://openalex.org/I50357001"],"apc_list":null,"apc_paid":null,"fwci":2.3167,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.89674445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8855020999908447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8405585289001465},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6476519703865051},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5834981799125671},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.514274537563324},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5120194554328918},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47479313611984253},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4563823342323303},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.44533589482307434},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.439753919839859},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4348069727420807},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4292529821395874},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41190141439437866},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38514044880867004},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3593320846557617},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.138584703207016}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8855020999908447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8405585289001465},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6476519703865051},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5834981799125671},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.514274537563324},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5120194554328918},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47479313611984253},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4563823342323303},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.44533589482307434},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.439753919839859},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4348069727420807},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4292529821395874},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41190141439437866},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38514044880867004},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3593320846557617},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.138584703207016},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tmc.2015.2444847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2015.2444847","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:kclpure.kcl.ac.uk:openaire/a6f4fae7-07a9-4862-a75b-9ded7f2e6a2f","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/a6f4fae7-07a9-4862-a75b-9ded7f2e6a2f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Suarez-Tangil, G, Tapiador, J, Lombardi, F & Di Pietro, R 2016, 'Alterdroid : Differential Fault Analysis of Obfuscated Smartphone Malware', IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 789 - 802. https://doi.org/10.1109/TMC.2015.2444847","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:e-archivo.uc3m.es:10016/35941","is_oa":true,"landing_page_url":"http://hdl.handle.net/10016/35941","pdf_url":null,"source":{"id":"https://openalex.org/S4306400817","display_name":"e-Archivo (Carlos III University of Madrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I50357001","host_organization_name":"Universidad Carlos III de Madrid","host_organization_lineage":["https://openalex.org/I50357001"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:kclpure.kcl.ac.uk:openaire/a6f4fae7-07a9-4862-a75b-9ded7f2e6a2f","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/a6f4fae7-07a9-4862-a75b-9ded7f2e6a2f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Suarez-Tangil, G, Tapiador, J, Lombardi, F & Di Pietro, R 2016, 'Alterdroid : Differential Fault Analysis of Obfuscated Smartphone Malware', IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 789 - 802. https://doi.org/10.1109/TMC.2015.2444847","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3326789655","display_name":null,"funder_award_id":"CAM Grant S2013/ICE-3095","funder_id":"https://openalex.org/F4320313831","funder_display_name":"Comunidad de Madrid"},{"id":"https://openalex.org/G6086540875","display_name":null,"funder_award_id":"TIN2013-46469-R","funder_id":"https://openalex.org/F4320321837","funder_display_name":"Ministerio de Econom\u00eda y Competitividad"}],"funders":[{"id":"https://openalex.org/F4320313831","display_name":"Comunidad de Madrid","ror":null},{"id":"https://openalex.org/F4320321837","display_name":"Ministerio de Econom\u00eda y Competitividad","ror":"https://ror.org/034900433"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W11174961","https://openalex.org/W34283345","https://openalex.org/W110636400","https://openalex.org/W116656696","https://openalex.org/W347692644","https://openalex.org/W1549081716","https://openalex.org/W1585891904","https://openalex.org/W1647671624","https://openalex.org/W1865564993","https://openalex.org/W1892326160","https://openalex.org/W1963971515","https://openalex.org/W1980489138","https://openalex.org/W1982887803","https://openalex.org/W2004876093","https://openalex.org/W2016422503","https://openalex.org/W2018382289","https://openalex.org/W2031411490","https://openalex.org/W2041276426","https://openalex.org/W2046843253","https://openalex.org/W2049208027","https://openalex.org/W2050344266","https://openalex.org/W2065304158","https://openalex.org/W2066220442","https://openalex.org/W2068583268","https://openalex.org/W2070386561","https://openalex.org/W2091540464","https://openalex.org/W2095470000","https://openalex.org/W2122672392","https://openalex.org/W2123519624","https://openalex.org/W2125011234","https://openalex.org/W2127671294","https://openalex.org/W2131523719","https://openalex.org/W2132683645","https://openalex.org/W2144984544","https://openalex.org/W2147048465","https://openalex.org/W2152149943","https://openalex.org/W2164539435","https://openalex.org/W2166462894","https://openalex.org/W2176830056","https://openalex.org/W2224173700","https://openalex.org/W2294170611","https://openalex.org/W2784849271","https://openalex.org/W4245435048","https://openalex.org/W4285719527","https://openalex.org/W4298167390","https://openalex.org/W6635006261","https://openalex.org/W6636915900","https://openalex.org/W6639024520","https://openalex.org/W6681525158","https://openalex.org/W6685576885","https://openalex.org/W6689098333","https://openalex.org/W6697491314","https://openalex.org/W6748014466"],"related_works":["https://openalex.org/W4285507391","https://openalex.org/W2610659201","https://openalex.org/W65788704","https://openalex.org/W3107556205","https://openalex.org/W2900526031","https://openalex.org/W2805262980","https://openalex.org/W2765174411","https://openalex.org/W4387947354","https://openalex.org/W3037087970","https://openalex.org/W2067547021"],"abstract_inverted_index":{"Malware":[0],"for":[1,81],"smartphones":[2],"has":[3,25],"rocketed":[4],"over":[5,193],"the":[6,12,104,108,141,147,171,180,200],"last":[7],"years.":[8],"Market":[9],"operators":[10],"face":[11],"challenge":[13],"of":[14,52,92,102,114,118,123,134,164,179,204],"keeping":[15],"their":[16],"stores":[17],"free":[18],"from":[19],"malicious":[20,58],"apps,":[21],"a":[22,77,112,121,154,177],"task":[23],"that":[24,62,136,160],"become":[26],"increasingly":[27],"complex":[28],"as":[29,90],"malware":[30,39,49,87,197],"developers":[31],"are":[32,144,183],"progressively":[33],"using":[34],"advanced":[35],"techniques":[36],"to":[37],"defeat":[38],"detection":[40],"tools.":[41],"One":[42],"such":[43,83],"technique":[44],"commonly":[45],"observed":[46],"in":[47,60,99,132,140,170],"recent":[48],"samples":[50,198],"consists":[51,101],"hiding":[53],"and":[54,111,146,176,196,202],"obfuscating":[55],"modules":[56],"containing":[57],"functionality":[59],"places":[61],"static":[63],"analysis":[64,79],"tools":[65],"overlook":[66],"(e.g.,":[67],"within":[68],"data":[69],"objects).":[70],"In":[71],"this":[72],"paper,":[73],"we":[74],"describe":[75],"Alterdroid,":[76],"dynamic":[78],"approach":[80],"detecting":[82],"hidden":[84,165],"or":[85,138],"obfuscated":[86],"components":[88],"distributed":[89],"parts":[91],"an":[93],"app":[94,110,143],"package.":[95],"The":[96,185],"key":[97],"idea":[98],"Alterdroid":[100,192],"analyzing":[103],"behavioral":[105],"differences":[106,131],"between":[107],"original":[109],"number":[113,122],"automatically":[115],"generated":[116],"versions":[117],"it,":[119],"where":[120],"modifications":[124],"(faults)":[125],"have":[126],"been":[127],"carefully":[128],"injected.":[129],"Observable":[130],"terms":[133],"activities":[135],"appear":[137],"vanish":[139],"modified":[142],"recorded,":[145],"resulting":[148],"differential":[149],"signature":[150],"is":[151],"analyzed":[152],"through":[153],"pattern-matching":[155],"process":[156],"driven":[157],"by":[158,190],"rules":[159],"relate":[161],"different":[162],"types":[163],"functionalities":[166],"with":[167],"patterns":[168],"found":[169],"signature.":[172],"A":[173],"thorough":[174],"justification":[175],"description":[178],"proposed":[181],"model":[182],"provided.":[184],"extensive":[186],"experimental":[187],"results":[188],"obtained":[189],"testing":[191],"relevant":[194],"apps":[195],"support":[199],"quality":[201],"viability":[203],"our":[205],"proposal.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
