{"id":"https://openalex.org/W3004651308","doi":"https://doi.org/10.1109/tr.2019.2924677","title":"DAMBA: Detecting Android Malware by ORGB Analysis","display_name":"DAMBA: Detecting Android Malware by ORGB Analysis","publication_year":2020,"publication_date":"2020-02-04","ids":{"openalex":"https://openalex.org/W3004651308","doi":"https://doi.org/10.1109/tr.2019.2924677","mag":"3004651308"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2019.2924677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2019.2924677","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085221201","display_name":"Weizhe Zhang","orcid":"https://orcid.org/0000-0003-4783-876X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weizhe Zhang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083751301","display_name":"Huanran Wang","orcid":"https://orcid.org/0000-0003-2957-6874"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanran Wang","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin,China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048182595","display_name":"Hui He","orcid":"https://orcid.org/0000-0002-6494-775X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui He","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin,China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, Penn State University, University Park, USA","College of Information Sciences and Technology, Penn State University, University Park, PA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Penn State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Sciences and Technology, Penn State University, University Park, PA, USA#TAB#","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085221201"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":6.399,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.97480696,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"69","issue":"1","first_page":"55","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8660787343978882},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8164738416671753},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6866358518600464},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6703318357467651},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.5949971675872803},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5933734178543091},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5578606128692627},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.45367664098739624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4474320113658905},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17679744958877563}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8660787343978882},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8164738416671753},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6866358518600464},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6703318357467651},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.5949971675872803},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5933734178543091},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5578606128692627},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.45367664098739624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4474320113658905},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17679744958877563}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2019.2924677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2019.2924677","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1053123284","display_name":null,"funder_award_id":"61672186","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5594798832","display_name":null,"funder_award_id":"61872110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W121173099","https://openalex.org/W128561509","https://openalex.org/W135031542","https://openalex.org/W1445387515","https://openalex.org/W1560182867","https://openalex.org/W1647869403","https://openalex.org/W1863385414","https://openalex.org/W1877117362","https://openalex.org/W1910918478","https://openalex.org/W1971497680","https://openalex.org/W1977634457","https://openalex.org/W1980874575","https://openalex.org/W1985686072","https://openalex.org/W1990600049","https://openalex.org/W1990649188","https://openalex.org/W2014390890","https://openalex.org/W2021930057","https://openalex.org/W2060692877","https://openalex.org/W2077202047","https://openalex.org/W2088479623","https://openalex.org/W2096196901","https://openalex.org/W2104839588","https://openalex.org/W2122672392","https://openalex.org/W2126359798","https://openalex.org/W2132874238","https://openalex.org/W2164539435","https://openalex.org/W2168103835","https://openalex.org/W2244535412","https://openalex.org/W2308726246","https://openalex.org/W2396915202","https://openalex.org/W2398484989","https://openalex.org/W2518936114","https://openalex.org/W2601621757","https://openalex.org/W2806548100","https://openalex.org/W2963204406","https://openalex.org/W4245027182","https://openalex.org/W4255701787","https://openalex.org/W4298098758","https://openalex.org/W6603356336","https://openalex.org/W6604960882","https://openalex.org/W6605247924","https://openalex.org/W6605502080","https://openalex.org/W6628532452","https://openalex.org/W6712337529","https://openalex.org/W6712745783","https://openalex.org/W6745798105"],"related_works":["https://openalex.org/W4388157251","https://openalex.org/W4214835142","https://openalex.org/W2951900017","https://openalex.org/W3113849890","https://openalex.org/W2028727337","https://openalex.org/W4390188637","https://openalex.org/W4206406691","https://openalex.org/W4200629572","https://openalex.org/W4226281314","https://openalex.org/W4312234627"],"abstract_inverted_index":{"With":[0],"the":[1,30,34,42,71,93,115,175,190,207],"rapid":[2],"development":[3],"of":[4,13,76,95,111,117,158],"smart":[5],"devices,":[6],"mobile":[7,31],"phones":[8],"have":[9],"permeated":[10],"many":[11],"aspects":[12],"our":[14],"life.":[15],"Unfortunately,":[16],"their":[17,212],"widespread":[18],"popularization":[19],"attracted":[20],"endless":[21],"attacks":[22,210],"that":[23,187,219],"are":[24],"serious":[25],"threats":[26],"for":[27,45,105,147],"users.":[28],"As":[29],"system":[32,63],"with":[33],"largest":[35],"market":[36],"share,":[37],"Android":[38,49,87],"has":[39],"already":[40],"become":[41],"hardest":[43],"hit":[44],"years.":[46],"To":[47,133],"Detect":[48],"Malware":[50],"by":[51,121],"ORGB":[52],"Analysis,":[53],"in":[54,139,171],"this":[55,112,140],"paper,":[56,141],"we":[57,81,142],"present":[58,143],"DAMBA,":[59],"a":[60,66,85,154],"novel":[61],"prototype":[62],"based":[64,196],"on":[65,153,197],"C/S":[67],"architecture.":[68],"DAMBA":[69,150,188,202],"extracts":[70],"static":[72],"and":[73,99,137,161,174,211],"dynamic":[74],"features":[75],"apps.":[77,165],"For":[78],"further":[79],"analyses,":[80],"propose":[82],"TANMAD":[83],"algorithm,":[84,90],"two-step":[86],"malware":[88,97,106,209,218],"detection":[89,167,177],"which":[91,125,194],"reduces":[92],"range":[94],"possible":[96],"families,":[98],"then":[100],"utilizes":[101],"subgraph":[102],"isomorphism":[103],"matching":[104],"detection.":[107],"The":[108,166],"key":[109],"novelty":[110],"paper":[113],"is":[114,126,151,179,195,203],"modeling":[116],"object":[118,128],"reference":[119,129],"information":[120],"constructing":[122],"directed":[123],"graphs,":[124],"called":[127],"graph":[130],"birthmarks":[131],"(ORGB).":[132],"achieve":[134],"better":[135],"efficiency":[136],"accuracy,":[138],"several":[144],"optimization":[145],"strategies":[146],"hybrid":[148],"analysis.":[149],"evaluated":[152],"large":[155],"real-world":[156],"dataset":[157],"2239":[159],"malicious":[160],"1000":[162],"popular":[163],"benign":[164],"accuracy":[168],"reaches":[169],"100%":[170],"most":[172],"cases,":[173],"average":[176],"time":[178],"less":[180],"than":[181],"5":[182],"s.":[183],"Experimental":[184],"results":[185],"show":[186],"outperforms":[189],"well-known":[191],"detector,":[192],"McAfee,":[193],"signature":[198],"recognition.":[199],"In":[200],"addition,":[201],"demonstrated":[204],"to":[205],"resist":[206],"known":[208],"variants":[213],"efficiently,":[214],"as":[215,217],"well":[216],"uses":[220],"obfuscation":[221],"techniques.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
