{"id":"https://openalex.org/W4281633660","doi":"https://doi.org/10.1142/s0218126622502243","title":"On Shielding Android\u2019s Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication","display_name":"On Shielding Android\u2019s Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication","publication_year":2022,"publication_date":"2022-06-02","ids":{"openalex":"https://openalex.org/W4281633660","doi":"https://doi.org/10.1142/s0218126622502243"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126622502243","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622502243","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"S. Pradeepkumar Duraisamy","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Pradeepkumar Duraisamy","raw_affiliation_strings":["Vellore Institute of Technology, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology, Chennai, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032629337","display_name":"S. Geetha","orcid":"https://orcid.org/0000-0002-6850-9423"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Geetha","raw_affiliation_strings":["Vellore Institute of Technology, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology, Chennai, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027459275","display_name":"Xiaochun Cheng","orcid":"https://orcid.org/0000-0003-0371-9646"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaochun Cheng","raw_affiliation_strings":["Department of Computer Science, Middlesex University, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Middlesex University, London, UK","institution_ids":["https://openalex.org/I60488453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002855381","display_name":"Seifedine Kadry","orcid":"https://orcid.org/0000-0002-1939-4842"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Seifedine Kadry","raw_affiliation_strings":["Department of Applied Data Science, Noroff University College, Kristiansand, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Applied Data Science, Noroff University College, Kristiansand, Norway","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002855381"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4467,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56872551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"31","issue":"13","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7188690900802612},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.631845235824585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6171316504478455},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4703388810157776},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4286929965019226},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.41992995142936707},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4183172285556793},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41140666604042053},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18184751272201538}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7188690900802612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.631845235824585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6171316504478455},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4703388810157776},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4286929965019226},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.41992995142936707},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4183172285556793},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41140666604042053},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18184751272201538}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126622502243","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126622502243","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1264845515","https://openalex.org/W1510845095","https://openalex.org/W2003276999","https://openalex.org/W2012755172","https://openalex.org/W2014235365","https://openalex.org/W2052087935","https://openalex.org/W2166743230","https://openalex.org/W2241404614","https://openalex.org/W2551095084","https://openalex.org/W2619760961","https://openalex.org/W2795289301","https://openalex.org/W2883454930","https://openalex.org/W2887397852","https://openalex.org/W2888034788","https://openalex.org/W2947876441","https://openalex.org/W3085238546","https://openalex.org/W3160974549","https://openalex.org/W3208807485","https://openalex.org/W3217476834"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W3152891574","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4312334973"],"abstract_inverted_index":{"PendingIntent":[0],"(PI)":[1],"is":[2,79,165],"an":[3,21,61,150,228],"authority":[4],"to":[5,35,68,84,87,104,125],"use":[6,85],"the":[7,13,28,45,49,52,71,74,80,96,106,145,170,194,203,224,238,246],"sender\u2019s":[8],"permissions":[9],"and":[10,17,39,128,148,160,192,249],"identity":[11],"by":[12,135],"receiver.":[14],"Unprotected":[15],"broadcast":[16],"PI":[18,50,89,107,195,218],"s":[19,90],"with":[20,178,196,205],"empty":[22],"base":[23],"intent":[24],"are":[25],"some":[26],"of":[27,73,95,102,121,156,230],"vulnerable":[29],"features":[30],"that":[31,64,210],"a":[32,182,187],"malware":[33,92,221],"utilizes":[34],"perform":[36],"unauthorized":[37,126],"access":[38,127],"privilege":[40,129],"escalation":[41],"(PE)":[42],"attacks":[43],"on":[44,144],"PI.":[46,75],"To":[47],"protect":[48,88],"from":[51,91,169,220],"above":[53],"attacks,":[54],"this":[55],"paper":[56],"proposes":[57],"Sticky[Formula:":[58,76,137,197,211],"see":[59,77,119,138,198,209,212,234],"text]tent,":[60],"application-layer":[62],"solution":[63,226],"uses":[65],"ownership-based":[66],"authentication":[67],"dynamically":[69,219],"control":[70],"accessibility":[72],"text]tent":[78,199,213],"first":[81],"holistic":[82],"work":[83],"ownership-types":[86],"attacks.":[93],"Some":[94],"existing":[97,171],"solutions":[98],"follow":[99],"static":[100,174],"analysis":[101,175],"binary":[103],"identify":[105],"vulnerability.":[108],"Through":[109],"our":[110,142],"empirical":[111],"study":[112],"using":[113,136],"23,922":[114],"apps,":[115],"we":[116,184,207],"found":[117,149],"[Formula:":[118],"text]17%":[120],"PI-based":[122,190],"vulnerabilities":[123],"leads":[124],"escalation,":[130],"which":[131,164],"can":[132,208],"be":[133],"solved":[134],"text]tent.":[139],"We":[140],"tested":[141],"model":[143,176],"state-of-art":[146],"applications":[147,191],"impressive":[151],"harmonic":[152],"mean":[153],"(F1-score)":[154],"value":[155],"0.95\u20130.97":[157],"for":[158],"intra":[159],"inter":[161],"component":[162],"analysis,":[163],"0.4\u20130.18":[166],"percentage":[167],"more":[168],"RAICC\u2019s":[172],"(a":[173],"instrumented":[177],"IccTA/Amandroid)":[179],"result.":[180],"As":[181],"proof-of-concept,":[183],"have":[185],"taken":[186],"few":[188],"real-world":[189],"replaced":[193],"library.":[200],"By":[201],"comparing":[202],"result":[204],"RAICC,":[206],"performs":[214],"better":[215],"in":[216,245],"protecting":[217],"access.":[222],"Though":[223],"proposed":[225],"has":[227],"overhead":[229,244],"0.005%":[231],"per":[232],"5[Formula:":[233],"text]min":[235],"application":[236],"test,":[237],"end-user":[239],"suffers":[240],"only":[241],"negligible":[242],"execution":[243],"screen":[247],"response":[248],"notification":[250],"delays.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
