{"id":"https://openalex.org/W2059383234","doi":"https://doi.org/10.1145/2420950.2420968","title":"Cloud-based push-styled mobile botnets","display_name":"Cloud-based push-styled mobile botnets","publication_year":2012,"publication_date":"2012-12-03","ids":{"openalex":"https://openalex.org/W2059383234","doi":"https://doi.org/10.1145/2420950.2420968","mag":"2059383234"},"language":"en","primary_location":{"id":"doi:10.1145/2420950.2420968","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101793752","display_name":"Shuang Zhao","orcid":"https://orcid.org/0000-0002-3423-8805"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuang Zhao","raw_affiliation_strings":["Xi'an Jiatong University, China and Chinese Academy of Sciences, China","Xi'an Jiatong University, China and Chinese Academy of Sciences, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiatong University, China and Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I87445476","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Xi'an Jiatong University, China and Chinese Academy of Sciences, China#TAB#","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012129385","display_name":"Patrick P. C. Lee","orcid":"https://orcid.org/0000-0002-4501-4364"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Patrick P. C. Lee","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong","The Chinese University of Hong Kong, Hong Kong#TAB#"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong#TAB#","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068489266","display_name":"John C. S. Lui","orcid":"https://orcid.org/0000-0001-7466-0384"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"John C. S. Lui","raw_affiliation_strings":["The Chinese University of Hong Kong, Hong Kong","The Chinese University of Hong Kong, Hong Kong#TAB#"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"The Chinese University of Hong Kong, Hong Kong#TAB#","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["Xi'an Jiatong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiatong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003951925","display_name":"Xiaobo Ma","orcid":"https://orcid.org/0000-0002-0934-5035"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaobo Ma","raw_affiliation_strings":["Xi'an Jiatong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiatong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101516220","display_name":"Jing Tao","orcid":"https://orcid.org/0009-0009-3911-4260"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Tao","raw_affiliation_strings":["Xi'an Jiatong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiatong University, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101793752"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":8.5103,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.97973297,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.964203953742981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7224944829940796},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6311559677124023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.614325761795044},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5781039595603943},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5772426128387451},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46879157423973083},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.46812501549720764},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4382963180541992},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.33811384439468384},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3235660791397095},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14155468344688416}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.964203953742981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7224944829940796},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6311559677124023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.614325761795044},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5781039595603943},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5772426128387451},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46879157423973083},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.46812501549720764},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4382963180541992},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33811384439468384},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3235660791397095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14155468344688416}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2420950.2420968","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420968","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2459280394","display_name":null,"funder_award_id":"6.09E+15","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W187693235","https://openalex.org/W1517918327","https://openalex.org/W1583098994","https://openalex.org/W1593031142","https://openalex.org/W1775772884","https://openalex.org/W1820098372","https://openalex.org/W1885428543","https://openalex.org/W1971497680","https://openalex.org/W2021926456","https://openalex.org/W2038563874","https://openalex.org/W2098563793","https://openalex.org/W2104586046","https://openalex.org/W2106287567","https://openalex.org/W2115026336","https://openalex.org/W2130216882","https://openalex.org/W2168248885","https://openalex.org/W2238764994","https://openalex.org/W2322605814","https://openalex.org/W2554125638","https://openalex.org/W2614733950","https://openalex.org/W6630936843","https://openalex.org/W6638648299","https://openalex.org/W6639303437"],"related_works":["https://openalex.org/W2020017125","https://openalex.org/W2772425874","https://openalex.org/W3134680667","https://openalex.org/W1993701525","https://openalex.org/W1414275305","https://openalex.org/W2548979822","https://openalex.org/W2130216882","https://openalex.org/W1969164381","https://openalex.org/W2463022069","https://openalex.org/W2579847648"],"abstract_inverted_index":{"Given":[0,169],"the":[1,70,101,153,170],"popularity":[2],"of":[3,25,39,173,182],"smartphones":[4],"and":[5,17,51,63,84,95,109,115,118,138,164],"mobile":[6,8,28,183],"devices,":[7],"botnets":[9,29,184],"are":[10],"becoming":[11],"an":[12,144],"emerging":[13],"threat":[14],"to":[15,58,76,80,98,125,151,155],"users":[16],"network":[18],"operators.":[19],"We":[20,73,90,128],"propose":[21],"a":[22,37,48,65,92,123,135],"new":[23,49],"form":[24],"cloud-based":[26],"push-styled":[27],"that":[30,100,179],"exploits":[31],"today's":[32],"push":[33,174],"notification":[34,175],"services":[35],"as":[36,159],"means":[38],"command":[40,50,110,124],"dissemination.":[41],"To":[42],"motivate":[43],"its":[44,78,85,140],"practicality,":[45],"we":[46,148,177],"present":[47,74],"control":[52],"(C&C)":[53],"channel":[54],"using":[55],"Google's":[56],"Cloud":[57],"Device":[59],"Messaging":[60],"(C2DM)":[61],"service,":[62],"develop":[64],"C2DM":[66,93,102,136],"botnet":[67,82,103],"specifically":[68],"for":[69],"Android":[71],"platform.":[72],"strategies":[75],"enhance":[77],"scalability":[79],"large":[81],"coverage":[83],"resilience":[86],"against":[87],"service":[88],"disruption.":[89],"prototype":[91],"botnet,":[94,137],"perform":[96],"evaluation":[97],"show":[99],"is":[104],"stealthy":[105],"in":[106,113,120,142],"generating":[107],"heartbeat":[108],"traffic,":[111],"resource-efficient":[112],"bandwidth":[114],"power":[116],"consumptions,":[117],"controllable":[119],"quickly":[121],"delivering":[122],"all":[126],"bots.":[127],"also":[129],"discuss":[130,149],"how":[131,150],"one":[132],"may":[133],"deploy":[134],"demonstrate":[139],"feasibility":[141],"launching":[143],"SMS-Spam-and-Click":[145],"attack.":[146],"Lastly,":[147],"generalize":[152],"design":[154],"other":[156],"platforms,":[157],"such":[158],"iOS":[160],"or":[161],"Window-based":[162],"systems,":[163],"recommend":[165],"possible":[166],"defense":[167],"methods.":[168],"wide":[171],"adoption":[172],"services,":[176],"believe":[178],"this":[180],"type":[181],"requires":[185],"special":[186],"attention":[187],"from":[188],"our":[189],"community.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
