{"id":"https://openalex.org/W2020197043","doi":"https://doi.org/10.1145/2508075.2508083","title":"A secure play store for android","display_name":"A secure play store for android","publication_year":2013,"publication_date":"2013-10-23","ids":{"openalex":"https://openalex.org/W2020197043","doi":"https://doi.org/10.1145/2508075.2508083","mag":"2020197043"},"language":"en","primary_location":{"id":"doi:10.1145/2508075.2508083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508075.2508083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 companion publication for conference on Systems, programming, &amp; applications: software for humanity","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091553419","display_name":"Feng Shen","orcid":"https://orcid.org/0000-0001-7076-766X"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Feng Shen","raw_affiliation_strings":["University at Buffalo, The State University of New York, Buffalo, NY, USA","University at Buffalo; The State University of New York; Buffalo; NY; USA"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, The State University of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"University at Buffalo; The State University of New York; Buffalo; NY; USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091553419"],"corresponding_institution_ids":["https://openalex.org/I63190737"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0915427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8747570514678955},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7383078932762146},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.6090287566184998},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5342086553573608},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.522172212600708},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5199626684188843},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.47348248958587646},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4560849368572235},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4276611804962158},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2773999571800232},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0805390477180481}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8747570514678955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7383078932762146},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.6090287566184998},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5342086553573608},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.522172212600708},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5199626684188843},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.47348248958587646},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4560849368572235},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4276611804962158},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2773999571800232},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0805390477180481},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2508075.2508083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508075.2508083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 companion publication for conference on Systems, programming, &amp; applications: software for humanity","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5099999904632568,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1963971515","https://openalex.org/W1988036170","https://openalex.org/W1994588724","https://openalex.org/W2092298276","https://openalex.org/W2125011234","https://openalex.org/W2142503704"],"related_works":["https://openalex.org/W3121667336","https://openalex.org/W2492640494","https://openalex.org/W4379054516","https://openalex.org/W2384877859","https://openalex.org/W2392961223","https://openalex.org/W2386423843","https://openalex.org/W2791662519","https://openalex.org/W4389273713","https://openalex.org/W3036603968","https://openalex.org/W2334842536"],"abstract_inverted_index":{"As":[0],"Android":[1,4,36],"becomes":[2],"popular,":[3],"security":[5],"acquires":[6],"more":[7,9],"and":[8,30],"attentions.":[10],"This":[11],"paper":[12],"proposes":[13],"a":[14,54],"new":[15,62],"system":[16,64],"design":[17],"strategy":[18],"for":[19],"dissemination":[20],"of":[21],"high":[22],"fidelity":[23],"applications.":[24],"We":[25],"propose":[26],"to":[27,38,51,57],"use":[28],"static":[29],"dynamic":[31],"data":[32],"flow":[33],"analysis":[34],"on":[35],"applications":[37],"detect":[39],"about":[40],"how":[41],"the":[42,77],"apps":[43],"leverage":[44],"users'/enterprises'":[45],"sensitive":[46],"data.":[47],"Also,":[48],"we":[49],"plan":[50],"build":[52],"up":[53],"cloud-based":[55],"back-end":[56],"safeguard":[58],"mobile":[59],"devices.":[60],"The":[61],"secure":[63],"framework":[65],"will":[66],"not":[67],"only":[68],"analyze":[69,76],"an":[70],"individual":[71],"app":[72],"isolatedly,":[73],"but":[74],"also":[75],"correlation":[78],"between":[79],"apps.":[80]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
