{"id":"https://openalex.org/W2024385792","doi":"https://doi.org/10.1145/2557547.2557558","title":"DIVILAR","display_name":"DIVILAR","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2024385792","doi":"https://doi.org/10.1145/2557547.2557558","mag":"2024385792"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557558","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100606053","display_name":"Wu Zhou","orcid":"https://orcid.org/0000-0002-5917-1723"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wu Zhou","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101788794","display_name":"Zhi Wang","orcid":"https://orcid.org/0009-0009-2484-0796"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhi Wang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA","Florida State University , Tallahassee , FL , USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]},{"raw_affiliation_string":"Florida State University , Tallahassee , FL , USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088790914","display_name":"Yajin Zhou","orcid":"https://orcid.org/0000-0001-7610-4736"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yajin Zhou","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109035300","display_name":"Xuxian Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xuxian Jiang","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100606053"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":4.0758,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.94594907,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"199","last_page":"210"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8774725794792175},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8764371871948242},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.5470335483551025},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5468152165412903},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5436238050460815},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5088046193122864},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4540690779685974},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3388217091560364},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1287541687488556},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09362143278121948}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8774725794792175},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8764371871948242},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.5470335483551025},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5468152165412903},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5436238050460815},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5088046193122864},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4540690779685974},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3388217091560364},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1287541687488556},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09362143278121948}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557558","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W4015096","https://openalex.org/W9193867","https://openalex.org/W116627068","https://openalex.org/W183494281","https://openalex.org/W199976391","https://openalex.org/W1492832459","https://openalex.org/W1508225132","https://openalex.org/W1522250664","https://openalex.org/W1529311848","https://openalex.org/W1535984709","https://openalex.org/W1541744005","https://openalex.org/W1578479379","https://openalex.org/W1744150050","https://openalex.org/W1813040609","https://openalex.org/W1865564993","https://openalex.org/W1963971515","https://openalex.org/W1971497680","https://openalex.org/W1979628629","https://openalex.org/W1988036170","https://openalex.org/W1992221070","https://openalex.org/W2014977809","https://openalex.org/W2031902842","https://openalex.org/W2041276426","https://openalex.org/W2049629426","https://openalex.org/W2053008565","https://openalex.org/W2060041228","https://openalex.org/W2064038877","https://openalex.org/W2064435654","https://openalex.org/W2080696000","https://openalex.org/W2096196901","https://openalex.org/W2096921767","https://openalex.org/W2098010707","https://openalex.org/W2103380811","https://openalex.org/W2105412867","https://openalex.org/W2112731379","https://openalex.org/W2113137917","https://openalex.org/W2125011234","https://openalex.org/W2128389850","https://openalex.org/W2143588523","https://openalex.org/W2144882558","https://openalex.org/W2158718504","https://openalex.org/W2168851767","https://openalex.org/W2171264329","https://openalex.org/W2398484989","https://openalex.org/W2399891510","https://openalex.org/W2798401351","https://openalex.org/W6600156937","https://openalex.org/W6629507766","https://openalex.org/W6681290789"],"related_works":["https://openalex.org/W2616814339","https://openalex.org/W2401561631","https://openalex.org/W2399597187","https://openalex.org/W2088620127","https://openalex.org/W2052507375","https://openalex.org/W2743348030","https://openalex.org/W4285356403","https://openalex.org/W4211236094","https://openalex.org/W2947629119","https://openalex.org/W1963799338"],"abstract_inverted_index":{"App":[0],"repackaging":[1],"remains":[2],"a":[3,35,55,62,99,151],"serious":[4],"threat":[5],"to":[6,39,70,103,121,171,190],"the":[7,18,72,87,108,116,145,191],"emerging":[8],"mobile":[9],"app":[10,46,53],"ecosystem.":[11],"Previous":[12],"solutions":[13],"have":[14,149],"mostly":[15],"focused":[16],"on":[17],"postmortem":[19],"detection":[20],"of":[21,42,79,118,123,140,153,185],"repackaged":[22],"apps":[23,44],"by":[24],"measuring":[25],"similarity":[26],"among":[27],"apps.":[28],"In":[29],"this":[30,76,95,137],"paper,":[31],"we":[32,97,133],"propose":[33],"DIVILAR,":[34],"virtualization-based":[36],"protection":[37],"scheme":[38],"enable":[40],"self-defense":[41],"Android":[43,52],"against":[45,162],"repackaging.":[47],"Specifically,":[48],"it":[49],"re-encodes":[50],"an":[51],"in":[54],"diversified":[56],"virtual":[57,68,119,128],"instruction":[58,131],"set":[59],"and":[60,114,129,142,165,187,194],"uses":[61],"specialized":[63],"execute":[64],"engine":[65,110],"for":[66,90,111,180],"these":[67,169],"instructions":[69,120],"run":[71,195],"protected":[73],"app.":[74],"However,":[75],"extra":[77,138],"layer":[78,139],"execution":[80,109,141],"may":[81],"cause":[82],"significant":[83],"performance":[84,146,175],"overhead,":[85],"rendering":[86],"solution":[88],"unacceptable":[89],"daily":[91,181],"use.":[92],"To":[93],"address":[94],"challenge,":[96],"leverage":[98],"light-weight":[100],"hooking":[101],"mechanism":[102],"hook":[104],"into":[105],"Dalvik":[106,112,124,130],"VM,":[107],"bytecode,":[113],"piggy-back":[115],"decoding":[117],"that":[122,158],"bytecode.":[125],"By":[126],"compositing":[127],"execution,":[132],"can":[134],"effectively":[135],"eliminate":[136],"significantly":[143],"reduce":[144],"overhead.":[147],"We":[148],"implemented":[150],"prototype":[152],"DIVILAR.":[154],"Our":[155],"evaluation":[156,176],"shows":[157],"DIVILAR":[159],"is":[160],"resilient":[161],"existing":[163],"static":[164],"dynamic":[166],"analysis,":[167],"including":[168],"specific":[170],"VM-based":[172],"protection.":[173],"Further":[174],"demonstrates":[177],"its":[178],"efficiency":[179],"use":[182],"(an":[183],"average":[184],"16.2":[186],"8.9":[188],"increase":[189],"start":[192],"time":[193],"time,":[196],"respectively).":[197]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
