{"id":"https://openalex.org/W2125099630","doi":"https://doi.org/10.1145/2557547.2557563","title":"PREC","display_name":"PREC","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2125099630","doi":"https://doi.org/10.1145/2557547.2557563","mag":"2125099630"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012310328","display_name":"Tsung-Hsuan Ho","orcid":"https://orcid.org/0000-0002-6737-0386"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tsung-Hsuan Ho","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003701528","display_name":"Daniel J. Dean","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Dean","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102976136","display_name":"Xiaohui Gu","orcid":"https://orcid.org/0000-0001-8811-0084"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaohui Gu","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024034310","display_name":"William Enck","orcid":"https://orcid.org/0000-0002-3043-8092"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Enck","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012310328"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":6.4053,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.97343904,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"187","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9463392496109009},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9102819561958313},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8454699516296387},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5546565651893616},{"id":"https://openalex.org/keywords/de-facto","display_name":"De facto","score":0.4696958065032959},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.46963974833488464},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.4608689248561859},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.4172819256782532},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4133909046649933},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36279571056365967},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18990179896354675},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.11427581310272217}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9463392496109009},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9102819561958313},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8454699516296387},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5546565651893616},{"id":"https://openalex.org/C2992317946","wikidata":"https://www.wikidata.org/wiki/Q712144","display_name":"De facto","level":2,"score":0.4696958065032959},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.46963974833488464},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.4608689248561859},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.4172819256782532},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4133909046649933},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36279571056365967},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18990179896354675},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.11427581310272217},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310013","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W6091113","https://openalex.org/W97539848","https://openalex.org/W157156687","https://openalex.org/W176206521","https://openalex.org/W186343359","https://openalex.org/W206495011","https://openalex.org/W1535244464","https://openalex.org/W1554663460","https://openalex.org/W1584620713","https://openalex.org/W1603548863","https://openalex.org/W1679913846","https://openalex.org/W1832277845","https://openalex.org/W1865564993","https://openalex.org/W1910686388","https://openalex.org/W1956767865","https://openalex.org/W1988194087","https://openalex.org/W1990649188","https://openalex.org/W1997931601","https://openalex.org/W2013856010","https://openalex.org/W2041276426","https://openalex.org/W2053449529","https://openalex.org/W2060782570","https://openalex.org/W2061036215","https://openalex.org/W2062340141","https://openalex.org/W2066220442","https://openalex.org/W2068583268","https://openalex.org/W2081867537","https://openalex.org/W2091540464","https://openalex.org/W2091681703","https://openalex.org/W2105842205","https://openalex.org/W2107135371","https://openalex.org/W2115175195","https://openalex.org/W2117030266","https://openalex.org/W2118372007","https://openalex.org/W2125011234","https://openalex.org/W2125109784","https://openalex.org/W2128217000","https://openalex.org/W2129860818","https://openalex.org/W2137365926","https://openalex.org/W2137569638","https://openalex.org/W2146189323","https://openalex.org/W2149665581","https://openalex.org/W2156744053","https://openalex.org/W2158963586","https://openalex.org/W2161085373","https://openalex.org/W2161963160","https://openalex.org/W2164539435","https://openalex.org/W2167240430","https://openalex.org/W2183247595","https://openalex.org/W2399891510","https://openalex.org/W4245176872","https://openalex.org/W4253234854","https://openalex.org/W4388297464","https://openalex.org/W6603957951","https://openalex.org/W6608422190","https://openalex.org/W6639864006","https://openalex.org/W6678648185"],"related_works":["https://openalex.org/W2030594396","https://openalex.org/W2535098331","https://openalex.org/W4280640835","https://openalex.org/W2885334669","https://openalex.org/W2202104725","https://openalex.org/W2354546531","https://openalex.org/W2068689476","https://openalex.org/W4242664608","https://openalex.org/W4255366506","https://openalex.org/W2611874565"],"abstract_inverted_index":{"Application":[0],"markets":[1,27],"such":[2,63],"as":[3],"the":[4,9,15,137,142],"Google":[5],"Play":[6],"Store":[7,12],"and":[8,80,92,110,120,134,171],"Apple":[10],"App":[11],"have":[13,107],"become":[14],"de":[16],"facto":[17],"method":[18],"of":[19,151],"distributing":[20],"software":[21],"to":[22,31,103],"mobile":[23],"devices.":[24],"While":[25],"official":[26],"dedicate":[28],"significant":[29],"resources":[30],"detecting":[32],"malware,":[33],"state-of-the-art":[34],"malware":[35,139,155],"detection":[36,156,170],"can":[37,68,90,131],"be":[38],"easily":[39],"circumvented":[40],"using":[41],"logic":[42],"bombs":[43],"or":[44],"checks":[45],"for":[46,165],"an":[47],"emulated":[48],"environment.":[49],"We":[50,106],"present":[51],"a":[52],"Practical":[53],"Root":[54],"Exploit":[55],"Containment":[56],"(PREC)":[57],"framework":[58],"that":[59,129],"protects":[60],"users":[61],"from":[62,73],"conditional":[64],"malicious":[65,124],"behavior.":[66],"PREC":[67,89,109,130,158],"dynamically":[69],"identify":[70],"system":[71,83],"calls":[72,84],"high-risk":[74],"components":[75],"(e.g.,":[76],"third-party":[77],"native":[78],"libraries)":[79],"execute":[81],"those":[82],"within":[85],"isolated":[86],"threads.":[87],"Hence,":[88],"detect":[91,133],"stop":[93,135],"root":[94,122,168],"exploits":[95],"with":[96],"high":[97],"accuracy":[98],"while":[99,140],"imposing":[100],"low":[101],"interference":[102],"benign":[104,118],"applications.":[105,125],"implemented":[108],"evaluated":[111],"our":[112],"methodology":[113],"on":[114],"140":[115],"most":[116],"popular":[117],"applications":[119],"10":[121],"exploit":[123,169],"Our":[126],"results":[127],"show":[128],"successfully":[132],"all":[136],"tested":[138],"reducing":[141],"false":[143],"alarm":[144],"rates":[145],"by":[146],"more":[147],"than":[148],"one":[149],"order":[150],"magnitude":[152],"over":[153],"traditional":[154],"algorithms.":[157],"is":[159],"light-weight,":[160],"which":[161],"makes":[162],"it":[163],"practical":[164],"runtime":[166],"on-device":[167],"containment.":[172]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
