{"id":"https://openalex.org/W2116669623","doi":"https://doi.org/10.1145/2590296.2590335","title":"VirtualSwindle","display_name":"VirtualSwindle","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2116669623","doi":"https://doi.org/10.1145/2590296.2590335","mag":"2116669623"},"language":"en","primary_location":{"id":"doi:10.1145/2590296.2590335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090070759","display_name":"Collin Mulliner","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Collin Mulliner","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085358980","display_name":"William Robertson","orcid":"https://orcid.org/0000-0002-6968-0273"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Robertson","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077875821","display_name":"Engin Kirda","orcid":"https://orcid.org/0000-0001-9988-6873"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Engin Kirda","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090070759"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":4.6581,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.95671296,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"459","last_page":"470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7925601005554199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7334263324737549},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6359473466873169},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.6081975698471069},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5207552909851074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5185766220092773},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4990072250366211},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2474023997783661}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7925601005554199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7334263324737549},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6359473466873169},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.6081975698471069},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5207552909851074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5185766220092773},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4990072250366211},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2474023997783661},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2590296.2590335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5013714063","display_name":null,"funder_award_id":"N000141310102","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W94181602","https://openalex.org/W1481758559","https://openalex.org/W1522939654","https://openalex.org/W1555215938","https://openalex.org/W1865564993","https://openalex.org/W1963971515","https://openalex.org/W2099438928","https://openalex.org/W2104948281","https://openalex.org/W2146871983","https://openalex.org/W2150204531","https://openalex.org/W2397457163","https://openalex.org/W2399597187","https://openalex.org/W4250874986","https://openalex.org/W4299301436","https://openalex.org/W6601277159","https://openalex.org/W6633254993"],"related_works":["https://openalex.org/W2894765413","https://openalex.org/W769484497","https://openalex.org/W4321636160","https://openalex.org/W4386955307","https://openalex.org/W2506128599","https://openalex.org/W2794864670","https://openalex.org/W2597596645","https://openalex.org/W2510180442","https://openalex.org/W4383744737","https://openalex.org/W2887633424"],"abstract_inverted_index":{"Since":[0],"its":[1],"introduction,":[2],"Android's":[3],"in-app":[4,12,71,99,152],"billing":[5,13,32,72],"service":[6,14,73],"has":[7,44],"quickly":[8],"gained":[9],"popularity.":[10],"The":[11],"allows":[15],"users":[16],"to":[17,41,53,116,163],"pay":[18],"for":[19,35],"options,":[20],"services,":[21],"subscriptions,":[22],"and":[23,43,110,120,127,158],"virtual":[24],"goods":[25],"from":[26],"within":[27],"mobile":[28],"apps":[29,94,107],"themselves.":[30],"In-app":[31],"is":[33,39,156],"attractive":[34],"developers":[36],"because":[37],"it":[38],"easy":[40],"integrate,":[42],"the":[45,48,65,70,90],"advantage":[46],"that":[47,95,103,146],"developer":[49],"does":[50],"not":[51],"need":[52],"be":[54,160],"concerned":[55],"with":[56],"managing":[57],"financial":[58],"transactions.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63,79,141],"present":[64],"first":[66],"fully-automated":[67],"attack":[68],"against":[69,84,151],"on":[74,138],"Android.":[75],"Using":[76],"our":[77,85,139],"prototype,":[78],"conducted":[80],"a":[81,143],"robustness":[82],"study":[83],"attack,":[86],"analyzing":[87],"85":[88],"of":[89,98,105,131,135],"most":[91],"popular":[92,119],"Android":[93],"make":[96],"use":[97],"billing.":[100,153],"We":[101,113],"found":[102],"60%":[104],"these":[106],"were":[108,114],"easily":[109,161],"automatically":[111],"crackable.":[112],"able":[115],"bypass":[117],"highly":[118],"prominent":[121],"games":[122],"such":[123],"as":[124],"Angry":[125],"Birds":[126],"Temple":[128],"Run,":[129],"each":[130],"which":[132],"have":[133],"millions":[134],"users.":[136],"Based":[137],"study,":[140],"developed":[142],"defensive":[144],"technique":[145,155],"specifically":[147],"counters":[148],"automated":[149],"attacks":[150],"Our":[154],"lightweight":[157],"can":[159],"added":[162],"existing":[164],"applications.":[165]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
