{"id":"https://openalex.org/W2111525908","doi":"https://doi.org/10.1145/2627393.2627395","title":"ViewDroid","display_name":"ViewDroid","publication_year":2014,"publication_date":"2014-07-22","ids":{"openalex":"https://openalex.org/W2111525908","doi":"https://doi.org/10.1145/2627393.2627395","mag":"2111525908"},"language":"en","primary_location":{"id":"doi:10.1145/2627393.2627395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2627393.2627395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM conference on Security and privacy in wireless &amp; mobile networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425802","display_name":"Fangfang Zhang","orcid":"https://orcid.org/0000-0001-6516-9673"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fangfang Zhang","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101650393","display_name":"Heqing Huang","orcid":"https://orcid.org/0000-0001-8113-3531"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Heqing Huang","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100425802"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":19.2158,"has_fulltext":false,"cited_by_count":173,"citation_normalized_percentile":{"value":0.99600718,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.810981035232544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7942661046981812},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6370213031768799},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5904217958450317},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5750858783721924},{"id":"https://openalex.org/keywords/humanoid-robot","display_name":"Humanoid robot","score":0.5351313948631287},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.526897668838501},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.46810388565063477},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.46093693375587463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41375380754470825},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3472999334335327},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33711403608322144},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2661260664463043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12367904186248779}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.810981035232544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7942661046981812},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6370213031768799},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5904217958450317},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5750858783721924},{"id":"https://openalex.org/C60692881","wikidata":"https://www.wikidata.org/wiki/Q584529","display_name":"Humanoid robot","level":3,"score":0.5351313948631287},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.526897668838501},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.46810388565063477},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.46093693375587463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41375380754470825},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3472999334335327},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33711403608322144},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2661260664463043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12367904186248779},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2627393.2627395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2627393.2627395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM conference on Security and privacy in wireless &amp; mobile networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3890354391","display_name":null,"funder_award_id":"CCF-1320605","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G6468984503","display_name":null,"funder_award_id":"CNS-1223710","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G6471190695","display_name":null,"funder_award_id":"W911NF-13-1-0421","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6956173379","display_name":null,"funder_award_id":"W911NF-09-1-0525","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W101604734","https://openalex.org/W110636400","https://openalex.org/W150085617","https://openalex.org/W183494281","https://openalex.org/W1567046609","https://openalex.org/W1578479379","https://openalex.org/W1863385414","https://openalex.org/W1971497680","https://openalex.org/W1995739251","https://openalex.org/W2038159719","https://openalex.org/W2064038877","https://openalex.org/W2068583268","https://openalex.org/W2081561469","https://openalex.org/W2088479623","https://openalex.org/W2089083048","https://openalex.org/W2107697055","https://openalex.org/W2108551812","https://openalex.org/W2111295912","https://openalex.org/W2113137917","https://openalex.org/W2116952712","https://openalex.org/W2117583561","https://openalex.org/W2125011234","https://openalex.org/W2145657894","https://openalex.org/W2147405597","https://openalex.org/W2187373861"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2128507946","https://openalex.org/W2728713145","https://openalex.org/W2131332603","https://openalex.org/W2470502009","https://openalex.org/W2072617132","https://openalex.org/W4360993664"],"abstract_inverted_index":{"In":[0,63],"recent":[1],"years,":[2],"as":[3],"mobile":[4,13,20,75],"smart":[5],"device":[6],"sales":[7],"grow":[8],"quickly,":[9],"the":[10,52,89,105,166],"development":[11],"of":[12,107,173],"applications":[14],"(apps)":[15],"keeps":[16],"accelerating,":[17],"so":[18],"does":[19],"app":[21,28,46,54,76,124],"repackaging.":[22],"Attackers":[23],"can":[24,41,133,149],"easily":[25],"repackage":[26],"an":[27],"under":[29],"their":[30],"own":[31],"names":[32],"or":[33,100],"embed":[34],"advertisements":[35],"to":[36,59,74,145],"earn":[37],"pecuniary":[38],"profits.":[39],"They":[40],"also":[42,163],"modify":[43],"a":[44,69,138,154],"popular":[45],"by":[47],"inserting":[48],"malicious":[49],"payloads":[50],"into":[51],"original":[53],"and":[55,85,88,93,159,169],"leverage":[56],"its":[57],"popularity":[58],"accelerate":[60],"malware":[61],"propagation.":[62],"this":[64,131],"paper,":[65],"we":[66],"propose":[67],"ViewDroid,":[68],"user":[70,82,98],"interface":[71],"based":[72],"approach":[73],"repackaging":[77],"detection.":[78],"Android":[79,112,135],"apps":[80,94,136,152],"are":[81,95,175],"interaction":[83],"intensive":[84],"event":[86],"dominated,":[87],"interactions":[90],"between":[91],"users":[92],"performed":[96],"through":[97],"interface,":[99],"views.":[101,125],"This":[102],"observation":[103],"inspires":[104],"design":[106],"our":[108],"new":[109],"birthmark":[110,132],"for":[111],"apps,":[113],"namely,":[114],"feature":[115],"view":[116],"graph,":[117],"which":[118],"captures":[119],"users'":[120],"navigation":[121],"behavior":[122],"across":[123],"Our":[126,161],"experimental":[127],"results":[128],"demonstrate":[129],"that":[130,165],"characterize":[134],"from":[137],"higher":[139],"level":[140],"abstraction,":[141],"making":[142],"it":[143],"resilient":[144],"code":[146],"obfuscation.":[147],"ViewDroid":[148,174],"detect":[150],"repackaged":[151],"at":[153],"large":[155],"scale,":[156],"both":[157,176],"effectively":[158],"efficiently.":[160],"experiments":[162],"show":[164],"false":[167,170],"positive":[168],"negative":[171],"rates":[172],"very":[177],"low.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":25},{"year":2018,"cited_by_count":23},{"year":2017,"cited_by_count":23},{"year":2016,"cited_by_count":22},{"year":2015,"cited_by_count":19},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
