{"id":"https://openalex.org/W2084939909","doi":"https://doi.org/10.1145/2642937.2642977","title":"Droidmarking","display_name":"Droidmarking","publication_year":2014,"publication_date":"2014-09-15","ids":{"openalex":"https://openalex.org/W2084939909","doi":"https://doi.org/10.1145/2642937.2642977","mag":"2084939909"},"language":"en","primary_location":{"id":"doi:10.1145/2642937.2642977","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642937.2642977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036782950","display_name":"Chuangang Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chuangang Ren","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437976","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-5624-2987"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036782950"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":4.3672,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.95254904,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"635","last_page":"646"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216756582260132},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7738230228424072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7054529786109924},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.680418848991394},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6571382284164429},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5190013647079468},{"id":"https://openalex.org/keywords/assertion","display_name":"Assertion","score":0.4441979229450226},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23794770240783691},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10814625024795532},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07510519027709961}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216756582260132},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7738230228424072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7054529786109924},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.680418848991394},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6571382284164429},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5190013647079468},{"id":"https://openalex.org/C40422974","wikidata":"https://www.wikidata.org/wiki/Q741248","display_name":"Assertion","level":2,"score":0.4441979229450226},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23794770240783691},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10814625024795532},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07510519027709961},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2642937.2642977","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642937.2642977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1309080098","display_name":null,"funder_award_id":"W911NF-09-1-0525 (MURI)","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G2086314269","display_name":null,"funder_award_id":"W911NF-13-1-0421 (MURI)","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G3890354391","display_name":null,"funder_award_id":"CCF-1320605","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G7544796852","display_name":null,"funder_award_id":"61170281","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7641299044","display_name":null,"funder_award_id":"61100226","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W54139165","https://openalex.org/W101604734","https://openalex.org/W109909280","https://openalex.org/W110636400","https://openalex.org/W183494281","https://openalex.org/W199976391","https://openalex.org/W576037686","https://openalex.org/W1489356009","https://openalex.org/W1578479379","https://openalex.org/W1862568640","https://openalex.org/W1863385414","https://openalex.org/W1899609882","https://openalex.org/W1971497680","https://openalex.org/W2019763646","https://openalex.org/W2064038877","https://openalex.org/W2084201645","https://openalex.org/W2086968222","https://openalex.org/W2088479623","https://openalex.org/W2096196901","https://openalex.org/W2108551812","https://openalex.org/W2113137917","https://openalex.org/W2125011234","https://openalex.org/W2146567535","https://openalex.org/W2165069015","https://openalex.org/W2399891510","https://openalex.org/W2523687998"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Software":[0],"plagiarism":[1],"in":[2,25,29,113],"Android":[3,16,71],"markets":[4],"(app":[5],"repackaging)":[6],"is":[7,153,167],"raising":[8],"serious":[9],"concerns":[10],"about":[11],"the":[12,15,75,82,111],"health":[13],"of":[14,77],"ecosystem.":[17],"Existing":[18],"app":[19,56,94,176],"repackaging":[20,57,95,177],"detection":[21,26,96],"techniques":[22],"fall":[23],"short":[24],"efficiency":[27],"and":[28,42,53,80,100,141,170],"resilience":[30,102],"to":[31,38,103,130,139,173],"circumventing":[32],"attacks;":[33],"this":[34],"allows":[35],"repackaged":[36],"apps":[37,72],"be":[39],"widely":[40],"propagated":[41],"causes":[43],"extensive":[44],"damages":[45],"before":[46],"being":[47],"detected.":[48],"To":[49],"overcome":[50],"these":[51],"difficulties":[52],"instantly":[54],"thwart":[55],"threats,":[58],"we":[59],"devise":[60],"a":[61,148,156,168],"new":[62],"dynamic":[63],"software":[64],"watermarking":[65,109],"technique":[66,172],"-":[67,69],"Droidmarking":[68,114,152,166],"for":[70,90],"that":[73,119,165],"combines":[74],"efforts":[76],"all":[78],"stakeholders":[79],"achieves":[81],"following":[83],"three":[84],"goals:":[85],"(1)":[86],"copyright":[87,144],"ownership":[88],"assertion":[89],"developers,":[91],"(2)":[92],"real-time":[93],"on":[97,155],"user":[98],"devices,":[99],"(3)":[101],"evading":[104,131],"attacks.":[105,132],"Distinct":[106],"from":[107],"existing":[108],"techniques,":[110],"watermarks":[112],"are":[115,122,128],"non-stealthy,":[116],"which":[117],"means":[118],"watermark":[120,143,150],"locations":[121],"not":[123],"intentionally":[124],"concealed,":[125],"yet":[126],"still":[127],"impervious":[129],"This":[133],"property":[134],"effectively":[135,174],"enables":[136],"normal":[137],"users":[138],"recover":[140],"verify":[142],"information":[145],"without":[146],"requiring":[147],"confidential":[149],"recognizer.":[151],"based":[154],"primitive":[157],"called":[158],"self-decrypting":[159],"code":[160],"(SDC).":[161],"Our":[162],"evaluations":[163],"show":[164],"feasible":[169],"robust":[171],"impede":[175],"with":[178],"relatively":[179],"small":[180],"performance":[181],"overhead.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
