{"id":"https://openalex.org/W2055072018","doi":"https://doi.org/10.1145/2660267.2660311","title":"Hey, NSA","display_name":"Hey, NSA","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2055072018","doi":"https://doi.org/10.1145/2660267.2660311","mag":"2055072018"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2660311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087356408","display_name":"Sascha Fahl","orcid":"https://orcid.org/0000-0002-5644-3316"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sascha Fahl","raw_affiliation_strings":["FKIE, Fraunhofer, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"FKIE, Fraunhofer, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069280200","display_name":"Sergej Dechand","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sergej Dechand","raw_affiliation_strings":["University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081153002","display_name":"Henning Perl","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Henning Perl","raw_affiliation_strings":["FKIE, Fraunhofer, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"FKIE, Fraunhofer, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014224000","display_name":"Felix Fischer","orcid":"https://orcid.org/0000-0002-9724-5965"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Felix Fischer","raw_affiliation_strings":["University of Hannover, Hannover, Germany","[University of Hannover, Hannover, Germany.]"],"affiliations":[{"raw_affiliation_string":"University of Hannover, Hannover, Germany","institution_ids":[]},{"raw_affiliation_string":"[University of Hannover, Hannover, Germany.]","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034137269","display_name":"Jaromir Smrcek","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jaromir Smrcek","raw_affiliation_strings":["Zonver, Inc., CR, Czech Rep"],"affiliations":[{"raw_affiliation_string":"Zonver, Inc., CR, Czech Rep","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000498964","display_name":"Matthew Smith","orcid":"https://orcid.org/0000-0002-2724-1379"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthew Smith","raw_affiliation_strings":["University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087356408"],"corresponding_institution_ids":["https://openalex.org/I4210166245"],"apc_list":null,"apc_paid":null,"fwci":4.367,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.95179398,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1143","last_page":"1155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7740961313247681},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7582598924636841},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6527231931686401},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6138954162597656},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6062334775924683},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5257048010826111},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5241308808326721},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4449048340320587},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.347751259803772},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1765994429588318}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7740961313247681},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7582598924636841},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527231931686401},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6138954162597656},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6062334775924683},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5257048010826111},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5241308808326721},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4449048340320587},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.347751259803772},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1765994429588318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2660267.2660311","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660311","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/387650","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/387650","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1865564993","https://openalex.org/W1971497680","https://openalex.org/W2008502641","https://openalex.org/W2010395842","https://openalex.org/W2033811191","https://openalex.org/W2035293310","https://openalex.org/W2041276426","https://openalex.org/W2078872626","https://openalex.org/W2086648145","https://openalex.org/W2096196901","https://openalex.org/W2106510916","https://openalex.org/W2113137917","https://openalex.org/W2114275288","https://openalex.org/W2147048465","https://openalex.org/W2152149943","https://openalex.org/W2160638522","https://openalex.org/W2294157280","https://openalex.org/W2399891510","https://openalex.org/W2602516635"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4284893819","https://openalex.org/W4316881845"],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"are":[2,16],"evolving":[3],"as":[4],"the":[5,18,32,87],"dominant":[6],"computing":[7],"platform":[8],"and":[9,13,28,67],"consequently":[10],"application":[11],"repositories":[12],"app":[14,39,89],"markets":[15,40],"becoming":[17],"prevalent":[19],"paradigm":[20],"for":[21],"deploying":[22],"software.":[23],"Due":[24,83],"to":[25,45,73,80,84,99],"their":[26],"central":[27,66],"trusted":[29,68],"position":[30],"in":[31,86],"software":[33,71],"ecosystem,":[34],"coerced,":[35],"hacked":[36],"or":[37,59],"malicious":[38],"pose":[41],"a":[42,54],"serious":[43],"threat":[44],"user":[46],"security.":[47],"Currently,":[48],"there":[49],"is":[50,96],"little":[51],"that":[52],"hinders":[53],"nation":[55],"state":[56],"adversary":[57],"(NSA)":[58],"other":[60],"powerful":[61],"attackers":[62],"from":[63],"using":[64],"such":[65],"points":[69],"of":[70,78,94],"distribution":[72],"deploy":[74],"customized":[75],"(malicious)":[76],"versions":[77],"apps":[79],"specific":[81],"users.":[82],"intransparencies":[85],"current":[88],"installation":[90],"paradigm,":[91],"this":[92],"kind":[93],"attack":[95],"extremely":[97],"hard":[98],"detect.":[100]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
