{"id":"https://openalex.org/W2600871181","doi":"https://doi.org/10.1145/3052973.3053004","title":"Collusive Data Leak and More","display_name":"Collusive Data Leak and More","publication_year":2017,"publication_date":"2017-03-31","ids":{"openalex":"https://openalex.org/W2600871181","doi":"https://doi.org/10.1145/3052973.3053004","mag":"2600871181"},"language":"en","primary_location":{"id":"doi:10.1145/3052973.3053004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3053004","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3053004&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3053004&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078536980","display_name":"Amiangshu Bosu","orcid":"https://orcid.org/0000-0002-3178-6232"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amiangshu Bosu","raw_affiliation_strings":["Southern Illinois University Carbondale, Carbondale, IL, USA"],"affiliations":[{"raw_affiliation_string":"Southern Illinois University Carbondale, Carbondale, IL, USA","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453028","display_name":"Fang Liu","orcid":"https://orcid.org/0000-0001-8753-3878"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fang Liu","raw_affiliation_strings":["Virginia Tech., Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech., Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034366344","display_name":"Danfeng Yao","orcid":"https://orcid.org/0000-0001-8969-2792"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danfeng (Daphne) Yao","raw_affiliation_strings":["Virginia Tech., Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech., Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100367418","display_name":"Gang Wang","orcid":"https://orcid.org/0000-0002-8910-8979"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Wang","raw_affiliation_strings":["Virginia Tech., Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech., Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078536980"],"corresponding_institution_ids":["https://openalex.org/I110378019"],"apc_list":null,"apc_paid":null,"fwci":12.1258,"has_fulltext":true,"cited_by_count":118,"citation_normalized_percentile":{"value":0.99121433,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"71","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7859876155853271},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6867460012435913},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6107922196388245},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5270490646362305},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47578322887420654},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.4522072970867157},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.4479227066040039},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.42718666791915894},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.4180557131767273},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32420846819877625},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.27845585346221924},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1798633337020874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16213631629943848}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7859876155853271},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6867460012435913},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6107922196388245},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5270490646362305},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47578322887420654},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.4522072970867157},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.4479227066040039},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.42718666791915894},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.4180557131767273},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32420846819877625},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.27845585346221924},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1798633337020874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16213631629943848},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3052973.3053004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3053004","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3053004&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3052973.3053004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3053004","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3053004&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G4713059963","display_name":null,"funder_award_id":"FA8750","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G7128569059","display_name":null,"funder_award_id":"FA8750-15-2-0076","funder_id":"https://openalex.org/F4320337531","funder_display_name":"Defense Sciences Office, DARPA"}],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337531","display_name":"Defense Sciences Office, DARPA","ror":"https://ror.org/0447fe631"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2600871181.pdf","grobid_xml":"https://content.openalex.org/works/W2600871181.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W84941226","https://openalex.org/W190551272","https://openalex.org/W769484497","https://openalex.org/W1536265389","https://openalex.org/W1630356589","https://openalex.org/W1943233084","https://openalex.org/W1979628629","https://openalex.org/W1986480799","https://openalex.org/W1988036170","https://openalex.org/W1994588724","https://openalex.org/W2015933956","https://openalex.org/W2017025011","https://openalex.org/W2018956134","https://openalex.org/W2027538101","https://openalex.org/W2047650489","https://openalex.org/W2048715902","https://openalex.org/W2058180826","https://openalex.org/W2059610428","https://openalex.org/W2060646286","https://openalex.org/W2060692877","https://openalex.org/W2067364868","https://openalex.org/W2070192880","https://openalex.org/W2077202047","https://openalex.org/W2078197322","https://openalex.org/W2082300114","https://openalex.org/W2083755826","https://openalex.org/W2085577046","https://openalex.org/W2094245295","https://openalex.org/W2113115074","https://openalex.org/W2122672392","https://openalex.org/W2153497135","https://openalex.org/W2166743230","https://openalex.org/W2276979642","https://openalex.org/W2277576447","https://openalex.org/W2399034518","https://openalex.org/W2407015181","https://openalex.org/W2571682498","https://openalex.org/W2599937196","https://openalex.org/W2784849271","https://openalex.org/W3136699861","https://openalex.org/W6999986095"],"related_works":["https://openalex.org/W2009938035","https://openalex.org/W3143020802","https://openalex.org/W2783112941","https://openalex.org/W2526398307","https://openalex.org/W2470029541","https://openalex.org/W4387065217","https://openalex.org/W4368275542","https://openalex.org/W2470502009","https://openalex.org/W2538025844","https://openalex.org/W191656338"],"abstract_inverted_index":{"Inter-Component":[0],"Communication":[1],"(ICC)":[2],"provides":[3,113],"a":[4,136,149],"message":[5],"passing":[6],"mechanism":[7],"for":[8],"data":[9,88],"exchange":[10],"between":[11],"Android":[12],"applications.":[13],"It":[14],"has":[15],"been":[16],"long":[17],"believed":[18],"that":[19],"inter-app":[20,86,123,153],"ICCs":[21,154],"can":[22],"be":[23],"abused":[24],"by":[25],"malware":[26],"writers":[27],"to":[28,59,62,98],"launch":[29],"collusion":[30],"attacks":[31],"using":[32],"two":[33],"or":[34],"more":[35],"apps.":[36,93],"However,":[37],"because":[38],"of":[39,42,51,79,102,122,152],"the":[40,49,75,100,127,146],"complexity":[41],"performing":[43],"pairwise":[44],"program":[45],"analysis":[46,106,112],"on":[47,85,119],"apps,":[48,83],"scale":[50],"existing":[52],"analyses":[53],"is":[54],"too":[55],"small":[56],"(e.g.,":[57],"up":[58],"several":[60,132],"hundred)":[61],"produce":[63],"concrete":[64],"security":[65],"evidence.":[66],"In":[67],"this":[68],"paper,":[69],"we":[70,130],"report":[71],"our":[72],"findings":[73],"in":[74],"first":[76],"large-scale":[77,111],"detection":[78],"collusive":[80],"and":[81,107,116,148,155],"vulnerable":[82],"based":[84],"ICC":[87,104,124,139],"flows":[89],"among":[90],"110,150":[91],"real-world":[92,114],"Our":[94],"system":[95],"design":[96],"aims":[97],"balance":[99],"accuracy":[101,144],"static":[103],"resolution/data-flow":[105],"run-time":[108],"scalability.":[109],"This":[110],"evidence":[115],"deep":[117],"insights":[118],"various":[120],"types":[121],"abuse.":[125],"Besides":[126],"empirical":[128],"findings,":[129],"make":[131],"technical":[133],"contributions,":[134],"including":[135],"new":[137],"open-source":[138],"resolution":[140],"tool":[141],"with":[142],"improved":[143],"over":[145],"state-of-the-art,":[147],"large":[150],"database":[151],"their":[156],"attributes.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":19},{"year":2017,"cited_by_count":13}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
