{"id":"https://openalex.org/W2888076836","doi":"https://doi.org/10.1145/3238147.3238221","title":"Dual-force: understanding WebView malware via cross-language forced execution","display_name":"Dual-force: understanding WebView malware via cross-language forced execution","publication_year":2018,"publication_date":"2018-08-20","ids":{"openalex":"https://openalex.org/W2888076836","doi":"https://doi.org/10.1145/3238147.3238221","mag":"2888076836"},"language":"en","primary_location":{"id":"doi:10.1145/3238147.3238221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3238147.3238221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030730343","display_name":"Zhenhao Tang","orcid":"https://orcid.org/0000-0002-4650-6870"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenhao Tang","raw_affiliation_strings":["Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071575216","display_name":"Juan Zhai","orcid":"https://orcid.org/0000-0001-5017-8016"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juan Zhai","raw_affiliation_strings":["Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002720603","display_name":"Minxue Pan","orcid":"https://orcid.org/0000-0002-4011-5350"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minxue Pan","raw_affiliation_strings":["Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007570332","display_name":"Yousra Aafer","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yousra Aafer","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101594068","display_name":"Shiqing Ma","orcid":"https://orcid.org/0000-0003-1551-8948"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shiqing Ma","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362465","display_name":"Xiangyu Zhang","orcid":"https://orcid.org/0000-0003-2138-4608"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiangyu Zhang","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103295231","display_name":"Jianhua Zhao","orcid":"https://orcid.org/0009-0004-3869-5108"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Zhao","raw_affiliation_strings":["Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5030730343"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.1658,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.4504065,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2018","issue":null,"first_page":"714","last_page":"725"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8408603072166443},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7832649946212769},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.7742648124694824},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7214539051055908},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6716756224632263},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5986325740814209},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5446720123291016},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.46721163392066956},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4240024983882904},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.40052998065948486},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.30121588706970215},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2644275426864624}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8408603072166443},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7832649946212769},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.7742648124694824},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7214539051055908},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6716756224632263},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5986325740814209},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5446720123291016},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.46721163392066956},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4240024983882904},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.40052998065948486},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.30121588706970215},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2644275426864624},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3238147.3238221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3238147.3238221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.01RUT_INST:11695743690004646","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:alma.01RUT_INST:11695743690004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/conferencePaper/Dual-Force-understanding-WebView-malware-via-cross-language/991031794683804646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"},{"id":"mag:3041444122","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002283928033328","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320338291","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W124941384","https://openalex.org/W1440076848","https://openalex.org/W1965403193","https://openalex.org/W1977634174","https://openalex.org/W2013856010","https://openalex.org/W2017025011","https://openalex.org/W2055703785","https://openalex.org/W2080696000","https://openalex.org/W2085577046","https://openalex.org/W2121507867","https://openalex.org/W2124430468","https://openalex.org/W2159899121","https://openalex.org/W2164539435","https://openalex.org/W2166743230","https://openalex.org/W2185052282","https://openalex.org/W2514626402","https://openalex.org/W2571682498","https://openalex.org/W2604507227","https://openalex.org/W2618126787","https://openalex.org/W2914982603"],"related_works":["https://openalex.org/W4387456547","https://openalex.org/W2717179875","https://openalex.org/W1566603754","https://openalex.org/W4249118297","https://openalex.org/W4312334973","https://openalex.org/W2808406842","https://openalex.org/W2610659201","https://openalex.org/W65788704","https://openalex.org/W2290206096","https://openalex.org/W2527850347"],"abstract_inverted_index":{"Modern":[0],"Android":[1],"malwares":[2,84],"tend":[3],"to":[4,8,36,62,99,122],"use":[5],"advanced":[6],"techniques":[7],"cover":[9],"their":[10],"malicious":[11,112,130],"behaviors.":[12,131],"They":[13],"usually":[14],"feature":[15],"multi-staged,":[16],"condition-guarded":[17],"and":[18,34,39,56,102],"environment-specific":[19],"payloads.":[20],"An":[21],"increasing":[22],"number":[23],"of":[24,41,59,82,117],"them":[25],"utilize":[26],"WebView,":[27],"particularly":[28],"the":[29,79,123],"two-way":[30],"communications":[31],"between":[32],"Java":[33,55],"JavaScript,":[35],"evade":[37],"detection":[38],"analysis":[40],"existing":[42],"techniques.":[43],"We":[44],"propose":[45],"Dual-Force,":[46],"a":[47,91],"forced":[48,97],"execution":[49,93,98],"technique":[50,89],"which":[51],"simultaneously":[52],"forces":[53],"both":[54],"JavaScript":[57],"code":[58],"WebView":[60,83,119],"applications":[61],"execute":[63],"along":[64],"various":[65],"paths":[66],"without":[67],"requiring":[68],"any":[69,74],"environment":[70],"setup":[71],"or":[72],"providing":[73],"inputs":[75],"manually.":[76],"As":[77],"such,":[78],"hidden":[80],"payloads":[81],"are":[85],"forcefully":[86],"exposed.":[87],"The":[88],"features":[90],"novel":[92],"model":[94],"that":[95,108],"allows":[96],"suppress":[100],"exceptions":[101],"continue":[103],"execution.":[104],"Experimental":[105],"results":[106],"show":[107],"Dual-Force":[109,125],"precisely":[110],"exposes":[111],"payload":[113],"in":[114],"119":[115],"out":[116],"150":[118],"malwares.":[120],"Compared":[121],"state-of-the-art,":[124],"can":[126],"expose":[127],"23%":[128],"more":[129]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
