{"id":"https://openalex.org/W2888121333","doi":"https://doi.org/10.1145/3243734.3243785","title":"ClickShield","display_name":"ClickShield","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2888121333","doi":"https://doi.org/10.1145/3243734.3243785","mag":"2888121333"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243785","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243785","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243785","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243785","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012133804","display_name":"Andrea Possemato","orcid":null},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Andrea Possemato","raw_affiliation_strings":["EURECOM, Biot, France"],"affiliations":[{"raw_affiliation_string":"EURECOM, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017862259","display_name":"Andrea Lanzi","orcid":"https://orcid.org/0000-0002-1544-3758"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Lanzi","raw_affiliation_strings":["Universita' degli Studi di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Universita' degli Studi di Milano, Milan, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052526223","display_name":"Simon P. Chung","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simon Pak Ho Chung","raw_affiliation_strings":["Georgia Tech, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Tech, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Tech, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Tech, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002695158","display_name":"Yanick Fratantonio","orcid":"https://orcid.org/0009-0008-3676-9117"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yanick Fratantonio","raw_affiliation_strings":["EURECOM, Biot, France"],"affiliations":[{"raw_affiliation_string":"EURECOM, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012133804"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":2.6423,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91129086,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1120","last_page":"1136"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7979162931442261},{"id":"https://openalex.org/keywords/compatibility","display_name":"Compatibility (geochemistry)","score":0.614031970500946},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6082541346549988},{"id":"https://openalex.org/keywords/backward-compatibility","display_name":"Backward compatibility","score":0.5710018873214722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46358487010002136},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4496406614780426},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4315004348754883},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.4306083917617798},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.33736491203308105},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29450756311416626},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14046776294708252},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09716653823852539}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979162931442261},{"id":"https://openalex.org/C2778648169","wikidata":"https://www.wikidata.org/wiki/Q967768","display_name":"Compatibility (geochemistry)","level":2,"score":0.614031970500946},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6082541346549988},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.5710018873214722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46358487010002136},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4496406614780426},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4315004348754883},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.4306083917617798},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33736491203308105},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29450756311416626},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14046776294708252},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09716653823852539},{"id":"https://openalex.org/C42360764","wikidata":"https://www.wikidata.org/wiki/Q83588","display_name":"Chemical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243785","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243785","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243785","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3243734.3243785","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243785","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243785","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2888121333.pdf","grobid_xml":"https://content.openalex.org/works/W2888121333.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1437814062","https://openalex.org/W1438616768","https://openalex.org/W1450860479","https://openalex.org/W1582716752","https://openalex.org/W2107881300","https://openalex.org/W2163643194","https://openalex.org/W2404236205","https://openalex.org/W2533895917","https://openalex.org/W2589988760","https://openalex.org/W2603766943","https://openalex.org/W2613975456","https://openalex.org/W2616594753","https://openalex.org/W2700054830","https://openalex.org/W2735107741","https://openalex.org/W2950005498","https://openalex.org/W2963857521"],"related_works":["https://openalex.org/W2103734435","https://openalex.org/W2388297596","https://openalex.org/W128084838","https://openalex.org/W2312598952","https://openalex.org/W2226237160","https://openalex.org/W3131377100","https://openalex.org/W1551703449","https://openalex.org/W2371078869","https://openalex.org/W3176673918","https://openalex.org/W1492220143"],"abstract_inverted_index":{"In":[0,34],"the":[1,8,19,50,87,97,116,136,147,195],"context":[2],"of":[3,96,118,201],"mobile-based":[4],"user-interface":[5],"(UI)":[6],"attacks,":[7],"common":[9],"belief":[10],"is":[11,14,26,177,212],"that":[12,24,193,209,229],"clickjacking":[13,25,78,107,172],"a":[15,61,93,120,155,164,198,225,241],"solved":[16],"problem.":[17],"On":[18],"contrary,":[20],"this":[21,90,112],"paper":[22],"shows":[23,58],"still":[27],"an":[28,101],"open":[29],"problem":[30],"for":[31,52,100,132],"mobile":[32],"devices.":[33],"fact,":[35],"all":[36,221],"known":[37,222],"academic":[38],"and":[39,65,103,138,157,183,187,190,203,238],"industry":[40],"solutions":[41],"are":[42],"either":[43],"not":[44,47],"effective":[45,102],"or":[46],"applicable":[48],"in":[49],"real-world":[51,186,227],"backward":[53,126,216],"compatibility":[54,127,217],"reasons.":[55],"This":[56,175],"work":[57,91],"that,":[59],"as":[60],"consequence,":[62],"even":[63],"popular":[64],"sensitive":[66],"apps":[67,85],"like":[68],"Google":[69],"Play":[70],"Store":[71],"remain,":[72],"to":[73,114,134,144,170,214,219],"date,":[74],"completely":[75],"unprotected":[76],"from":[77],"attacks.":[79,108],"After":[80],"gathering":[81],"insights":[82],"into":[83],"how":[84],"use":[86,111],"user":[88,148],"interface,":[89],"performs":[92],"systematic":[94],"exploration":[95,113],"design":[98,117,130],"space":[99],"practical":[104],"protection":[105,173],"against":[106,162],"We":[109,152],"then":[110],"guide":[115],"ClickShield,":[119],"new":[121],"defensive":[122],"mechanism.":[123],"To":[124],"address":[125,215],"issues,":[128],"our":[129,210,236],"allows":[131],"overlays":[133],"cover":[135],"screen,":[137],"we":[139,158,233],"employ":[140],"image":[141],"analysis":[142],"techniques":[143],"determine":[145],"whether":[146],"could":[149],"be":[150],"confused.":[151],"have":[153,159,234],"implemented":[154],"prototype":[156],"tested":[160],"it":[161,184,239],"ClickBench,":[163],"newly":[165],"developed":[166,235],"benchmark":[167],"specifically":[168],"tailored":[169],"stress-test":[171],"solutions.":[174],"dataset":[176],"constituted":[178],"by":[179],"104":[180],"test":[181],"cases,":[182],"includes":[185],"simulated":[188],"benign":[189],"malicious":[191],"examples":[192],"evaluate":[194],"system":[196,211],"across":[197],"wide":[199],"range":[200],"legitimate":[202],"attack":[204],"scenarios.":[205],"The":[206],"results":[207],"show":[208],"able":[213],"concerns,":[218],"detect":[220],"attacks":[223],"(including":[224],"never-seen-before":[226],"malware":[228],"was":[230],"published":[231],"after":[232],"solution),":[237],"introduces":[240],"negligible":[242],"overhead.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-08-31T00:00:00"}
