{"id":"https://openalex.org/W2911955316","doi":"https://doi.org/10.1145/3301285","title":"A Survey on Various Threats and Current State of Security in Android Platform","display_name":"A Survey on Various Threats and Current State of Security in Android Platform","publication_year":2019,"publication_date":"2019-02-13","ids":{"openalex":"https://openalex.org/W2911955316","doi":"https://doi.org/10.1145/3301285","mag":"2911955316"},"language":"en","primary_location":{"id":"doi:10.1145/3301285","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301285","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008954654","display_name":"Parnika Bhat","orcid":"https://orcid.org/0000-0002-8760-7993"},"institutions":[{"id":"https://openalex.org/I36909309","display_name":"National Institute of Technology Hamirpur","ror":"https://ror.org/01nc8zs04","country_code":"IN","type":"education","lineage":["https://openalex.org/I36909309","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Parnika Bhat","raw_affiliation_strings":["National Institute of Technology, Hamirpur, Himachal Pradesh HP, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Hamirpur, Himachal Pradesh HP, India","institution_ids":["https://openalex.org/I36909309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067298637","display_name":"Kamlesh Dutta","orcid":"https://orcid.org/0000-0003-3197-2235"},"institutions":[{"id":"https://openalex.org/I36909309","display_name":"National Institute of Technology Hamirpur","ror":"https://ror.org/01nc8zs04","country_code":"IN","type":"education","lineage":["https://openalex.org/I36909309","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kamlesh Dutta","raw_affiliation_strings":["National Institute of Technology, Hamirpur, Himachal Pradesh HP, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Hamirpur, Himachal Pradesh HP, India","institution_ids":["https://openalex.org/I36909309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008954654"],"corresponding_institution_ids":["https://openalex.org/I36909309"],"apc_list":null,"apc_paid":null,"fwci":7.3686,"has_fulltext":false,"cited_by_count":78,"citation_normalized_percentile":{"value":0.97850907,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"52","issue":"1","first_page":"1","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.86272132396698},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.740043580532074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6425562500953674},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5879454016685486},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45810791850090027},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2762710452079773},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12005388736724854}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.86272132396698},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.740043580532074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6425562500953674},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5879454016685486},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45810791850090027},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2762710452079773},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12005388736724854}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3301285","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301285","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322724","display_name":"Ministry of Education, India","ror":"https://ror.org/048xjjh50"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W1447175589","https://openalex.org/W1495630617","https://openalex.org/W1535810264","https://openalex.org/W1963971515","https://openalex.org/W1964241047","https://openalex.org/W1969501726","https://openalex.org/W1972350641","https://openalex.org/W1973548319","https://openalex.org/W1973779971","https://openalex.org/W1976596267","https://openalex.org/W1982829328","https://openalex.org/W1988331803","https://openalex.org/W1990225450","https://openalex.org/W1996931407","https://openalex.org/W2007857904","https://openalex.org/W2008524185","https://openalex.org/W2014390890","https://openalex.org/W2017025011","https://openalex.org/W2022018347","https://openalex.org/W2033811191","https://openalex.org/W2041976134","https://openalex.org/W2056073317","https://openalex.org/W2058228862","https://openalex.org/W2060537671","https://openalex.org/W2060727319","https://openalex.org/W2065304158","https://openalex.org/W2081768685","https://openalex.org/W2084504193","https://openalex.org/W2090394384","https://openalex.org/W2093316511","https://openalex.org/W2095470000","https://openalex.org/W2101699859","https://openalex.org/W2105412867","https://openalex.org/W2107881300","https://openalex.org/W2117115928","https://openalex.org/W2123437505","https://openalex.org/W2132073183","https://openalex.org/W2141198770","https://openalex.org/W2145994642","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2286836146","https://openalex.org/W2293825325","https://openalex.org/W2294068577","https://openalex.org/W2315212236","https://openalex.org/W2400269587","https://openalex.org/W2400528202","https://openalex.org/W2402690741","https://openalex.org/W2514683958","https://openalex.org/W2529582363","https://openalex.org/W2532717356","https://openalex.org/W2555115505","https://openalex.org/W2564856904","https://openalex.org/W2575599800","https://openalex.org/W2598978862","https://openalex.org/W2700054830","https://openalex.org/W2745422701","https://openalex.org/W2765843494","https://openalex.org/W2767098552","https://openalex.org/W2768072252","https://openalex.org/W2784849271","https://openalex.org/W2806638034","https://openalex.org/W2914331679","https://openalex.org/W2949838346","https://openalex.org/W3151647019","https://openalex.org/W4240271402","https://openalex.org/W4249902158","https://openalex.org/W4298051233"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2338899373","https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W4312334973","https://openalex.org/W1963923654","https://openalex.org/W1974604873","https://openalex.org/W4378195102","https://openalex.org/W4366249425"],"abstract_inverted_index":{"The":[0,16,103,130,165],"advent":[1],"of":[2,13,26,32,41,57,68,71,121,136,155,172],"the":[3,11,14,27,30,33,39,44,60,69,72,79,82,122,126,134,173,190],"Android":[4,34,73,83,127,137,145,174,193],"system":[5,51,84],"has":[6,36,52],"brought":[7],"smartphone":[8],"technology":[9],"to":[10,113,150,189],"doorsteps":[12],"masses.":[15],"latest":[17],"technologies":[18],"have":[19],"made":[20,53],"it":[21,54],"affordable":[22],"for":[23,59],"every":[24],"section":[25],"society.":[28],"However,":[29],"emergence":[31],"platform":[35],"also":[37,132],"escalated":[38],"growth":[40],"cybercrime":[42],"through":[43],"mobile":[45],"platform.":[46],"Its":[47],"open":[48],"source":[49],"operating":[50],"a":[55,65,142,152,182],"center":[56],"attraction":[58],"attackers.":[61],"This":[62,76,147],"article":[63,77,131,148],"provides":[64],"comprehensive":[66],"study":[67,104,166],"state":[70],"Security":[74],"domain.":[75,129],"classifies":[78],"attacks":[80],"on":[81],"in":[85,125,140],"four":[86],"categories":[87,115],"(i)":[88],"hardware-based":[89],"attacks,":[90,93,98],"(ii)":[91],"kernel-based":[92],"(iii)":[94],"hardware":[95],"abstraction":[96],"layer-based":[97],"and":[99,109,116,163,180,186],"(iv)":[100],"application-based":[101],"attacks.":[102],"deals":[105],"with":[106],"various":[107,156,178],"threats":[108,191],"security":[110,128,175],"measures":[111],"relating":[112],"these":[114],"presents":[117],"an":[118],"in-depth":[119],"analysis":[120,154],"underlying":[123],"problems":[124],"stresses":[133],"role":[135],"application":[138],"developers":[139],"realizing":[141],"more":[143,183],"secure":[144],"environment.":[146],"attempts":[149],"provide":[151],"comparative":[153],"malware":[157],"detection":[158],"techniques":[159],"concerning":[160],"their":[161],"methods":[162],"limitations.":[164],"can":[167],"help":[168],"researchers":[169],"gain":[170],"knowledge":[171],"domain":[176],"from":[177],"aspects":[179],"build":[181],"comprehensive,":[184],"robust,":[185],"efficient":[187],"solution":[188],"that":[192],"is":[194],"facing.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":5}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
