{"id":"https://openalex.org/W2950284178","doi":"https://doi.org/10.1145/3307334.3326072","title":"\"Jekyll and Hyde\" is Risky","display_name":"\"Jekyll and Hyde\" is Risky","publication_year":2019,"publication_date":"2019-06-12","ids":{"openalex":"https://openalex.org/W2950284178","doi":"https://doi.org/10.1145/3307334.3326072","mag":"2950284178"},"language":"en","primary_location":{"id":"doi:10.1145/3307334.3326072","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3307334.3326072","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3307334.3326072","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3307334.3326072","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011302335","display_name":"Luman Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Luman Shi","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074852104","display_name":"Jianming Fu","orcid":"https://orcid.org/0000-0002-4639-5824"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianming Fu","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101807911","display_name":"Zhengwei Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengwei Guo","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101420644","display_name":"Jiang Ming","orcid":"https://orcid.org/0000-0001-9682-0502"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiang Ming","raw_affiliation_strings":["University of Texas at Arlington, Arlington, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011302335"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.6718,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.90932327,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"222","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.789125919342041},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7564857006072998},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7314313650131226},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.7086008787155151},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6910094618797302},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6144538521766663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6043792963027954},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5877201557159424},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.543306291103363},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.4212488532066345},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3805471658706665},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.36691996455192566},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34412696957588196},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18406939506530762},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16891130805015564}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.789125919342041},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7564857006072998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7314313650131226},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.7086008787155151},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6910094618797302},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6144538521766663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6043792963027954},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5877201557159424},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.543306291103363},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.4212488532066345},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3805471658706665},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.36691996455192566},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34412696957588196},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18406939506530762},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16891130805015564},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3307334.3326072","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3307334.3326072","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3307334.3326072","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3307334.3326072","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3307334.3326072","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3307334.3326072","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G131675355","display_name":null,"funder_award_id":"U163610","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2211466732","display_name":null,"funder_award_id":"U1636107","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5610879841","display_name":"CRII: SaTC: Towards Paving the Way for Large-Scale Malware Analysis: New Directions in Generic Binary Unpacking","funder_award_id":"1850434","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5823707046","display_name":null,"funder_award_id":"61373168","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G985897370","display_name":null,"funder_award_id":"CNS-1850434","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309536","display_name":"University of Texas System","ror":"https://ror.org/01gek1696"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2950284178.pdf","grobid_xml":"https://content.openalex.org/works/W2950284178.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W23711711","https://openalex.org/W53797064","https://openalex.org/W1220317179","https://openalex.org/W1445387515","https://openalex.org/W1450860479","https://openalex.org/W1521310247","https://openalex.org/W1522250664","https://openalex.org/W1522939654","https://openalex.org/W1578479379","https://openalex.org/W1969179090","https://openalex.org/W1976450888","https://openalex.org/W1982223249","https://openalex.org/W2015790908","https://openalex.org/W2019814385","https://openalex.org/W2041276426","https://openalex.org/W2044228862","https://openalex.org/W2059610428","https://openalex.org/W2061138065","https://openalex.org/W2067547021","https://openalex.org/W2068590918","https://openalex.org/W2084939909","https://openalex.org/W2084957670","https://openalex.org/W2088944946","https://openalex.org/W2090534521","https://openalex.org/W2096196901","https://openalex.org/W2111525908","https://openalex.org/W2125011234","https://openalex.org/W2126242334","https://openalex.org/W2153156723","https://openalex.org/W2158874007","https://openalex.org/W2213145342","https://openalex.org/W2363641085","https://openalex.org/W2517430515","https://openalex.org/W2587974508","https://openalex.org/W2603208598","https://openalex.org/W2626966626","https://openalex.org/W2712617220","https://openalex.org/W2742844465","https://openalex.org/W2765324947","https://openalex.org/W2766532899","https://openalex.org/W2767840669","https://openalex.org/W2775600787","https://openalex.org/W2791671395","https://openalex.org/W2796932268","https://openalex.org/W2809273473","https://openalex.org/W2886750927"],"related_works":["https://openalex.org/W1994712384","https://openalex.org/W4240186231","https://openalex.org/W2166844173","https://openalex.org/W2782775281","https://openalex.org/W3170525725","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W3089468277"],"abstract_inverted_index":{"Recent":[0],"developed":[1],"application-level":[2,102],"virtualization":[3,107],"brings":[4],"a":[5,11,52,219],"groundbreaking":[6],"innovation":[7],"to":[8,16,73,109,130,200,241],"Android":[9,91,159,167,229],"ecosystem:":[10],"host":[12,156,210],"app":[13,50,157,178,192,204,227],"is":[14,71,179,205,239],"able":[15,240],"load":[17],"and":[18,132,139,158,194,231],"launch":[19,110],"arbitrary":[20],"guest":[21],"APK":[22],"files":[23],"without":[24],"the":[25,33,48,64,99,187,209],"hassle":[26],"of":[27,47,97,190,221],"installation.":[28],"Powered":[29],"by":[30,208],"this":[31],"technology,":[32],"so-called":[34],"\"dual-instance":[35],"apps\"":[36],"are":[37,169],"becoming":[38],"increasingly":[39],"popular":[40,226],"as":[41,136,171],"they":[42],"can":[43],"run":[44],"dual":[45],"copies":[46],"same":[49],"on":[51],"single":[53],"device":[54],"(e.g.,":[55],"login":[56],"Facebook":[57],"simultaneously":[58],"with":[59,218,246],"two":[60],"different":[61],"accounts).":[62],"Given":[63],"large":[65],"demand":[66],"from":[67,225],"smartphone":[68],"users,":[69,131],"it":[70],"imperative":[72],"understand":[74],"how":[75],"secure":[76],"dual-instance":[77,123,191,222,244],"apps":[78,124,152,223,245],"are.":[79],"However,":[80],"little":[81],"work":[82],"investigates":[83],"their":[84],"potential":[85],"security":[86],"risks.":[87],"Even":[88],"worse,":[89],"new":[90],"malware":[92],"variants":[93],"have":[94,142],"been":[95],"accused":[96],"skimming":[98],"cream":[100],"off":[101],"virtualization.":[103],"They":[104],"abuse":[105],"legitimate":[106],"engines":[108],"phishing":[111],"attacks":[112,134],"or":[113],"even":[114],"thwart":[115],"static":[116],"detection.":[117],"We":[118,212],"first":[119],"demonstrate":[120],"that,":[121],"current":[122],"design":[125],"introduces":[126],"serious":[127],"\"shared-everything\"":[128],"threats":[129],"severe":[133],"such":[135],"permission":[137],"escalation":[138],"privacy":[140],"leak":[141],"become":[143],"tremendously":[144],"easier.":[145],"Unfortunately,":[146],"we":[147,185],"find":[148],"that":[149,176,237],"most":[150],"critical":[151],"cannot":[153],"discriminate":[154],"between":[155],"system.":[160],"In":[161],"addition,":[162],"traditional":[163],"fingerprinting":[164,198],"features":[165,189,199],"targeting":[166],"sandboxes":[168],"futile":[170],"well.":[172],"To":[173],"inform":[174],"users":[175],"an":[177,182,203],"running":[180],"in":[181],"untrusted":[183],"environment,":[184],"study":[186],"inherent":[188],"environment":[193],"propose":[195],"six":[196],"robust":[197],"detect":[201],"whether":[202],"being":[206],"launched":[207],"app.":[211],"test":[213],"our":[214],"approach,":[215],"called":[216],"DiPrint,":[217],"set":[220],"collected":[224],"stores,":[228],"systems,":[230],"virtualization-based":[232],"malware.":[233],"Our":[234],"evaluation":[235],"shows":[236],"DiPrint":[238],"accurately":[242],"identify":[243],"negligible":[247],"overhead.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
