{"id":"https://openalex.org/W2981487520","doi":"https://doi.org/10.1145/3360664.3360672","title":"Meizodon","display_name":"Meizodon","publication_year":2019,"publication_date":"2019-10-23","ids":{"openalex":"https://openalex.org/W2981487520","doi":"https://doi.org/10.1145/3360664.3360672","mag":"2981487520"},"language":"en","primary_location":{"id":"doi:10.1145/3360664.3360672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011589142","display_name":"Sebastiaan Alvarez Rodriguez","orcid":null},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Sebastiaan Alvarez Rodriguez","raw_affiliation_strings":["Leiden University"],"affiliations":[{"raw_affiliation_string":"Leiden University","institution_ids":["https://openalex.org/I121797337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084448782","display_name":"Erik van der Kouwe","orcid":"https://orcid.org/0000-0002-0312-9913"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Erik van der Kouwe","raw_affiliation_strings":["Leiden University"],"affiliations":[{"raw_affiliation_string":"Leiden University","institution_ids":["https://openalex.org/I121797337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011589142"],"corresponding_institution_ids":["https://openalex.org/I121797337"],"apc_list":null,"apc_paid":null,"fwci":0.4976,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64078802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4897630214691162}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4897630214691162}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3360664.3360672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1630356589","https://openalex.org/W2017025011","https://openalex.org/W2027538101","https://openalex.org/W2077202047","https://openalex.org/W2152149943","https://openalex.org/W2166743230","https://openalex.org/W2325375141","https://openalex.org/W2357843841","https://openalex.org/W2407313496","https://openalex.org/W2511641045","https://openalex.org/W2557385690","https://openalex.org/W2620844046","https://openalex.org/W2796301966","https://openalex.org/W2853432192","https://openalex.org/W2890190663","https://openalex.org/W3102504333","https://openalex.org/W4239573938","https://openalex.org/W4244726870","https://openalex.org/W4245027182","https://openalex.org/W4297927038"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2093578348","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2766271392","https://openalex.org/W2350741829","https://openalex.org/W3004735627"],"abstract_inverted_index":{"Many":[0,81],"Android":[1,96,159],"applications":[2],"are":[3,85,174,203],"uploaded":[4,40],"to":[5,32,94,120,168,185],"app":[6],"stores":[7],"every":[8],"day.":[9],"A":[10],"relatively":[11],"small":[12],"fraction":[13],"of":[14,39,61,82,128,195],"these":[15,62,83],"applications,":[16],"or":[17,76],"apps,":[18,31],"is":[19,199,218],"malware.":[20],"Several":[21],"research":[22],"teams":[23],"developed":[24],"tools":[25,84,100,163,198],"which":[26],"automate":[27],"malware":[28,140,143],"detection":[29],"for":[30,210],"keep":[33],"up":[34],"with":[35],"the":[36,49,129,151,154,193],"never-ending":[37],"stream":[38],"apks":[41,170],"(Android":[42],"PacKages).":[43],"Every":[44],"tool":[45],"seemed":[46],"better":[47],"than":[48],"last,":[50],"some":[51],"even":[52],"claiming":[53],"accuracy":[54,194,217],"scores":[55,202],"well":[56],"over":[57,205],"90%.":[58],"However,":[59],"all":[60],"designs":[63],"were":[64],"tested":[65,196],"against":[66,113],"test":[67,187],"sets":[68],"containing":[69],"only":[70],"self-written":[71],"apks,":[72,75],"synthetic":[73],"malicious":[74],"otherwise":[77],"statistically":[78,125],"unsound":[79],"samples.":[80],"open":[86],"source.":[87],"We":[88,179],"propose":[89],"Meizodon,":[90],"a":[91,106,114,122],"novel":[92],"framework":[93],"install":[95],"static":[97,160],"security":[98,161],"analysis":[99,162,188,197,208],"and":[101,112,124,132,148,190,207,220],"run":[102],"them":[103],"efficiently":[104,186],"in":[105,109,150,171,226],"distributed":[107],"fashion,":[108],"equal":[110],"environments":[111],"suitable":[115],"dataset.":[116],"This":[117],"allows":[118,183],"us":[119,184],"make":[121],"fair":[123],"sound":[126],"comparison":[127],"most":[130],"recent":[131],"best":[133],"known":[134],"tools,":[135,189],"on":[136],"real,":[137],"'practical'":[138],"malware:":[139],"created":[141],"by":[142,146],"creators,":[144],"not":[145,175],"researchers,":[147],"found":[149],"wild.":[152],"From":[153],"results,":[155],"we":[156,214],"conclude":[157],"that":[158,181,192],"do":[164],"show":[165],"great":[166],"promise":[167],"classify":[169],"practice,":[172],"but":[173],"quite":[176],"there":[177],"yet.":[178],"demonstrate":[180],"Meizodon":[182],"find":[191],"low":[200],"(F1":[201],"just":[204],"58%),":[206],"fails":[209],"many":[211,223],"apks.":[212],"Additionally,":[213],"investigate":[215],"why":[216,221],"low,":[219],"so":[222],"analyses":[224],"result":[225],"errors.":[227]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-11-01T00:00:00"}
