{"id":"https://openalex.org/W3005140940","doi":"https://doi.org/10.1145/3366423.3380242","title":"MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps","display_name":"MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps","publication_year":2020,"publication_date":"2020-04-20","ids":{"openalex":"https://openalex.org/W3005140940","doi":"https://doi.org/10.1145/3366423.3380242","mag":"3005140940"},"language":"en","primary_location":{"id":"doi:10.1145/3366423.3380242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3366423.3380242","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Tianming Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianming Liu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haoyu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Li Li","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]},{"id":"https://openalex.org/I2801239119","display_name":"Australian Regenerative Medicine Institute","ror":"https://ror.org/02qa5kg76","country_code":"AU","type":"facility","lineage":["https://openalex.org/I2801037857","https://openalex.org/I2801239119","https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["Monash University"],"affiliations":[{"raw_affiliation_string":"Monash University","institution_ids":["https://openalex.org/I2801239119","https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiapu Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["The Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Feng Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Dong","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yao Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Guo","raw_affiliation_strings":["Peking University"],"affiliations":[{"raw_affiliation_string":"Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Liu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tegawend\u00e9 Bissyand\u00e9","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Tegawend\u00e9 Bissyand\u00e9","raw_affiliation_strings":["SnT University of Luxembourg"],"affiliations":[{"raw_affiliation_string":"SnT University of Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jacques Klein","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Jacques Klein","raw_affiliation_strings":["University of Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":4.419,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.9526271,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1715","last_page":"1726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6700999736785889},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5496000051498413},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5002999901771545},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.46219998598098755},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4447999894618988},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43869999051094055},{"id":"https://openalex.org/keywords/app-store","display_name":"App store","score":0.3944999873638153}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6700999736785889},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.554099977016449},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5496000051498413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5220000147819519},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5002999901771545},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.46219998598098755},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4447999894618988},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43869999051094055},{"id":"https://openalex.org/C2779794324","wikidata":"https://www.wikidata.org/wiki/Q3814081","display_name":"App store","level":2,"score":0.3944999873638153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3813999891281128},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C180652500","wikidata":"https://www.wikidata.org/wiki/Q1351910","display_name":"Push technology","level":2,"score":0.3628999888896942},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3190000057220459},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.28349998593330383},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.2639000117778778}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3366423.3380242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2002.01656","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2002.01656","pdf_url":"https://arxiv.org/pdf/2002.01656","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:orbilu.uni.lu:10993/45320","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/45320","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of The Web Conference 2020, 1715\u20131726 (2020-04); Proceedings of The Web Conference 2020 (WWW), Taipei, Taiwan [TW], April 2020","raw_type":"peer reviewed"}],"best_oa_location":{"id":"doi:10.1145/3366423.3380242","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3366423.3380242","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1943546595","https://openalex.org/W1970867218","https://openalex.org/W1976596267","https://openalex.org/W1985683032","https://openalex.org/W2015790908","https://openalex.org/W2051498836","https://openalex.org/W2077202047","https://openalex.org/W2083391339","https://openalex.org/W2087804676","https://openalex.org/W2112397370","https://openalex.org/W2117202485","https://openalex.org/W2123437505","https://openalex.org/W2157286909","https://openalex.org/W2159922008","https://openalex.org/W2254062603","https://openalex.org/W2286924183","https://openalex.org/W2343325785","https://openalex.org/W2400269587","https://openalex.org/W2510008933","https://openalex.org/W2526093969","https://openalex.org/W2532717356","https://openalex.org/W2560459036","https://openalex.org/W2574401928","https://openalex.org/W2591403015","https://openalex.org/W2591676776","https://openalex.org/W2605037362","https://openalex.org/W2618014206","https://openalex.org/W2621207633","https://openalex.org/W2737911916","https://openalex.org/W2765843494","https://openalex.org/W2785871300","https://openalex.org/W2791657297","https://openalex.org/W2884516187","https://openalex.org/W2897615540","https://openalex.org/W2899191093","https://openalex.org/W2914751159","https://openalex.org/W2922034297","https://openalex.org/W2940856488","https://openalex.org/W2963037989","https://openalex.org/W2965323276"],"related_works":[],"abstract_inverted_index":{"Advertisement":[0],"drives":[1],"the":[2,5,14,26,43,56,137,193],"economy":[3],"of":[4,33,45,73,80,102,157,197],"mobile":[6,15,19,204],"app":[7,57,62,110,173],"ecosystem.":[8,206],"As":[9],"a":[10,31,52,70,97,114,202],"key":[11],"component":[12],"in":[13],"ad":[16,20,48,75,86,90,104,116,129,142,161,180],"business":[17],"model,":[18],"content":[21,88],"has":[22],"been":[23],"overlooked":[24],"by":[25],"research":[27],"community,":[28],"which":[29],"poses":[30],"number":[32],"threats,":[34],"e.g.,":[35,163],"propagating":[36],"malware":[37],"and":[38,89,126,152,195],"undesirable":[39],"contents.":[40,105,130,143],"To":[41],"understand":[42],"practice":[44],"these":[46],"devious":[47,74,103,141,160,179,198],"behaviors,":[49],"we":[50,67,94],"perform":[51],"large-scale":[53],"study":[54],"on":[55],"contents":[58,181],"harvested":[59],"through":[60],"automated":[61,100,109],"testing.":[63],"In":[64],"this":[65],"work,":[66],"first":[68],"provide":[69],"comprehensive":[71],"categorization":[72],"contents,":[76,162],"including":[77],"five":[78],"kinds":[79],"behaviors":[81],"belonging":[82],"to":[83,139,148],"two":[84],"categories:":[85],"loading":[87],"clicking":[91],"content.":[92],"Then,":[93],"propose":[95],"MadDroid,":[96],"framework":[98,112,138],"for":[99,120],"detection":[101,194],"MadDroid":[106,147],"leverages":[107],"an":[108],"testing":[111],"with":[113],"sophisticated":[115],"view":[117],"exploration":[118],"strategy":[119],"effectively":[121],"collecting":[122],"ad-related":[123],"network":[124],"traffic":[125],"subsequently":[127],"extracting":[128],"We":[131,144],"then":[132],"integrate":[133],"dedicated":[134],"approaches":[135],"into":[136,192],"identify":[140],"have":[145],"applied":[146],"40,000":[149],"Android":[150],"apps":[151,158,166],"found":[153],"that":[154,167,178,185],"roughly":[155],"6%":[156],"deliver":[159],"distributing":[164],"malicious":[165],"cannot":[168],"be":[169],"downloaded":[170],"via":[171],"traditional":[172],"markets.":[174],"Experiment":[175],"results":[176],"indicate":[177],"are":[182],"prevalent,":[183],"suggesting":[184],"our":[186],"community":[187],"should":[188],"invest":[189],"more":[190],"effort":[191],"mitigation":[196],"ads":[199],"towards":[200],"building":[201],"trustworthy":[203],"advertising":[205]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-02-14T00:00:00"}
