{"id":"https://openalex.org/W3160345471","doi":"https://doi.org/10.1145/3442588","title":"IntDroid","display_name":"IntDroid","publication_year":2021,"publication_date":"2021-05-08","ids":{"openalex":"https://openalex.org/W3160345471","doi":"https://doi.org/10.1145/3442588","mag":"3160345471"},"language":"en","primary_location":{"id":"doi:10.1145/3442588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3442588","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["Huazhong University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056381213","display_name":"Yueming Wu","orcid":"https://orcid.org/0000-0002-1515-3558"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueming Wu","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021346690","display_name":"Siru Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siru Yang","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069245713","display_name":"Anki Chauhan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anki Chauhan","raw_affiliation_strings":["University of Texas at Dallas, Dallsa, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Dallsa, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100613524","display_name":"Wei Yang","orcid":"https://orcid.org/0000-0002-5338-7347"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Yang","raw_affiliation_strings":["University of Texas at Dallas, Dallsa, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Dallsa, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010238345","display_name":"Jiangying Zhong","orcid":"https://orcid.org/0000-0002-8522-0699"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangying Zhong","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083173421","display_name":"Shihan Dou","orcid":"https://orcid.org/0009-0002-6013-3035"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shihan Dou","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5074676946"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":5.0927,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.9626606,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"30","issue":"3","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.868556022644043},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8328988552093506},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7231720089912415},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6541539430618286},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.473671019077301},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.4628642499446869},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.4598560929298401},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4358982443809509},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.424932062625885},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2956946790218353},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2604979872703552},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2121056318283081},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.16020339727401733},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1304979920387268}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.868556022644043},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8328988552093506},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7231720089912415},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6541539430618286},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.473671019077301},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.4628642499446869},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.4598560929298401},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4358982443809509},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.424932062625885},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2956946790218353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2604979872703552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2121056318283081},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.16020339727401733},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1304979920387268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3442588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3442588","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W110636400","https://openalex.org/W1856835768","https://openalex.org/W1943233084","https://openalex.org/W1978569633","https://openalex.org/W1982773740","https://openalex.org/W2056944867","https://openalex.org/W2058180826","https://openalex.org/W2080996291","https://openalex.org/W2083183119","https://openalex.org/W2087970742","https://openalex.org/W2088479623","https://openalex.org/W2089735638","https://openalex.org/W2092942461","https://openalex.org/W2101599977","https://openalex.org/W2122672392","https://openalex.org/W2127723417","https://openalex.org/W2156744053","https://openalex.org/W2157635833","https://openalex.org/W2168103835","https://openalex.org/W2264131323","https://openalex.org/W2324464293","https://openalex.org/W2334842536","https://openalex.org/W2407313496","https://openalex.org/W2462192250","https://openalex.org/W2470899015","https://openalex.org/W2606250847","https://openalex.org/W2617476279","https://openalex.org/W2625739732","https://openalex.org/W2784440606","https://openalex.org/W2792310543","https://openalex.org/W2794510434","https://openalex.org/W2885160263","https://openalex.org/W2895504842","https://openalex.org/W2902979785","https://openalex.org/W2962744253","https://openalex.org/W2963954089","https://openalex.org/W2964136807","https://openalex.org/W2966342255","https://openalex.org/W2982299304","https://openalex.org/W3000239448","https://openalex.org/W4239799938"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W4245250093","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W2609233367","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"Android,":[0],"the":[1,13,16,30,42,86,91,108,127,146,154,189,197,200,214,218,267],"most":[2],"popular":[3],"mobile":[4,121],"operating":[5],"system,":[6],"has":[7,23,99,324,337],"attracted":[8],"millions":[9],"of":[10,18,90,94,149,157,165,176,217,235,250,257,264,300,318,322,350],"users":[11],"around":[12],"world.":[14],"Meanwhile,":[15],"number":[17],"new":[19],"Android":[20,34,65,161,252],"malware":[21,35,83,105,122,162,253,313,342],"instances":[22],"grown":[24],"exponentially":[25],"in":[26,224,297,347],"recent":[27],"years.":[28],"On":[29,85],"one":[31,321,349],"hand,":[32,88],"existing":[33,319],"detection":[36,128,317],"systems":[37],"have":[38],"shown":[39],"that":[40,246,314],"distilling":[41],"program":[43,75],"semantics":[44],"into":[45],"a":[46,225,233,261,274,282,298],"graph":[47,55],"representation":[48],"and":[49,77,182,207,229,239,327],"detecting":[50,64,251],"malicious":[51,241],"programs":[52],"by":[53,329,343],"conducting":[54],"matching":[56],"are":[57,210],"able":[58,308],"to":[59,102,144,187,212,281,309],"achieve":[60],"high":[61,92,147,155],"accuracy":[62,148],"on":[63,82,232],"malware.":[66,138],"However,":[67,107],"these":[68],"traditional":[69,150,167,283],"graph-based":[70,151,284],"approaches":[71],"always":[72],"perform":[73],"expensive":[74],"analysis":[76,186],"suffer":[78],"from":[79,303],"low":[80],"scalability":[81,93,156,268],"detection.":[84,106,163],"other":[87],"because":[89],"social":[95,180],"network":[96],"analysis,":[97,170],"it":[98,231],"been":[100,325,339],"applied":[101],"complete":[103],"large-scale":[104],"social-network-analysis-based":[109],"method":[110,152,159,276],"only":[111],"considers":[112],"simple":[113],"semantic":[114,215],"information":[115],"(i.e.,":[116,277],"centrality)":[117],"for":[118,160],"achieving":[119],"market-wide":[120],"scanning,":[123],"which":[124,323,351],"may":[125],"limit":[126],"effectiveness":[129],"when":[130],"benign":[131,237],"apps":[132,177,301],"show":[133,245],"some":[134],"similar":[135],"behaviors":[136],"as":[137,178,271,273,341],"In":[139],"this":[140],"article,":[141],"we":[142,171],"aim":[143],"combine":[145],"with":[153,254],"social-network-analysis--based":[158,275],"Instead":[164],"using":[166],"heavyweight":[168],"static":[169],"treat":[172],"function":[173],"call":[174,193],"graphs":[175],"complex":[179],"networks":[181],"apply":[183],"social-network--based":[184],"centrality":[185],"unearth":[188],"central":[190,198,208],"nodes":[191,209],"within":[192],"graphs.":[194,219],"After":[195],"obtaining":[196],"nodes,":[199],"average":[201],"intimacies":[202],"between":[203],"sensitive":[204],"API":[205],"calls":[206],"computed":[211],"represent":[213],"features":[216],"We":[220],"implement":[221],"our":[222],"approach":[223],"tool":[226],"called":[227],"IntDroid":[228,247,286,306],"evaluate":[230],"dataset":[234],"3,988":[236],"samples":[238],"4,265":[240],"samples.":[242],"Experimental":[243],"results":[244],"is":[248,269,287,307,352],"capable":[249],"an":[255],"F-measure":[256],"97.1%":[258],"while":[259],"maintaining":[260],"True-positive":[262],"Rate":[263],"99.1%.":[265],"Although":[266],"not":[270],"fast":[272],"MalScan":[278],"),":[279],"compared":[280],"method,":[285],"more":[288,330],"than":[289,293,331],"six":[290,344],"times":[291],"faster":[292],"MaMaDroid":[294],".":[295,356],"Moreover,":[296],"corpus":[299],"collected":[302],"GooglePlay":[304],"market,":[305],"identify":[310],"28":[311],"zero-day":[312],"can":[315],"evade":[316],"tools,":[320],"downloaded":[326],"installed":[328],"ten":[332],"million":[333],"users.":[334],"This":[335],"app":[336],"also":[338],"flagged":[340],"anti-virus":[345],"scanners":[346],"VirusTotal,":[348],"Symantec":[353],"Mobile":[354],"Insight":[355]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2021-05-24T00:00:00"}
