{"id":"https://openalex.org/W4285490441","doi":"https://doi.org/10.1145/3533767.3534410","title":"NCScope: hardware-assisted analyzer for native code in Android apps","display_name":"NCScope: hardware-assisted analyzer for native code in Android apps","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285490441","doi":"https://doi.org/10.1145/3533767.3534410"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3534410","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3534410","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3534410","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3534410","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100396821","display_name":"Hao Zhou","orcid":"https://orcid.org/0000-0001-8890-9208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Hao Zhou","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051914905","display_name":"Shuohan Wu","orcid":"https://orcid.org/0000-0002-4719-4637"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shuohan Wu","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100428026","display_name":"Ting Wang","orcid":"https://orcid.org/0000-0003-4927-5833"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ting Wang","raw_affiliation_strings":["Pennsylvania State University, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088790914","display_name":"Yajin Zhou","orcid":"https://orcid.org/0000-0001-7610-4736"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajin Zhou","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460096","display_name":"Chao Zhang","orcid":"https://orcid.org/0000-0001-7894-8828"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zhang","raw_affiliation_strings":["Tsinghua University, China / Beijing National Research Center for Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China / Beijing National Research Center for Information Science and Technology, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076081056","display_name":"Haipeng Cai","orcid":"https://orcid.org/0000-0002-5224-9970"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haipeng Cai","raw_affiliation_strings":["Washington State University, USA"],"affiliations":[{"raw_affiliation_string":"Washington State University, USA","institution_ids":["https://openalex.org/I72951846"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100396821"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":2.3829,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.88805535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"629","last_page":"641"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8285725116729736},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6968216896057129},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6473683714866638},{"id":"https://openalex.org/keywords/machine-code","display_name":"Machine code","score":0.6082870960235596},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5861752033233643},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.5654672384262085},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.49957823753356934},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4893924295902252},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.46347886323928833},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4494393765926361},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.42032235860824585},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4012315571308136},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2517797648906708},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.21032676100730896},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2071988880634308},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.1793975532054901},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.0891333818435669}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8285725116729736},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6968216896057129},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6473683714866638},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.6082870960235596},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5861752033233643},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.5654672384262085},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.49957823753356934},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4893924295902252},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.46347886323928833},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4494393765926361},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.42032235860824585},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4012315571308136},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2517797648906708},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.21032676100730896},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2071988880634308},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.1793975532054901},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.0891333818435669},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3533767.3534410","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3534410","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3534410","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3533767.3534410","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3533767.3534410","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3533767.3534410","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2323946575","display_name":null,"funder_award_id":"U21A2046","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2366221679","display_name":null,"funder_award_id":"1953813","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3848079773","display_name":null,"funder_award_id":"U21A20464","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5167091242","display_name":null,"funder_award_id":"No. 1","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5570204100","display_name":null,"funder_award_id":"U21A204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7422924211","display_name":null,"funder_award_id":"BNR2022RC01006","funder_id":"https://openalex.org/F4320329777","funder_display_name":"Beijing National Research Center For Information Science And Technology"},{"id":"https://openalex.org/G7501644542","display_name":null,"funder_award_id":"1951729","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8138580079","display_name":"CAREER: Trustworthy Machine Learning from Untrusted Models","funder_award_id":"1953893","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322598","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98"},{"id":"https://openalex.org/F4320329777","display_name":"Beijing National Research Center For Information Science And Technology","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285490441.pdf","grobid_xml":"https://content.openalex.org/works/W4285490441.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1971497680","https://openalex.org/W2014390890","https://openalex.org/W2015790908","https://openalex.org/W2060692877","https://openalex.org/W2068590918","https://openalex.org/W2070386561","https://openalex.org/W2156858199","https://openalex.org/W2166743230","https://openalex.org/W2288381557","https://openalex.org/W2463553622","https://openalex.org/W2491928626","https://openalex.org/W2505939533","https://openalex.org/W2514041296","https://openalex.org/W2514974017","https://openalex.org/W2533311740","https://openalex.org/W2603277549","https://openalex.org/W2620844046","https://openalex.org/W2740742367","https://openalex.org/W2751855490","https://openalex.org/W2769669597","https://openalex.org/W2792393499","https://openalex.org/W2793030797","https://openalex.org/W2808548436","https://openalex.org/W2889663978","https://openalex.org/W2890190663","https://openalex.org/W2890664869","https://openalex.org/W2899424311","https://openalex.org/W2963213304","https://openalex.org/W2969226948","https://openalex.org/W3007246675","https://openalex.org/W3042563546","https://openalex.org/W3043236449","https://openalex.org/W3086419562","https://openalex.org/W3089623613","https://openalex.org/W3090910431","https://openalex.org/W3153386443","https://openalex.org/W3179490740","https://openalex.org/W4255616683","https://openalex.org/W6950507775"],"related_works":["https://openalex.org/W2969365378","https://openalex.org/W4302016191","https://openalex.org/W4225920890","https://openalex.org/W4302016192","https://openalex.org/W4285662085","https://openalex.org/W4226168309","https://openalex.org/W2587046957","https://openalex.org/W4214872448","https://openalex.org/W4285490441","https://openalex.org/W1858426298"],"abstract_inverted_index":{"More":[0],"and":[1,32,41,46,61,81,94,101,139,155,222],"more":[2],"Android":[3,87],"apps":[4,175,188,198],"implement":[5,176],"their":[6,37],"functionalities":[7],"in":[8,39,56,70,143,152,162,179,219],"native":[9,23,68,107,144,153,163,180,220],"code,":[10,154,181],"so":[11],"does":[12],"malware.":[13],"Although":[14],"various":[15],"approaches":[16],"have":[17,201],"been":[18],"designed":[19],"to":[20,36,89,105,110,124,210],"analyze":[21],"the":[22,54,111,116,172,184,196],"code":[24,69,108,145,221],"used":[25],"by":[26,131],"apps,":[27,100,147],"they":[28],"usually":[29],"generate":[30],"incomplete":[31],"biased":[33],"results":[34,166],"due":[35],"limitations":[38],"obtaining":[40],"analyzing":[42],"high-fidelity":[43],"execution":[44,92],"traces":[45,93],"memory":[47,96,150],"data":[48,97],"with":[49],"low":[50],"overheads.":[51],"To":[52,114],"fill":[53],"gap,":[55],"this":[57],"paper,":[58],"we":[59,121],"propose":[60],"develop":[62],"a":[63,75,83],"novel":[64],"hardware-assisted":[65],"analyzer":[66],"for":[67],"apps.":[71],"We":[72],"leverage":[73],"ETM,":[74],"hardware":[76],"feature":[77],"of":[78,86,98,119,146,149,157,171,186,195],"ARM":[79],"platform,":[80],"eBPF,":[82],"kernel":[84],"component":[85],"system,":[88],"collect":[90],"real":[91],"relevant":[95],"target":[99],"design":[102],"new":[103],"methods":[104,178],"scrutinize":[106],"according":[109],"collected":[112],"data.":[113],"show":[115],"unique":[117],"capability":[118],"NCScope,":[120],"apply":[122],"it":[123],"four":[125],"applications":[126],"that":[127,168,183,205],"cannot":[128],"be":[129],"accomplished":[130],"existing":[132],"tools,":[133],"including":[134],"systematic":[135],"studies":[136],"on":[137],"self-protection":[138,177],"anti-analysis":[140,202],"mechanisms":[141],"implemented":[142],"analysis":[148,200],"corruption":[151],"identification":[156],"performance":[158,224],"differences":[159],"between":[160],"functions":[161],"code.":[164],"The":[165],"uncover":[167],"only":[169],"26.8%":[170],"analyzed":[173],"financial":[174,187],"implying":[182],"security":[185],"is":[189,207],"far":[190],"from":[191],"expected.":[192],"Meanwhile,":[193],"78.3%":[194],"malicious":[197],"under":[199],"behaviors,":[203],"suggesting":[204],"NCScope":[206,214],"very":[208],"useful":[209],"malware":[211],"analysis.":[212],"Moreover,":[213],"can":[215],"effectively":[216],"detect":[217],"bugs":[218],"identify":[223],"differences.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
