{"id":"https://openalex.org/W4316813679","doi":"https://doi.org/10.1145/3579822","title":"RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware","display_name":"RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware","publication_year":2023,"publication_date":"2023-01-17","ids":{"openalex":"https://openalex.org/W4316813679","doi":"https://doi.org/10.1145/3579822"},"language":"en","primary_location":{"id":"doi:10.1145/3579822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579822","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016397611","display_name":"Nada Lachtar","orcid":"https://orcid.org/0000-0002-4148-7367"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nada Lachtar","raw_affiliation_strings":["University of Michigan, Dearborn, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Dearborn, MI","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088557992","display_name":"Duha Ibdah","orcid":"https://orcid.org/0000-0001-9011-296X"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Duha Ibdah","raw_affiliation_strings":["University of Michigan, Dearborn, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Dearborn, MI","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042659133","display_name":"Hamza Khan","orcid":"https://orcid.org/0000-0002-9614-2876"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamza Khan","raw_affiliation_strings":["University of Michigan, Dearborn, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Dearborn, MI","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063672961","display_name":"Anys Bacha","orcid":"https://orcid.org/0000-0001-6711-1280"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anys Bacha","raw_affiliation_strings":["University of Michigan, Dearborn, MI"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Dearborn, MI","institution_ids":["https://openalex.org/I4210130704"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016397611"],"corresponding_institution_ids":["https://openalex.org/I4210130704"],"apc_list":null,"apc_paid":null,"fwci":2.3772,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89063856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"26","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450958728790283},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8014353513717651},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.7820289731025696},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.7686780691146851},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6550835371017456},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5495724081993103},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.5380195379257202},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.49780726432800293},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.45074939727783203},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.44628921151161194},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.43338069319725037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4302240312099457},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.41365134716033936},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40907394886016846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35801082849502563},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17888107895851135},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.17419302463531494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450958728790283},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8014353513717651},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.7820289731025696},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.7686780691146851},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6550835371017456},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5495724081993103},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.5380195379257202},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.49780726432800293},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.45074939727783203},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.44628921151161194},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.43338069319725037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4302240312099457},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.41365134716033936},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40907394886016846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35801082849502563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17888107895851135},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.17419302463531494},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579822","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W4205678","https://openalex.org/W34239198","https://openalex.org/W1589213590","https://openalex.org/W1995622714","https://openalex.org/W2021426070","https://openalex.org/W2034053858","https://openalex.org/W2117539524","https://openalex.org/W2159772324","https://openalex.org/W2166844173","https://openalex.org/W2183341477","https://openalex.org/W2310992461","https://openalex.org/W2324464293","https://openalex.org/W2385611368","https://openalex.org/W2407313496","https://openalex.org/W2481240925","https://openalex.org/W2513529237","https://openalex.org/W2523868740","https://openalex.org/W2559964890","https://openalex.org/W2563604890","https://openalex.org/W2592749667","https://openalex.org/W2601591992","https://openalex.org/W2607219512","https://openalex.org/W2620844046","https://openalex.org/W2735043505","https://openalex.org/W2735608653","https://openalex.org/W2753692828","https://openalex.org/W2764249719","https://openalex.org/W2765383620","https://openalex.org/W2765713146","https://openalex.org/W2780577826","https://openalex.org/W2792310543","https://openalex.org/W2799597343","https://openalex.org/W2800479174","https://openalex.org/W2806534592","https://openalex.org/W2807415350","https://openalex.org/W2809959305","https://openalex.org/W2885096636","https://openalex.org/W2887954984","https://openalex.org/W2890196927","https://openalex.org/W2895401392","https://openalex.org/W2903646448","https://openalex.org/W2914393402","https://openalex.org/W2914982603","https://openalex.org/W2939746199","https://openalex.org/W2945832014","https://openalex.org/W2962117360","https://openalex.org/W2963401022","https://openalex.org/W2963915229","https://openalex.org/W2974072230","https://openalex.org/W2998906013","https://openalex.org/W3006334803","https://openalex.org/W3102720581","https://openalex.org/W6600156646","https://openalex.org/W7015422455"],"related_works":["https://openalex.org/W2951900017","https://openalex.org/W3113849890","https://openalex.org/W4313635474","https://openalex.org/W2508974395","https://openalex.org/W2028727337","https://openalex.org/W2286416179","https://openalex.org/W4321612960","https://openalex.org/W4225094272","https://openalex.org/W2128389850","https://openalex.org/W2292240422"],"abstract_inverted_index":{"The":[0,80],"unprecedented":[1],"growth":[2],"in":[3,64],"mobile":[4,38,198],"systems":[5,199],"has":[6,41],"transformed":[7],"the":[8,15,166,178,192,218,230],"way":[9],"we":[10,210,228],"approach":[11,170],"everyday":[12],"computing.":[13],"Unfortunately,":[14],"emergence":[16],"of":[17,21,32,83,168,180,194,232],"a":[18,27,212],"sophisticated":[19],"type":[20],"malware":[22,39,62,84,244],"known":[23,123],"as":[24],"ransomware":[25,136,160,225],"poses":[26],"great":[28],"threat":[29],"to":[30,94,113,124,157],"consumers":[31],"this":[33,103,169,181,233],"technology.":[34],"Traditional":[35],"research":[36],"on":[37,43,47,127],"detection":[40,75],"focused":[42],"approaches":[44],"that":[45,74,110,120,140,216,221],"rely":[46],"analyzing":[48],"bytecode":[49],"for":[50,92,135,197,224],"uncovering":[51],"malicious":[52],"apps.":[53],"However,":[54],"cybercriminals":[55],"can":[56],"bypass":[57],"such":[58],"methods":[59,70],"by":[60,200],"embedding":[61],"directly":[63],"native":[65,143],"machine":[66,237],"code,":[67],"making":[68],"traditional":[69],"inadequate.":[71],"Another":[72],"challenge":[73],"solutions":[76,93],"face":[77],"is":[78],"scalability.":[79],"sheer":[81],"number":[82],"variants":[85],"released":[86],"every":[87],"year":[88],"makes":[89],"it":[90],"difficult":[91],"efficiently":[95],"scale":[96],"their":[97,133,202],"coverage.":[98],"To":[99],"address":[100],"these":[101],"concerns,":[102],"work":[104],"presents":[105],"RansomShield,":[106],"an":[107],"energy-efficient":[108],"solution":[109,182,234],"leverages":[111],"CNNs":[112,156],"detect":[114,159],"ransomware.":[115],"We":[116,138,164,190],"evaluate":[117,191,229],"CNN":[118,213],"architectures":[119,175],"have":[121],"been":[122],"perform":[125],"well":[126],"computer":[128],"vision":[129],"tasks":[130],"and":[131,173,176,188],"examine":[132],"suitability":[134,193],"detection.":[137,226],"show":[139],"systematically":[141],"converting":[142],"instructions":[144],"from":[145],"Android":[146,243],"apps":[147],"into":[148],"images":[149],"using":[150,205,241],"space-filling":[151],"curve":[152],"visualization":[153],"techniques":[154],"enable":[155],"reliably":[158],"with":[161],"high":[162],"accuracy.":[163],"characterize":[165],"robustness":[167,231],"across":[171,183],"ARM":[172],"x86":[174],"demonstrate":[177],"effectiveness":[179],"heterogeneous":[184],"platforms":[185],"including":[186],"smartphones":[187],"chromebooks.":[189],"different":[195,206],"models":[196],"comparing":[201],"energy":[203],"demands":[204],"platforms.":[207],"In":[208],"addition,":[209],"present":[211],"introspection":[214],"framework":[215],"determines":[217],"important":[219],"features":[220],"are":[222],"needed":[223],"Finally,":[227],"against":[235],"adversarial":[236],"learning":[238],"(AML)":[239],"attacks":[240],"state-of-the-art":[242],"dataset.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
