{"id":"https://openalex.org/W4405364683","doi":"https://doi.org/10.1145/3700432","title":"Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram","display_name":"Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4405364683","doi":"https://doi.org/10.1145/3700432"},"language":"en","primary_location":{"id":"doi:10.1145/3700432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700432","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3700432","source":{"id":"https://openalex.org/S4210193547","display_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","issn_l":"2476-1249","issn":["2476-1249"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3700432","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101771952","display_name":"Yanhui Guo","orcid":"https://orcid.org/0000-0002-0051-3397"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanhui Guo","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103152196","display_name":"Dong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091066922","display_name":"Liu Wang","orcid":"https://orcid.org/0000-0002-3982-4993"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019292262","display_name":"Yongsheng Fang","orcid":"https://orcid.org/0009-0007-5734-759X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongsheng Fang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108112983","display_name":"Chao Wang","orcid":"https://orcid.org/0009-0002-3655-0154"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106406065","display_name":"Minghui Yang","orcid":"https://orcid.org/0000-0003-3772-4240"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minghui Yang","raw_affiliation_strings":["OPPO, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"OPPO, Shenzhen, Guangdong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100647155","display_name":"Tianming Liu","orcid":"https://orcid.org/0000-0002-5216-933X"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tianming Liu","raw_affiliation_strings":["Monash University &amp; Huazhong University of Science and Technology, Melbourne, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University &amp; Huazhong University of Science and Technology, Melbourne, Victoria, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115695530","display_name":"Haoyu Wang","orcid":"https://orcid.org/0000-0003-1100-8633"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101771952"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":1.7077,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8601632,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"3","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.8308079242706299},{"id":"https://openalex.org/keywords/smartphone-app","display_name":"Smartphone app","score":0.42497169971466064},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4085226058959961},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39135777950286865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38216668367385864},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3309932351112366},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24368953704833984}],"concepts":[{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.8308079242706299},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.42497169971466064},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4085226058959961},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39135777950286865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38216668367385864},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3309932351112366},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24368953704833984}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3700432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700432","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3700432","source":{"id":"https://openalex.org/S4210193547","display_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","issn_l":"2476-1249","issn":["2476-1249"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3700432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700432","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3700432","source":{"id":"https://openalex.org/S4210193547","display_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","issn_l":"2476-1249","issn":["2476-1249"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405364683.pdf"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W2131681506","https://openalex.org/W2400269587","https://openalex.org/W2911933224","https://openalex.org/W2923522555","https://openalex.org/W2963580354","https://openalex.org/W3005968886","https://openalex.org/W3085877220","https://openalex.org/W3099768174","https://openalex.org/W3106512643","https://openalex.org/W3111533025","https://openalex.org/W3155384719","https://openalex.org/W3204068786","https://openalex.org/W4288057701","https://openalex.org/W4293261694","https://openalex.org/W4384154425","https://openalex.org/W4386858886","https://openalex.org/W4399632113"],"related_works":["https://openalex.org/W4315471165","https://openalex.org/W2808363712","https://openalex.org/W3044207086","https://openalex.org/W3033856982","https://openalex.org/W4393103849","https://openalex.org/W4385222898","https://openalex.org/W2890710341","https://openalex.org/W2755693129","https://openalex.org/W2307269468","https://openalex.org/W2938393566"],"abstract_inverted_index":{"The":[0],"thriving":[1],"mobile":[2,92],"app":[3,56,93,195,216,246],"ecosystem":[4,94,217],"encompasses":[5],"a":[6,15,66,106],"wide":[7],"range":[8],"of":[9,17,89,100,117,126,135,147,170,191,200,213,259],"functionalities.":[10],"However,":[11],"within":[12],"this":[13],"ecosystem,":[14],"subset":[16],"apps":[18,128,143,154,261],"provides":[19,84,220],"illicit":[20],"services":[21],"such":[22],"as":[23,34,65],"gambling":[24,158],"and":[25,46,72,79,109,115,159,174,176,197,228,252],"pornography":[26,160],"to":[27,33,75,145,157],"pursue":[28],"economic":[29],"gains,":[30],"collectively":[31],"referred":[32],"\"underground":[35],"economy":[36],"apps\".":[37],"While":[38],"previous":[39],"studies":[40],"have":[41],"examined":[42],"these":[43,118,127,142,153,204,236],"apps'":[44],"characteristics":[45,116],"identification":[47],"methods,":[48],"investigations":[49],"into":[50],"their":[51],"distribution":[52,196],"via":[53],"platforms":[54],"beyond":[55],"markets":[57],"(like":[58],"Telegram)":[59],"remain":[60],"scarce,":[61],"which":[62],"has":[63],"emerged":[64],"crucial":[67],"channel":[68],"for":[69,194,223,243],"underground":[70,91,215,260],"activities":[71],"cybercrime":[73],"due":[74],"the":[76,85,90,98,101,111,123,132,189,198,214,257],"robust":[77],"encryption":[78],"user":[80,137,149],"anonymity.":[81],"This":[82,206],"study":[83],"first":[86],"comprehensive":[87],"exploration":[88],"on":[95,129,262],"Telegram.":[96],"Overcoming":[97],"complexities":[99],"Telegram":[102],"environment,":[103],"we":[104],"build":[105],"novel":[107],"dataset":[108],"analyze":[110],"prevalence,":[112],"promotional":[113,165],"strategies,":[114],"apps.":[119,205],"Our":[120,185,239],"findings":[121,240],"reveal":[122],"significant":[124,178],"prevalence":[125,199],"Telegram,":[130],"with":[131,235],"total":[133],"sum":[134],"subscription":[136],"numbers":[138],"across":[139],"channels":[140],"promoting":[141],"equivalent":[144],"1%":[146],"Telegram's":[148,181],"base.":[150],"We":[151,162],"find":[152],"primarily":[155],"cater":[156],"services.":[161],"uncover":[163],"sophisticated":[164],"strategies":[166],"involving":[167],"complex":[168],"networks":[169],"apps,":[171],"websites,":[172],"users,":[173],"channels,":[175],"identify":[177],"gaps":[179],"in":[180,203,255],"content":[182],"moderation":[183],"capabilities.":[184],"analysis":[186],"also":[187,219],"exposes":[188],"misuse":[190],"iOS":[192],"features":[193],"malicious":[201],"behaviors":[202],"research":[207],"not":[208],"only":[209],"enhances":[210],"our":[211],"understanding":[212],"but":[218],"valuable":[221],"insights":[222],"developing":[224],"effective":[225],"regulatory":[226],"measures":[227],"protecting":[229],"users":[230],"from":[231],"potential":[232],"risks":[233],"associated":[234],"covert":[237],"operations.":[238],"provide":[241],"implications":[242],"platform":[244],"regulators,":[245],"market":[247],"operators,":[248],"law":[249],"enforcement":[250],"agencies,":[251],"cybersecurity":[253],"professionals":[254],"combating":[256],"proliferation":[258],"encrypted":[263],"messaging":[264],"platforms.":[265]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
