{"id":"https://openalex.org/W2887643986","doi":"https://doi.org/10.1145/3230833.3232828","title":"Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures","display_name":"Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures","publication_year":2018,"publication_date":"2018-08-13","ids":{"openalex":"https://openalex.org/W2887643986","doi":"https://doi.org/10.1145/3230833.3232828","mag":"2887643986"},"language":"en","primary_location":{"id":"doi:10.1145/3230833.3232828","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023542606","display_name":"Anatoli Kalysch","orcid":null},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anatoli Kalysch","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086507201","display_name":"Oskar Milisterfer","orcid":null},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Oskar Milisterfer","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013202845","display_name":"Mykolai Protsenko","orcid":"https://orcid.org/0000-0002-2706-3920"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mykolai Protsenko","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013627385","display_name":"Tilo M\u00fcller","orcid":"https://orcid.org/0009-0007-0430-1467"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tilo M\u00fcller","raw_affiliation_strings":["Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany"],"affiliations":[{"raw_affiliation_string":"Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg (FAU), Germany","institution_ids":["https://openalex.org/I181369854"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023542606"],"corresponding_institution_ids":["https://openalex.org/I181369854"],"apc_list":null,"apc_paid":null,"fwci":0.4954,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.63435656,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8319914937019348},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7053735256195068},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6808027625083923},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6457510590553284},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.559781014919281},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.5323693156242371},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5233668088912964},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.5191075801849365},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4784533977508545},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46740275621414185},{"id":"https://openalex.org/keywords/centroid","display_name":"Centroid","score":0.43783313035964966},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4098455309867859},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3833693861961365},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.3679593503475189},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2782462537288666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2413102090358734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19433346390724182},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.09663984179496765}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8319914937019348},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7053735256195068},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6808027625083923},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6457510590553284},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.559781014919281},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.5323693156242371},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5233668088912964},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.5191075801849365},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4784533977508545},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46740275621414185},{"id":"https://openalex.org/C146599234","wikidata":"https://www.wikidata.org/wiki/Q511093","display_name":"Centroid","level":2,"score":0.43783313035964966},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4098455309867859},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3833693861961365},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3679593503475189},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2782462537288666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2413102090358734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19433346390724182},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09663984179496765},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3230833.3232828","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-566037","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-566037.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/405802","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/405802","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W60817130","https://openalex.org/W101604734","https://openalex.org/W183494281","https://openalex.org/W1578479379","https://openalex.org/W1971497680","https://openalex.org/W1971911274","https://openalex.org/W2024170198","https://openalex.org/W2064038877","https://openalex.org/W2067547021","https://openalex.org/W2085700758","https://openalex.org/W2088479623","https://openalex.org/W2093894378","https://openalex.org/W2099525266","https://openalex.org/W2111379929","https://openalex.org/W2118382442","https://openalex.org/W2126626732","https://openalex.org/W2168103835","https://openalex.org/W2478540127","https://openalex.org/W2510008933","https://openalex.org/W2742249911","https://openalex.org/W2742733898","https://openalex.org/W4210896998"],"related_works":["https://openalex.org/W2192862863","https://openalex.org/W1497385637","https://openalex.org/W2369288331","https://openalex.org/W2044422526","https://openalex.org/W2519339279","https://openalex.org/W2467097043","https://openalex.org/W3132470374","https://openalex.org/W4313598551","https://openalex.org/W3201578899","https://openalex.org/W2155157673"],"abstract_inverted_index":{"Code":[0],"similarity":[1,64],"measures":[2],"create":[3],"a":[4,43,108,127,140],"comparison":[5],"metric":[6,65],"showing":[7],"to":[8,19,88,95,181],"what":[9],"degree":[10],"two":[11],"code":[12,71,150,172,184,195],"samples":[13],"have":[14],"the":[15,22,46,53,89,96,100,111,146,159,165],"same":[16],"functionality,":[17],"e.g.,":[18],"statically":[20],"detect":[21],"use":[23,55,147],"of":[24,36,48,56,129,143,148,155,161],"known":[25,178],"libraries":[26,58,180],"in":[27,59],"binary":[28,70],"code.":[29],"They":[30],"are":[31,186],"both":[32],"an":[33,153],"indispensable":[34],"part":[35],"automated":[37],"malware":[38],"analysis,":[39],"as":[40,42,75,107],"well":[41],"helper":[44],"for":[45,99,110,145],"detection":[47,141],"plagiarism":[49],"(IP":[50],"protection)":[51],"and":[52,72,92,115,121,170,176,202],"illegal":[54],"open-source":[57,179],"commercial":[60],"apps.":[61],"The":[62],"centroid":[63,90],"extracts":[66],"control-flow":[67],"features":[68],"from":[69,133],"encodes":[73],"them":[74],"geometric":[76],"structures":[77],"before":[78],"comparing":[79],"them.":[80],"In":[81],"our":[82,105,162,190],"paper,":[83],"we":[84,138,174,192],"propose":[85],"novel":[86],"improvements":[87],"approach":[91,106,163],"apply":[93],"it":[94,117],"ARM":[97],"architecture":[98],"first":[101],"time.":[102],"We":[103],"implement":[104],"plug-in":[109],"IDA":[112],"Pro":[113],"disassembler":[114],"evaluate":[116,182],"regarding":[118],"efficiency,":[119],"accuracy":[120],"robustness":[122,160],"on":[123,126,189],"Android.":[124],"Based":[125,188],"dataset":[128],"508,745":[130],"APKs,":[131],"collected":[132],"18":[134],"third-party":[135],"app":[136],"markets,":[137],"achieve":[139],"rate":[142],"89%":[144],"native":[149],"libraries,":[151],"with":[152,204],"FPR":[154],"10.8%.":[156],"To":[157],"test":[158],"against":[164],"compiler":[166],"version,":[167],"optimization":[168],"level,":[169],"other":[171],"transformations,":[173],"obfuscate":[175],"recompile":[177],"which":[183],"transformations":[185],"resisted.":[187],"results,":[191],"discuss":[193],"how":[194],"re-use":[196],"can":[197],"be":[198],"hidden":[199],"by":[200],"obfuscation":[201],"conclude":[203],"possible":[205],"improvements.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
