{"id":"https://openalex.org/W3196645365","doi":"https://doi.org/10.1145/3460120.3485353","title":"An Ontology-driven Knowledge Graph for Android Malware","display_name":"An Ontology-driven Knowledge Graph for Android Malware","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3196645365","doi":"https://doi.org/10.1145/3460120.3485353","mag":"3196645365"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3485353","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3485353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2109.01544","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051113504","display_name":"Ryan Christian","orcid":null},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ryan Christian","raw_affiliation_strings":["Rensselaer Polytechnic Institute, Troy, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rensselaer Polytechnic Institute, Troy, NY, USA","institution_ids":["https://openalex.org/I165799507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060987859","display_name":"Sharmishtha Dutta","orcid":"https://orcid.org/0000-0002-4464-1462"},"institutions":[{"id":"https://openalex.org/I1321014770","display_name":"Association for Computing Machinery","ror":"https://ror.org/03wsadn68","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1321014770"]},{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sharmishtha Dutta","raw_affiliation_strings":["Rensselaer Polytechnic Institute, Troy, NY, USA","Association for Computing Machinery"],"affiliations":[{"raw_affiliation_string":"Rensselaer Polytechnic Institute, Troy, NY, USA","institution_ids":["https://openalex.org/I165799507"]},{"raw_affiliation_string":"Association for Computing Machinery","institution_ids":["https://openalex.org/I1321014770"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101438262","display_name":"Youngja Park","orcid":"https://orcid.org/0000-0002-4579-9261"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Youngja Park","raw_affiliation_strings":["IBM TJ Watson Research Center, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM TJ Watson Research Center, Yorktown Heights, NY, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001140269","display_name":"Nidhi Rastogi","orcid":"https://orcid.org/0000-0002-2002-3213"},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]},{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nidhi Rastogi","raw_affiliation_strings":["Rochester Institute of Technology &amp; Rensselaer Polytechnic Institute, Troy, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology &amp; Rensselaer Polytechnic Institute, Troy, NY, USA","institution_ids":["https://openalex.org/I165799507","https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051113504"],"corresponding_institution_ids":["https://openalex.org/I165799507"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1092319,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2435","last_page":"2437"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8431702852249146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7945307493209839},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5706418752670288},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5121881365776062},{"id":"https://openalex.org/keywords/knowledge-graph","display_name":"Knowledge graph","score":0.4937213361263275},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.47529351711273193},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4724964201450348},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.41146671772003174},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3581191301345825},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32756203413009644},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.298380970954895},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.20183011889457703}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8431702852249146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7945307493209839},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5706418752670288},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5121881365776062},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.4937213361263275},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.47529351711273193},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4724964201450348},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.41146671772003174},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3581191301345825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32756203413009644},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.298380970954895},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.20183011889457703},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3460120.3485353","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3485353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2109.01544","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.01544","pdf_url":"https://arxiv.org/pdf/2109.01544","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3196645365","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/2109.01544.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2109.01544","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2109.01544","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2109.01544","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.01544","pdf_url":"https://arxiv.org/pdf/2109.01544","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323054","display_name":"Associazione Italiana per la Ricerca sul Cancro","ror":"https://ror.org/02g2x7380"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3196645365.pdf","grobid_xml":"https://content.openalex.org/works/W3196645365.grobid-xml"},"referenced_works_count":5,"referenced_works":["https://openalex.org/W1594247117","https://openalex.org/W1942169943","https://openalex.org/W2487152776","https://openalex.org/W3179788886","https://openalex.org/W3186276894"],"related_works":["https://openalex.org/W3101971470","https://openalex.org/W2893933958","https://openalex.org/W3091659526","https://openalex.org/W2536574834","https://openalex.org/W2943343844","https://openalex.org/W2381435367","https://openalex.org/W1728473882","https://openalex.org/W1975074539","https://openalex.org/W2401197989","https://openalex.org/W3135154776","https://openalex.org/W3083956117","https://openalex.org/W2394958174","https://openalex.org/W2189208516","https://openalex.org/W1588426060","https://openalex.org/W914373353","https://openalex.org/W2395535657","https://openalex.org/W1586424344","https://openalex.org/W2740477497","https://openalex.org/W2778960943","https://openalex.org/W2770706016"],"abstract_inverted_index":{"We":[0],"present":[1],"MalONT2.0":[2,44,154],"--":[3],"an":[4,62],"ontology":[5,67],"for":[6,71],"malware":[7,20,64,73,131],"threat":[8,74,97,117],"intelligence":[9,75,98,118],"[4].":[10],"New":[11],"classes":[12,52],"(attack":[13],"patterns,":[14],"infrastructural":[15],"resources":[16],"to":[17,22,47],"enable":[18],"attacks,":[19],"analysis":[21,28],"incorporate":[23],"static":[24],"analysis,":[25],"and":[26,31,53,58,103,121,139,150,155],"dynamic":[27],"of":[29,40,61,108,112,127],"binaries)":[30],"relations":[32,54],"have":[33,89],"been":[34,90],"added":[35],"following":[36],"a":[37,145],"broadened":[38],"scope":[39],"core":[41],"competency":[42],"questions.":[43],"allows":[45],"researchers":[46],"extensively":[48],"capture":[49],"all":[50],"requisite":[51],"that":[55,129],"gather":[56],"semantic":[57],"syntactic":[59],"characteristics":[60],"android":[63,96],"attack.":[65],"This":[66],"forms":[68],"the":[69,72,101,106,148],"basis":[70],"knowledge":[76],"graph,":[77],"MalKG,":[78],"which":[79],"we":[80,152],"exemplify":[81],"using":[82],"three":[83],"different,":[84],"non-overlapping":[85],"demonstrations.":[86],"Malware":[87],"features":[88,132],"extracted":[91],"from":[92],"openCTI":[93],"reports":[94],"on":[95,100],"shared":[99],"Internet":[102],"written":[104,134],"in":[105],"form":[107],"unstructured":[109],"text.":[110],"Some":[111],"these":[113],"sources":[114],"are":[115],"blogs,":[116],"reports,":[119],"tweets,":[120],"news":[122],"articles.":[123],"The":[124],"smallest":[125],"unit":[126],"information":[128],"captures":[130],"is":[133],"as":[135],"triples":[136],"comprising":[137],"head":[138],"tail":[140],"entities,":[141],"each":[142],"connected":[143],"with":[144],"relation.":[146],"In":[147],"poster":[149],"demonstration,":[151],"discuss":[153],"MalKG.":[156]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
