{"id":"https://openalex.org/W2944720157","doi":"https://doi.org/10.1186/s13635-019-0087-1","title":"Machine learning-based dynamic analysis of Android apps with improved code coverage","display_name":"Machine learning-based dynamic analysis of Android apps with improved code coverage","publication_year":2019,"publication_date":"2019-04-29","ids":{"openalex":"https://openalex.org/W2944720157","doi":"https://doi.org/10.1186/s13635-019-0087-1","mag":"2944720157"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-019-0087-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-019-0087-1","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-019-0087-1","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-019-0087-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072809002","display_name":"Suleiman Y. Yerima","orcid":"https://orcid.org/0000-0003-0346-1219"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Suleiman Y. Yerima","raw_affiliation_strings":["De Montfort University, Leicester, LE1 9BH, England, UK"],"affiliations":[{"raw_affiliation_string":"De Montfort University, Leicester, LE1 9BH, England, UK","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076877194","display_name":"Mohammed K. Alzaylaee","orcid":"https://orcid.org/0000-0002-3791-3458"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammed K. Alzaylaee","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, Northern Ireland, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, Northern Ireland, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, Northern Ireland, UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072809002"],"corresponding_institution_ids":["https://openalex.org/I66943878"],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":4.3417,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.95234907,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2019","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8915924429893494},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8344889879226685},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7299025654792786},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7137937545776367},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6578336358070374},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.6040992736816406},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5148581862449646},{"id":"https://openalex.org/keywords/machine-code","display_name":"Machine code","score":0.49486368894577026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4661504030227661},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4314672350883484},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.4131656587123871},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28967341780662537},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.22873139381408691},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2286222279071808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16043445467948914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8915924429893494},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8344889879226685},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7299025654792786},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7137937545776367},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6578336358070374},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.6040992736816406},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5148581862449646},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.49486368894577026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4661504030227661},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4314672350883484},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.4131656587123871},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28967341780662537},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.22873139381408691},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2286222279071808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16043445467948914},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s13635-019-0087-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-019-0087-1","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-019-0087-1","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/7ac1b871-19cf-481e-8c3b-8dc7d52184e3","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/7ac1b871-19cf-481e-8c3b-8dc7d52184e3","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/168472294/s13635_019_0087_1.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yerima , S , Alzaylaee , M &amp; Sezer , S 2019 , ' Machine learning-based dynamic analysis of Android apps with improved code coverage ' , EURASIP Journal on Information Security , vol. 4 , pp. 1-24 . https://doi.org/10.1186/s13635-019-0087-1","raw_type":"article"},{"id":"pmh:oai:doaj.org/article:bbe13c915175489d82fa6497d85b84c1","is_oa":true,"landing_page_url":"https://doaj.org/article/bbe13c915175489d82fa6497d85b84c1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2019, Iss 1, Pp 1-24 (2019)","raw_type":"article"},{"id":"pmh:oai:dora.dmu.ac.uk:2086/17779","is_oa":true,"landing_page_url":"https://www.dora.dmu.ac.uk/handle/2086/17779","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1186/s13635-019-0087-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-019-0087-1","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-019-0087-1","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1340583830","display_name":null,"funder_award_id":"Not applicable","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2177115845","display_name":null,"funder_award_id":"N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3083000804","display_name":"CSIT 2","funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4354350094","display_name":null,"funder_award_id":"CSIT-2 EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4804264507","display_name":null,"funder_award_id":"EP/N508664","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2944720157.pdf","grobid_xml":"https://content.openalex.org/works/W2944720157.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W7469215","https://openalex.org/W1508584952","https://openalex.org/W1540037544","https://openalex.org/W1647869403","https://openalex.org/W1812630525","https://openalex.org/W1943233084","https://openalex.org/W1963971515","https://openalex.org/W1964241047","https://openalex.org/W1982582614","https://openalex.org/W1985686072","https://openalex.org/W1997201541","https://openalex.org/W1997833177","https://openalex.org/W1999728176","https://openalex.org/W2004921952","https://openalex.org/W2010256880","https://openalex.org/W2013856010","https://openalex.org/W2026875669","https://openalex.org/W2055703785","https://openalex.org/W2070386561","https://openalex.org/W2088749975","https://openalex.org/W2091932246","https://openalex.org/W2101800210","https://openalex.org/W2104839588","https://openalex.org/W2108700604","https://openalex.org/W2122672392","https://openalex.org/W2161963160","https://openalex.org/W2164170598","https://openalex.org/W2164539435","https://openalex.org/W2168924027","https://openalex.org/W2186224748","https://openalex.org/W2212330840","https://openalex.org/W2227887088","https://openalex.org/W2249191673","https://openalex.org/W2318851192","https://openalex.org/W2463553622","https://openalex.org/W2487124337","https://openalex.org/W2490191290","https://openalex.org/W2514306170","https://openalex.org/W2523597572","https://openalex.org/W2594215738","https://openalex.org/W2598119844","https://openalex.org/W2601621757","https://openalex.org/W2603160474","https://openalex.org/W2609997969","https://openalex.org/W2614354826","https://openalex.org/W2615082125","https://openalex.org/W2621123093","https://openalex.org/W2745604838","https://openalex.org/W2767532007","https://openalex.org/W2767857768","https://openalex.org/W2782290149","https://openalex.org/W2949992015","https://openalex.org/W2963011053","https://openalex.org/W2998501028","https://openalex.org/W3104213016","https://openalex.org/W3136699861","https://openalex.org/W4300607852","https://openalex.org/W6600783213"],"related_works":["https://openalex.org/W3022728237","https://openalex.org/W3114980949","https://openalex.org/W2964899650","https://openalex.org/W4385749679","https://openalex.org/W4225920890","https://openalex.org/W2286416179","https://openalex.org/W2587046957","https://openalex.org/W2944720157","https://openalex.org/W3047771074","https://openalex.org/W1936837038"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,20,29,35,40,43,61,66,72,113,123,135,142,162,171,185,206],"impact":[4,163],"of":[5,13,31,42,153],"code":[6,21,109,191],"coverage":[7,110,192],"on":[8,25,102,148,164],"machine":[9,166,200],"learning-based":[10,201],"dynamic":[11,23,57,80,158],"analysis":[12,24,58,81],"Android":[14,26,56,73],"malware.":[15],"In":[16,93],"order":[17],"to":[18,33,156,197,205],"maximize":[19,39],"coverage,":[22],"typically":[27],"requires":[28],"generation":[30,51,105,146],"events":[32],"trigger":[34],"user":[36],"interface":[37],"and":[38,91,98,106,129,137,161],"discovery":[41],"run-time":[44],"behavioral":[45,172],"features.":[46],"The":[47,118],"commonly":[48],"used":[49],"event":[50,104],"approach":[52,63,132],"in":[53,78,151,194],"most":[54],"existing":[55],"systems":[59],"is":[60,76],"random-based":[62,115,138],"implemented":[64],"with":[65,71,112,127],"Monkey":[67,75,116],"tool":[68],"that":[69,133,169,183],"comes":[70],"SDK.":[74],"utilized":[77],"popular":[79],"platforms":[82],"like":[83],"AASandbox,":[84],"vetDroid,":[85],"MobileSandbox,":[86],"TraceDroid,":[87],"Andrubis,":[88],"ANANAS,":[89],"DynaLog,":[90],"HADM.":[92],"this":[94],"paper,":[95],"we":[96],"propose":[97],"investigate":[99],"approaches":[100,121],"based":[101],"stateful":[103],"compare":[107,141],"their":[108,154],"capabilities":[111],"state-of-the-practice":[114],"approach.":[117,210],"two":[119],"proposed":[120,186],"are":[122],"state-based":[124,136],"method":[125],"(implemented":[126],"DroidBot)":[128],"a":[130],"hybrid":[131],"combines":[134],"methods.":[139],"We":[140],"three":[143],"different":[144],"input":[145],"methods":[147,187],"real":[149],"devices,":[150],"terms":[152],"ability":[155],"log":[157],"behavior":[159],"features":[160,173],"various":[165],"learning":[167],"algorithms":[168],"utilize":[170],"for":[174],"malware":[175,202],"detection.":[176],"Experiments":[177],"performed":[178],"using":[179],"17,444":[180],"applications":[181],"show":[182],"overall,":[184],"provide":[188],"much":[189],"better":[190],"which":[193],"turn":[195],"leads":[196],"more":[198],"accurate":[199],"detection":[203],"compared":[204],"state-of-":[207],"the-":[208],"art":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
