{"id":"https://openalex.org/W4283703106","doi":"https://doi.org/10.3233/jifs-220567","title":"AmandaSystem: A new framework for static and dynamic Android malware analysis","display_name":"AmandaSystem: A new framework for static and dynamic Android malware analysis","publication_year":2022,"publication_date":"2022-06-29","ids":{"openalex":"https://openalex.org/W4283703106","doi":"https://doi.org/10.3233/jifs-220567"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-220567","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-220567","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070978315","display_name":"Jianfei Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfei Tang","raw_affiliation_strings":["Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","Xinjiang Key Laboratory of Signal Detection and Processing, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"Xinjiang Key Laboratory of Signal Detection and Processing, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People's Republic of China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048358428","display_name":"Hui Zhao","orcid":"https://orcid.org/0000-0002-7193-1086"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Zhao","raw_affiliation_strings":["Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","Xinjiang Key Laboratory of Signal Detection and Processing, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"Xinjiang Key Laboratory of Signal Detection and Processing, School of Information Science and Engineering, Xinjiang University, People\u2019s Republic of China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"Xinjiang Key Laboratory of Multilingual Information Technology, School of Information Science and Engineering, Xinjiang University, People's Republic of China","institution_ids":["https://openalex.org/I96908189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048358428"],"corresponding_institution_ids":["https://openalex.org/I96908189"],"apc_list":null,"apc_paid":null,"fwci":0.4458,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56918928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"43","issue":"5","first_page":"6575","last_page":"6589"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8884812593460083},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7341314554214478},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.6876806020736694},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6485059261322021},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5240564346313477},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5158399939537048},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5053970813751221},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4316059350967407},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4193437397480011},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39399397373199463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19710585474967957},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16783711314201355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8884812593460083},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7341314554214478},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.6876806020736694},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6485059261322021},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5240564346313477},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5158399939537048},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5053970813751221},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4316059350967407},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4193437397480011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39399397373199463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19710585474967957},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16783711314201355},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-220567","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-220567","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1536098516","https://openalex.org/W2792736988","https://openalex.org/W2885070483","https://openalex.org/W2887944710","https://openalex.org/W2947576068"],"related_works":["https://openalex.org/W2183925834","https://openalex.org/W2955731880","https://openalex.org/W4220934934","https://openalex.org/W4225094272","https://openalex.org/W2560986557","https://openalex.org/W4320167422","https://openalex.org/W4287235996","https://openalex.org/W4312234627","https://openalex.org/W2969365378","https://openalex.org/W4372204314"],"abstract_inverted_index":{"The":[0],"focus":[1],"of":[2,6,26,42,51,90,94,122,142,160,172,179,186,195,268,272,275,282],"a":[3,35,91,111,139,224],"large":[4,92,140],"amount":[5],"research":[7],"on":[8,14,63,135,208,231,254],"malware":[9,69,113,124,136,163,258],"detection":[10,30,53,114,125,164],"is":[11],"currently":[12],"working":[13],"proposing":[15],"and":[16,59,71,96,182,200,215,237,246,262,280],"improving":[17],"neural":[18],"network":[19],"structures,":[20],"but":[21],"with":[22,138,287],"the":[23,28,40,48,57,97,157,167,170,177,184,192,204,266],"constant":[24],"updates":[25],"Android,":[27],"proposed":[29],"methods":[31,54,61,126,206,289],"are":[32,55,100],"more":[33],"like":[34],"race":[36],"against":[37],"time.":[38],"Through":[39],"analysis":[41,70,89,228],"these":[43,52,60],"methods,":[44],"we":[45,148,222,251],"found":[46],"that":[47,118,154],"basic":[49],"processes":[50,159],"roughly":[56],"same,":[58],"rely":[62],"professional":[64],"reverse":[65],"engineering":[66],"tools":[67,75],"for":[68,103,240],"feature":[72,104],"extraction.":[73,105],"These":[74],"generally":[76],"have":[77],"problems":[78],"such":[79],"as":[80],"high":[81],"time-space":[82],"cost":[83],"consumption,":[84],"difficulty":[85],"in":[86,270],"achieving":[87],"concurrent":[88],"number":[93,141],"Apk,":[95],"output":[98],"results":[99],"not":[101],"convenient":[102],"Is":[106],"it":[107],"possible":[108],"to":[109,130,176,233,264],"propose":[110,149,223],"general":[112],"process":[115,121],"implementation":[116],"platform":[117],"optimizes":[119],"each":[120],"existing":[123,288],"while":[127,203],"being":[128],"able":[129],"efficiently":[131],"extract":[132],"various":[133,158],"features":[134],"datasets":[137],"APK?":[143],"To":[144,218],"solve":[145,219],"this":[146,220],"problem,":[147,221],"an":[150,235],"automated":[151],"platform,":[152],"AmandaSystem,":[153],"highly":[155],"integrates":[156],"deep":[161],"learning-based":[162],"methods.":[165],"At":[166],"same":[168],"time,":[169],"problem":[171,185],"over":[173],"privilege":[174],"due":[175],"openness":[178],"Android":[180,244],"system":[181],"thus":[183],"excessive":[187],"privileges":[188,199],"has":[189],"always":[190],"required":[191],"accurate":[193],"construction":[194],"mapping":[196,241],"relationships":[197,242],"between":[198,243],"API":[201,247],"calls,":[202,248],"current":[205],"based":[207,230],"function":[209],"call":[210],"graphs":[211],"suffer":[212],"from":[213],"inefficiency":[214],"low":[216],"accuracy.":[217],"new":[225],"bottom-up":[226],"static":[227],"method":[229],"AmandaSystem":[232,269],"achieve":[234],"efficient":[236],"complete":[238],"tool":[239],"permissions":[245],"PerApTool.":[249],"Finally,":[250],"conducted":[252],"tests":[253],"three":[255],"publicly":[256],"available":[257],"datasets,":[259],"CICMalAnal2017,":[260],"CIC-AAGM2017,":[261],"CIC-InvesAndMal2019,":[263],"evaluate":[265],"performance":[267],"terms":[271],"time":[273],"efficiency":[274],"APK":[276],"parsing,":[277],"space":[278],"occupancy,":[279],"comprehensiveness":[281],"extracted":[283],"features,":[284],"respectively,":[285],"compared":[286],"were":[290],"compared.":[291]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
