{"id":"https://openalex.org/W2523597572","doi":"https://doi.org/10.5220/0006094006100621","title":"Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices","display_name":"Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2523597572","doi":"https://doi.org/10.5220/0006094006100621","mag":"2523597572"},"language":"en","primary_location":{"id":"doi:10.5220/0006094006100621","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006094006100621","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0006094006100621","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037441194","display_name":"Paul Irolla","orcid":"https://orcid.org/0000-0001-6185-7057"},"institutions":[{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]},{"id":"https://openalex.org/I12187552","display_name":"UniLaSalle Amiens (ESIEE-Amiens)","ror":"https://ror.org/03r13py57","country_code":"FR","type":"education","lineage":["https://openalex.org/I12187552"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Paul Irolla","raw_affiliation_strings":["\u00c9cole d\u2019Ing\u00e9nieurs du Monde Num\u00e9rique (ESIEA), France","\u00c9cole Normale Sup\u00e9rieure - PSL, Paris, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"\u00c9cole d\u2019Ing\u00e9nieurs du Monde Num\u00e9rique (ESIEA), France","institution_ids":["https://openalex.org/I12187552"]},{"raw_affiliation_string":"\u00c9cole Normale Sup\u00e9rieure - PSL, Paris, France","institution_ids":["https://openalex.org/I29607241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089725479","display_name":"\u00c9ric Filiol","orcid":null},"institutions":[{"id":"https://openalex.org/I35298706","display_name":"ESIEA University","ror":"https://ror.org/00g6cx256","country_code":"FR","type":"education","lineage":["https://openalex.org/I35298706"]},{"id":"https://openalex.org/I12187552","display_name":"UniLaSalle Amiens (ESIEE-Amiens)","ror":"https://ror.org/03r13py57","country_code":"FR","type":"education","lineage":["https://openalex.org/I12187552"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Eric Filiol","raw_affiliation_strings":["\u00c9cole d\u2019Ing\u00e9nieurs du Monde Num\u00e9rique (ESIEA), France","ESIEA University, Paris, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"\u00c9cole d\u2019Ing\u00e9nieurs du Monde Num\u00e9rique (ESIEA), France","institution_ids":["https://openalex.org/I12187552"]},{"raw_affiliation_string":"ESIEA University, Paris, France","institution_ids":["https://openalex.org/I35298706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037441194"],"corresponding_institution_ids":["https://openalex.org/I12187552","https://openalex.org/I29607241"],"apc_list":null,"apc_paid":null,"fwci":0.9321,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73964013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"610","last_page":"621"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.838645339012146},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8358240723609924},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919716835021973},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7315143346786499},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.6440178155899048},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6199538111686707},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5535767078399658},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5076192617416382},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.49922895431518555},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.479885458946228},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.4629579186439514},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.4605933427810669},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.41460996866226196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40158605575561523}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.838645339012146},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8358240723609924},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919716835021973},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7315143346786499},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.6440178155899048},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6199538111686707},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5535767078399658},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5076192617416382},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.49922895431518555},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.479885458946228},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.4629579186439514},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.4605933427810669},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41460996866226196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40158605575561523},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.5220/0006094006100621","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006094006100621","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1609.04718","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1609.04718","pdf_url":"https://arxiv.org/pdf/1609.04718","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2523597572","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1609.04718.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1609.04718","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1609.04718","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.5220/0006094006100621","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006094006100621","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1733713784","https://openalex.org/W1865564993","https://openalex.org/W1901535919","https://openalex.org/W1990649188","https://openalex.org/W1997201541","https://openalex.org/W2068583268","https://openalex.org/W2070386561","https://openalex.org/W2090534521","https://openalex.org/W2164539435","https://openalex.org/W2227887088","https://openalex.org/W2334842536","https://openalex.org/W2571682498"],"related_works":["https://openalex.org/W2963409840","https://openalex.org/W1978762841","https://openalex.org/W2876466190","https://openalex.org/W2755856027","https://openalex.org/W2071072485","https://openalex.org/W2782729947","https://openalex.org/W2901454985","https://openalex.org/W207341673","https://openalex.org/W2888794899","https://openalex.org/W2747287993","https://openalex.org/W2806548100","https://openalex.org/W2015790908","https://openalex.org/W2792253122","https://openalex.org/W2795309687","https://openalex.org/W2158874007","https://openalex.org/W3106148750","https://openalex.org/W123981973","https://openalex.org/W2557532392","https://openalex.org/W2744873155","https://openalex.org/W2921546215"],"abstract_inverted_index":{"Android":[0,157],"is":[1,15,71,103,127],"the":[2,17,60,64,108,139,146,149,164,174,181,196],"most":[3,18],"widely":[4,19],"used":[5],"smartphone":[6],"OS":[7],"with":[8,67,77,155],"82.8%":[9],"market":[10],"share":[11],"in":[12,120],"2015.":[13],"It":[14,114,126],"therefore":[16],"targeted":[20],"system":[21,91,131],"by":[22,172],"malware":[23,32,100,112],"authors.":[24],"Researchers":[25],"rely":[26],"on":[27,117,180,189],"dynamic":[28,109,158],"analysis":[29,110,159],"to":[30,38,45,62,168],"extract":[31],"behaviors":[33,171],"and":[34,52,75,123,135,151],"often":[35],"use":[36,95],"emulators":[37,43],"do":[39],"so.":[40],"However,":[41],"using":[42],"lead":[44],"new":[46],"issues.":[47],"Malware":[48],"may":[49],"detect":[50],"emulation":[51],"as":[53],"a":[54,72,78,90,104,121,128],"result":[55],"it":[56,154,187],"does":[57,93],"not":[58,94],"execute":[59],"payload":[61],"prevent":[63],"analysis.":[65,143],"Dealing":[66],"virtual":[68,96],"device":[69],"evasion":[70],"never-ending":[73],"war":[74],"comes":[76],"non-negligible":[79],"computation":[80],"cost.":[81],"To":[82],"overcome":[83],"this":[84],"state":[85],"of":[86,111,148,166,177],"affairs,":[87],"we":[88,152,162],"propose":[89],"that":[92,132,186],"devices":[97,119],"for":[98,107,141],"analysing":[99],"behavior.":[101],"Glassbox":[102,167],"functional":[105],"prototype":[106],"applications.":[113],"executes":[115,188],"applications":[116],"real":[118],"monitored":[122],"controlled":[124],"environment.":[125],"fully":[129],"automated":[130],"installs,":[133],"tests":[134],"extracts":[136],"features":[137],"from":[138],"application":[140,170],"further":[142],"We":[144,184],"present":[145],"architecture":[147],"platform":[150],"compare":[153],"existing":[156],"platforms.":[160],"Lastly,":[161],"evaluate":[163],"capacity":[165],"trigger":[169],"measuring":[173],"average":[175,190],"coverage":[176],"basic":[178,193],"blocks":[179,194],"AndroCoverage":[182],"dataset.":[183],"show":[185],"13.52%":[191],"more":[192],"than":[195],"Monkey":[197],"program.":[198]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
