{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:51:01Z","timestamp":1725677461728},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274744","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness"],"prefix":"10.1145","author":[{"given":"Joey","family":"Allen","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Matthew","family":"Landen","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Sanya","family":"Chaba","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Yang","family":"Ji","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Simon Pak Ho","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mamadroid Oct. 2017. https:\/\/bitbucket.org\/gianluca_students\/mamadroid_code. Mamadroid Oct. 2017. https:\/\/bitbucket.org\/gianluca_students\/mamadroid_code."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_3_1","unstructured":"Allen J. L. pdroid. Master's Thesis University of Tennessee (2016). Allen J. L. pdroid. Master's Thesis University of Tennessee (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_8_1","volume-title":"John Wiley & Sons","author":"Baxevanis A. D.","year":"2004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (Security)","author":"Chen K.","year":"2015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897860"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23296"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Feng Y.","year":"2017"},{"key":"e_1_3_2_1_19_1","unstructured":"Fink S. and Dolby J. Wala--the tj watson libraries for analysis 2012. Fink S. and Dolby J. Wala--the tj watson libraries for analysis 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2014 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)","author":"Fritz C.","year":"2014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1970.10488630"},{"key":"e_1_3_2_1_24_1","unstructured":"I\/O G. Google i\/o. I\/O G. Google i\/o."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Jordaney R.","year":"2017"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland)","author":"Jordaney R.","year":"2016"},{"key":"e_1_3_2_1_27_1","volume-title":"Black Hat USA Briefings (Aug.","author":"Jung J.","year":"2016"},{"key":"e_1_3_2_1_28_1","unstructured":"Lafortune E. etal Proguard. Lafortune E. et al. Proguard."},{"key":"e_1_3_2_1_29_1","unstructured":"Liaw A. Wiener M. et al. Classification and regression by randomforest. R news 2 3 (2002) 18--22. Liaw A. Wiener M. et al. Classification and regression by randomforest. R news 2 3 (2002) 18--22."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS)","author":"Mariconti E.","year":"2016"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820535"},{"key":"e_1_3_2_1_33_1","unstructured":"Mcafee Labs L. Mcafee mobile threat report q1 2018. Mcafee Labs L. Mcafee mobile threat report q1 2018."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23092"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 22th USENIX Security Symposium (Security)","author":"Octeau D.","year":"2013"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23265"},{"key":"e_1_3_2_1_38_1","unstructured":"Pedregosa F. Varoquaux G. Gramfort A. Michel V. Thirion B. Grisel O. Blondel M. Prettenhofer P. Weiss R. Dubourg V. etal Scikit-learn: Machine learning in python. Journal of machine learning research 12 Oct (2011) 2825--2830. Pedregosa F. Varoquaux G. Gramfort A. Michel V. Thirion B. Grisel O. Blondel M. Prettenhofer P. Weiss R. Dubourg V. et al. Scikit-learn: Machine learning in python. Journal of machine learning research 12 Oct (2011) 2825--2830."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818038"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.80266"},{"key":"e_1_3_2_1_43_1","unstructured":"Saikoa B. Dexguard. Saikoa B. Dexguard."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_45_1","unstructured":"Total V. Virustotal-free online virus malware and url scanner. Total V. Virustotal-free online virus malware and url scanner."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"e_1_3_2_1_47_1","unstructured":"Winsniewski R. Android--apktool: A tool for reverse engineering android apk files 2012. Winsniewski R. Android--apktool: A tool for reverse engineering android apk files 2012."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 21st USENIX Security Symposium (Security)","author":"Yan L.-K.","year":"2012"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134642"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180223"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818793"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS)","author":"Zhou Y.","year":"2012"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA","acronym":"ACSAC '18","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T07:06:10Z","timestamp":1673593570000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":55,"alternative-id":["10.1145\/3274694.3274744","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274744","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}