{"id":"https://openalex.org/W2780577826","doi":"https://doi.org/10.1109/tifs.2017.2787905","title":"Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection","display_name":"Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection","publication_year":2017,"publication_date":"2017-12-28","ids":{"openalex":"https://openalex.org/W2780577826","doi":"https://doi.org/10.1109/tifs.2017.2787905","mag":"2780577826"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2787905","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School, Wuhan University, Wuhan, China","Science and Technology on Communication Security Laboratory, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085631526","display_name":"Chiheng Wang","orcid":"https://orcid.org/0000-0002-8153-5909"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chiheng Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073603754","display_name":"Ziming Zhao","orcid":"https://orcid.org/0000-0002-4930-5556"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437976","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-5624-2987"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Samsung Research, Seoul Korea"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Samsung Research, Seoul Korea","institution_ids":["https://openalex.org/I2250650973"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":13.231,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":150,"citation_normalized_percentile":{"value":0.844679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":"5","first_page":"1286","last_page":"1300"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9828,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9816,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.957665},{"id":"https://openalex.org/keywords/timeline","display_name":"Time line","score":0.48072174}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.957665},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8615743},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8044865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52292},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5181321},{"id":"https://openalex.org/C4438859","wikidata":"https://www.wikidata.org/wiki/Q186117","display_name":"Timeline","level":2,"score":0.48072174},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.45249552},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.28793752},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28537995},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2787905","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.81,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320309835","funder_display_name":"Arizona State University","award_id":null},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702379"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61728209"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772383"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1536106"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61628202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"},{"funder":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","award_id":null},{"funder":"https://openalex.org/F4320334978","funder_display_name":"Beijing Nova Program","award_id":null},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2016QY04W0805"}],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1437814062","https://openalex.org/W1445387515","https://openalex.org/W1491356120","https://openalex.org/W1658739283","https://openalex.org/W1963971515","https://openalex.org/W2017025011","https://openalex.org/W2068583268","https://openalex.org/W2078197322","https://openalex.org/W2085577046","https://openalex.org/W2100149279","https://openalex.org/W2119359024","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2141554582","https://openalex.org/W2168103835","https://openalex.org/W2295442328","https://openalex.org/W2296579688","https://openalex.org/W2461373307","https://openalex.org/W2513529237","https://openalex.org/W2514847810","https://openalex.org/W2559964890","https://openalex.org/W2601591992"],"related_works":["https://openalex.org/W4391249598","https://openalex.org/W4254228154","https://openalex.org/W3201228709","https://openalex.org/W3094038556","https://openalex.org/W3049477255","https://openalex.org/W2734259032","https://openalex.org/W2317428717","https://openalex.org/W2114034199","https://openalex.org/W2014772881","https://openalex.org/W1858249912"],"abstract_inverted_index":{"In":[0,33,76,126],"recent":[1],"years,":[2],"we":[3,79,93,114,154],"witnessed":[4],"a":[5,21,41,60,156],"drastic":[6],"increase":[7],"of":[8,23,28,35,59,70,105,131,169,175],"ransomware,":[9],"especially":[10],"on":[11,81,111],"popular":[12],"mobile":[13,71],"platforms":[14],"including":[15,121],"Android.":[16],"Ransomware":[17],"extorts":[18,149],"victims":[19],"for":[20,141],"sum":[22],"money":[24],"by":[25,56,151,189],"taking":[26],"control":[27],"their":[29,36],"devices":[30],"or":[31],"files.":[32],"light":[34],"rapid":[37],"growth,":[38],"there":[39,65],"is":[40,53],"pressing":[42],"need":[43],"to":[44,87,96],"develop":[45],"effective":[46],"countermeasure":[47],"solutions.":[48,144],"However,":[49],"the":[50,57,74,82,103,128,165,173,183],"research":[51],"community":[52],"still":[54],"constrained":[55],"lack":[58],"comprehensive":[61],"data":[62],"set,":[63],"and":[64,85,123,172,205],"exists":[66],"no":[67],"insightful":[68],"understanding":[69],"ransomware":[72,99,108,147,201],"in":[73],"wild.":[75],"this":[77],"paper,":[78],"focus":[80],"Android":[83,90,107],"platform":[84],"aim":[86],"characterize":[88,116],"existing":[89,106,132],"ransomware.":[91],"Specifically,":[92],"have":[94],"managed":[95],"collect":[97],"2,721":[98],"samples":[100],"that":[101,148,195],"cover":[102],"majority":[104],"families.":[109],"Based":[110],"these":[112],"samples,":[113],"systematically":[115],"them":[117],"from":[118],"several":[119],"aspects,":[120],"timeline":[122],"malicious":[124],"features.":[125],"addition,":[127],"detection":[129,159],"results":[130,193],"anti-virus":[133],"tools":[134],"are":[135,187],"rather":[136],"disappointing,":[137],"which":[138],"clearly":[139],"calls":[140],"customized":[142],"anti-mobile-ransomware":[143],"To":[145],"detect":[146,199],"users":[150],"encrypting":[152,200],"data,":[153],"propose":[155],"novel":[157],"real-time":[158],"system,":[160],"called":[161],"RansomProber.":[162],"By":[163],"analyzing":[164],"user":[166],"interface":[167],"widgets":[168],"related":[170],"activities":[171],"coordinates":[174],"users'":[176],"finger":[177],"movements,":[178],"RansomProber":[179,196],"can":[180,197],"infer":[181],"whether":[182],"file":[184],"encryption":[185],"operations":[186],"initiated":[188],"users.":[190],"The":[191],"experimental":[192],"show":[194],"effectively":[198],"with":[202],"high":[203],"accuracy":[204],"acceptable":[206],"runtime":[207],"performance.":[208]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2780577826","counts_by_year":[{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":28},{"year":2019,"cited_by_count":29},{"year":2018,"cited_by_count":13}],"updated_date":"2025-01-18T06:08:43.204462","created_date":"2018-01-05"}