{"id":"https://openalex.org/W2807471283","doi":"https://doi.org/10.1145/3196494.3196554","title":"Don't throw me away","display_name":"Don't throw me away","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2807471283","doi":"https://doi.org/10.1145/3196494.3196554","mag":"2807471283"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082164247","display_name":"Elkana Pariwono","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Elkana Pariwono","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053184316","display_name":"Daiki Chiba","orcid":"https://orcid.org/0000-0002-7532-6633"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daiki Chiba","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012291537","display_name":"Mitsuaki Akiyama","orcid":"https://orcid.org/0000-0001-7052-8562"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mitsuaki Akiyama","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064493291","display_name":"Tatsuya Mori","orcid":"https://orcid.org/0000-0003-1583-4174"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tatsuya Mori","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.132,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.662907,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"147","last_page":"158"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9938,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.813296},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4375895},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical Research","score":0.4124324}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.813296},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.77725977},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7526232},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7111001},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.70462203},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.59906554},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5871444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5857189},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4375895},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41366497},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4124324},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.69,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1998843210","https://openalex.org/W2094257886","https://openalex.org/W2100307718","https://openalex.org/W2141554582","https://openalex.org/W2209064213","https://openalex.org/W2249879170","https://openalex.org/W2292723020","https://openalex.org/W2294209625","https://openalex.org/W2300716044","https://openalex.org/W2400269587","https://openalex.org/W2506226457","https://openalex.org/W2510008933","https://openalex.org/W2510523362","https://openalex.org/W2532717356","https://openalex.org/W2533677686","https://openalex.org/W2535407856","https://openalex.org/W2555495615","https://openalex.org/W2559870021","https://openalex.org/W2618014206","https://openalex.org/W2751085911","https://openalex.org/W2765490659","https://openalex.org/W2765843494","https://openalex.org/W2914982603","https://openalex.org/W3099035940","https://openalex.org/W591748685"],"related_works":["https://openalex.org/W4396966040","https://openalex.org/W4249118297","https://openalex.org/W3139248031","https://openalex.org/W3042334625","https://openalex.org/W2921723332","https://openalex.org/W2807822918","https://openalex.org/W2717179875","https://openalex.org/W2482950156","https://openalex.org/W2305322260","https://openalex.org/W2149202530"],"abstract_inverted_index":{"This":[0],"study":[1],"aims":[2],"to":[3,116],"understand":[4],"the":[5,33,87,96,137,140,144],"threats":[6,152],"caused":[7,153],"by":[8,13,49,118,154],"abandoned":[9,103,155],"Internet":[10,20,52,104,156],"resources":[11,21,53,105,113,157],"used":[12,64],"Android":[14,92],"apps.":[15,111],"By":[16],"abandoned,":[17],"we":[18,99,149],"mean":[19],"that":[22,25],"support":[23],"apps":[24,93,124],"were":[26],"published":[27,94],"and":[28,42,57,74,78,158],"are":[29,44,114],"still":[30],"available":[31,109],"on":[32,143],"mobile":[34,110],"app":[35],"marketplace,":[36,98],"but":[37],"have":[38,125],"not":[39],"been":[40,126],"maintained":[41],"hence":[43],"at":[45],"risk":[46],"for":[47,65],"abuse":[48],"an":[50],"outsider.":[51],"include":[54],"domain":[55],"names":[56],"hard-coded":[58],"IP":[59],"addresses,":[60],"which":[61],"could":[62],"be":[63],"nefarious":[66],"purposes,":[67],"e.g.,":[68],"stealing":[69],"sensitive":[70],"private":[71],"information,":[72],"scamming":[73],"phishing,":[75],"click":[76],"fraud,":[77],"injecting":[79],"malware":[80],"distribution":[81],"URL.":[82],"As":[83],"a":[84,130,134],"result":[85],"of":[86,89,102,132,136,139,146],"analysis":[88],"1.1":[90],"M":[91],"in":[95],"official":[97],"uncovered":[100],"3,628":[101],"associated":[106],"with":[107],"7,331":[108],"These":[112],"subject":[115],"hijack":[117],"outsiders.":[119],"Of":[120],"these":[121,162],"apps,":[122],"13":[123],"installed":[127],"more":[128],"than":[129],"million":[131],"times,":[133],"measure":[135],"breadth":[138],"threat.":[141],"Based":[142],"findings":[145],"empirical":[147],"experiments,":[148],"discuss":[150],"potential":[151],"propose":[159],"countermeasures":[160],"against":[161],"threats.":[163]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2807471283","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5}],"updated_date":"2024-12-06T23:14:03.781417","created_date":"2018-06-13"}