{"id":"https://openalex.org/W4301163492","doi":"https://doi.org/10.1145/3538969.3544415","title":"On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages","display_name":"On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4301163492","doi":"https://doi.org/10.1145/3538969.3544415"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544415","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078523628","display_name":"Marc Ohm","orcid":"https://orcid.org/0000-0002-2913-5270"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marc Ohm","raw_affiliation_strings":["Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071230577","display_name":"Felix Boes","orcid":"https://orcid.org/0000-0001-8916-3209"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Felix Boes","raw_affiliation_strings":["Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003001823","display_name":"Christian Bungartz","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Bungartz","raw_affiliation_strings":["Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103100716","display_name":"Michael Meier","orcid":"https://orcid.org/0000-0002-8443-7618"},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]},{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Meier","raw_affiliation_strings":["Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany and Fraunhofer FKIE, Germany"],"affiliations":[{"raw_affiliation_string":"Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn, Germany and Fraunhofer FKIE, Germany","institution_ids":["https://openalex.org/I135140700","https://openalex.org/I4210166245"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.612,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.999284,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7151754},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised Learning","score":0.5306712}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79380393},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.75291336},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7151754},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6543837},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6418921},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.55812967},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.5306712},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4416869},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34148815},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.13025916},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.093372166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544415","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme","award_id":"830892"}],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W2009803064","https://openalex.org/W2148542607","https://openalex.org/W2742244373","https://openalex.org/W2789570312","https://openalex.org/W2900633536","https://openalex.org/W2953558274","https://openalex.org/W3046453918","https://openalex.org/W3081194266","https://openalex.org/W3094525800","https://openalex.org/W3114916308","https://openalex.org/W3149084432","https://openalex.org/W3162344723","https://openalex.org/W3196277935","https://openalex.org/W3207355325","https://openalex.org/W4226416841"],"related_works":["https://openalex.org/W4399290976","https://openalex.org/W4390062853","https://openalex.org/W4389256085","https://openalex.org/W4381280689","https://openalex.org/W4313644201","https://openalex.org/W4285328440","https://openalex.org/W3128025644","https://openalex.org/W2847365777","https://openalex.org/W2787993192","https://openalex.org/W2158269427"],"abstract_inverted_index":{"Modern":[0],"software":[1,37,118],"development":[2],"heavily":[3],"relies":[4],"on":[5,120,142],"a":[6,20,30,94,112,157,172],"multitude":[7],"of":[8,32,51,57,78,97,115,126,136,153,160,167,175,188,199,208],"externally":[9],"\u2013":[10,15],"often":[11],"also":[12],"open":[13],"source":[14],"developed":[16],"components":[17],"that":[18],"constitute":[19],"so-called":[21],"Software":[22],"Supply":[23],"Chain.":[24],"Over":[25],"the":[26,54,75,124,137,146,165,186,204],"last":[27],"few":[28],"years":[29],"rise":[31],"trojanized":[33],"(i.e.,":[34],"maliciously":[35],"manipulated)":[36],"packages":[38,60,119,169,177],"have":[39,71],"been":[40,72],"observed":[41],"and":[42,106,203,206],"addressed":[43],"in":[44],"multiple":[45,154],"academic":[46],"publications.":[47],"A":[48],"central":[49],"issue":[50],"this":[52],"is":[53,82,130],"timely":[55],"detection":[56,166,205],"such":[58],"malicious":[59,117,168,212],"for":[61,164,178],"which":[62,121,193],"typically":[63],"single":[64],"heuristic-":[65],"or":[66],"machine":[67,80,101,162],"learning":[68,81,102,163],"based":[69],"approaches":[70],"chosen.":[73],"Especially":[74],"general":[76],"suitability":[77],"supervised":[79,100,161],"currently":[83],"not":[84],"fully":[85],"covered.":[86],"In":[87],"order":[88],"to":[89,195],"gain":[90],"insight,":[91],"we":[92,110,122],"analyze":[93],"diverse":[95],"set":[96],"commonly":[98],"employed":[99],"techniques,":[103],"both":[104],"quantitatively":[105],"qualitatively.":[107],"More":[108],"precisely,":[109],"leverage":[111],"labeled":[113],"dataset":[114],"known":[116],"measure":[123],"performance":[125],"each":[127],"technique.":[128],"This":[129,182],"followed":[131],"by":[132,170],"an":[133],"in-depth":[134],"analysis":[135],"three":[138],"best":[139],"performing":[140],"classifiers":[141,155],"unlabeled":[143],"data,":[144],"i.e.,":[145],"whole":[147],"npm":[148],"package":[149],"repository.":[150],"Our":[151],"combination":[152],"indicates":[156],"good":[158],"viability":[159],"pre-selecting":[171],"feasible":[173],"number":[174],"suspicious":[176],"further":[179],"manual":[180],"analysis.":[181],"research":[183],"effort":[184],"includes":[185],"evaluation":[187],"over":[189,200],"25,210":[190],"different":[191],"models":[192],"led":[194],"True":[196],"Positive":[197],"Rates":[198],"70":[201],"%":[202],"reporting":[207],"13":[209],"previously":[210],"unknown":[211],"packages.":[213]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4301163492","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-05T12:51:34.566823","created_date":"2022-10-04"}