{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:19:48Z","timestamp":1753521588089,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T00:00:00Z","timestamp":1396828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,7]]},"DOI":"10.1145\/2566486.2568046","type":"proceedings-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:57:59Z","timestamp":1412686679000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["The company you keep"],"prefix":"10.1145","author":[{"given":"Hien Thi Thu","family":"Truong","sequence":"first","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]},{"given":"Eemil","family":"Lagerspetz","sequence":"additional","affiliation":[{"name":"University of Helsinki and Helsinki Institute for Information Technology HIIT, Helsinki, Finland"}]},{"given":"Petteri","family":"Nurmi","sequence":"additional","affiliation":[{"name":"University of Helsinki and Helsinki Institute for Information Technology HIIT, Helsinki, Finland"}]},{"given":"Adam J.","family":"Oliner","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Berkeley, USA"}]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[{"name":"University of Helsinki and Helsinki Institute for Information Technology HIIT, Helsinki, Finland"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"University of Helsinki and Aalto University, Helsinki, Finland"}]},{"given":"Sourav","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"University of Helsinki and Helsinki Institute for Information Technology HIIT, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2014,4,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381949"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.36"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"e_1_3_2_1_5_1","unstructured":"Damballa Labs. Damballa threat report -- first half 2011. Technical report 2011. https:\/\/www.damballa.com\/downloads\/r_pubs\/Damballa_Threat_Report-First_Half_2011.pdf.  Damballa Labs. Damballa threat report -- first half 2011. Technical report 2011. https:\/\/www.damballa.com\/downloads\/r_pubs\/Damballa_Threat_Report-First_Half_2011.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943517"},{"key":"e_1_3_2_1_10_1","unstructured":"B. Krebs. Mobile Malcoders Pay to Google Play Mar. 2013. http:\/\/krebsonsecurity.com\/2013\/03\/mobile-malcoders-pay-to-google-play\/.  B. Krebs. Mobile Malcoders Pay to Google Play Mar. 2013. http:\/\/krebsonsecurity.com\/2013\/03\/mobile-malcoders-pay-to-google-play\/."},{"volume-title":"Proc. the 2013 Network and Distributed Systems Security Conference (NDSS 2013","year":"2013","author":"Lever C.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Lookout Mobile. 2013 mobile threat predictions Dec 2012. https:\/\/blog.lookout.com\/blog\/2012\/12\/13\/2013-mobile-threat-predictions\/.  Lookout Mobile. 2013 mobile threat predictions Dec 2012. https:\/\/blog.lookout.com\/blog\/2012\/12\/13\/2013-mobile-threat-predictions\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Lookout Mobile. Lookout tours the current world of mobile threats. Lookout blog June 2013. https:\/\/blog.lookout.com\/blog\/2013\/06\/05\/world-current-of-mobile-threats\/.  Lookout Mobile. Lookout tours the current world of mobile threats. Lookout blog June 2013. https:\/\/blog.lookout.com\/blog\/2013\/06\/05\/world-current-of-mobile-threats\/."},{"volume-title":"CreditUnion Times","year":"2013","author":"McGarvey R.","key":"e_1_3_2_1_14_1"},{"volume-title":"PRNEwsWire, 2013","year":"1806","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517354"},{"key":"e_1_3_2_1_17_1","unstructured":"L. Page. Update from the CEO Mar. 2013. http:\/\/googleblog.blogspot.fi\/2013\/03\/update-from-ceo.html.  L. Page. Update from the CEO Mar. 2013. http:\/\/googleblog.blogspot.fi\/2013\/03\/update-from-ceo.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307661"},{"key":"e_1_3_2_1_19_1","unstructured":"S. M. Patterson. Contrary to what you've heard Android is almost impenetrable to malware Oct 2013. http:\/\/qz.com\/131436\/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware\/.  S. M. Patterson. Contrary to what you've heard Android is almost impenetrable to malware Oct 2013. http:\/\/qz.com\/131436\/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"volume-title":"National Computer Security Conference","year":"1988","author":"Sebring M. M.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_24_1","unstructured":"C. Sumner and R. Wald. Predicting susceptibility to social bots on twitter. BlackHat US presentation. https:\/\/media.blackhat.com\/us-13\/US-13-Sumner-Predicting-Susceptibility-to-Social-Bots-on-Twitter-Slides.pdf.  C. Sumner and R. Wald. Predicting susceptibility to social bots on twitter. BlackHat US presentation. https:\/\/media.blackhat.com\/us-13\/US-13-Sumner-Predicting-Susceptibility-to-Social-Bots-on-Twitter-Slides.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Trend Labs. Trojanized security tool serves as backdoor app Mar 2011. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trojanized-security-tool-serves-as-backdoor-app\/.  Trend Labs. Trojanized security tool serves as backdoor app Mar 2011. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trojanized-security-tool-serves-as-backdoor-app\/."},{"key":"e_1_3_2_1_26_1","unstructured":"H. T. T. Truong E. Lagerspetz P. Nurmi A. J. Oliner S. Tarkoma N. Asokan and S. Bhattacharya. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. CoRR abs\/1312.3245 2013. http:\/\/arxiv.org\/abs\/1312.3245.  H. T. T. Truong E. Lagerspetz P. Nurmi A. J. Oliner S. Tarkoma N. Asokan and S. Bhattacharya. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. CoRR abs\/1312.3245 2013. http:\/\/arxiv.org\/abs\/1312.3245."},{"volume-title":"2nd workshop on Making Sense of Microposts at WWW2012","year":"2012","author":"Wagner C.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","first-page":"572","volume-title":"IEEE Third International Conference on Social Computing (SocialCom)","author":"Yang L.","year":"2011"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"volume-title":"Proc. the 2012 Network and Distributed Systems Security Conference (NDSS 2012)","year":"2012","author":"Zhou Y.","key":"e_1_3_2_1_30_1"}],"event":{"name":"WWW '14: 23rd International World Wide Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Seoul Korea","acronym":"WWW '14"},"container-title":["Proceedings of the 23rd international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566486.2568046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2566486.2568046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:00Z","timestamp":1750230060000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566486.2568046"}},"subtitle":["mobile malware infection rates and inexpensive risk indicators"],"short-title":[],"issued":{"date-parts":[[2014,4,7]]},"references-count":30,"alternative-id":["10.1145\/2566486.2568046","10.1145\/2566486"],"URL":"https:\/\/doi.org\/10.1145\/2566486.2568046","relation":{},"subject":[],"published":{"date-parts":[[2014,4,7]]},"assertion":[{"value":"2014-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}