{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:10:33Z","timestamp":1754107833805,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230870","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["ToGather"],"prefix":"10.1145","author":[{"given":"ElMouatez Billah","family":"Karbab","sequence":"first","affiliation":[{"name":"Security Research Centre, Concordia University, Montreal, Quebec, Canada"}]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[{"name":"Security Research Centre, Concordia University, Montreal, Quebec, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"unstructured":"AlexaTop Sites - https:\/\/tinyurl.com\/dkwndx 2016.  AlexaTop Sites - https:\/\/tinyurl.com\/dkwndx 2016.","key":"e_1_3_2_1_1_1"},{"unstructured":"Amazon IP Space - https:\/\/tinyurl.com\/ze7pvdr 2016.  Amazon IP Space - https:\/\/tinyurl.com\/ze7pvdr 2016.","key":"e_1_3_2_1_2_1"},{"unstructured":"Android Auto - http:\/\/tinyurl.com\/hdsunht 2016.  Android Auto - http:\/\/tinyurl.com\/hdsunht 2016.","key":"e_1_3_2_1_3_1"},{"unstructured":"Android Wear - http:\/\/tinyurl.com\/qfa55o4 2016.  Android Wear - http:\/\/tinyurl.com\/qfa55o4 2016.","key":"e_1_3_2_1_4_1"},{"unstructured":"Brillo - http:\/\/tinyurl.com\/q5ko3zu 2016.  Brillo - http:\/\/tinyurl.com\/q5ko3zu 2016.","key":"e_1_3_2_1_5_1"},{"unstructured":"G DATA Mobile Malware Report - http:\/\/tinyurl.com\/jecm8gg 2016.  G DATA Mobile Malware Report - http:\/\/tinyurl.com\/jecm8gg 2016.","key":"e_1_3_2_1_6_1"},{"unstructured":"Market Share - https:\/\/tinyurl.com\/hy8z53j 2016.  Market Share - https:\/\/tinyurl.com\/hy8z53j 2016.","key":"e_1_3_2_1_7_1"},{"unstructured":"Quantcast Sites - https:\/\/tinyurl.com\/gmd577y 2016.  Quantcast Sites - https:\/\/tinyurl.com\/gmd577y 2016.","key":"e_1_3_2_1_8_1"},{"unstructured":"Tracemyip - Https:\/\/tinyurl.com\/hpz3yfo 2016.  Tracemyip - Https:\/\/tinyurl.com\/hpz3yfo 2016.","key":"e_1_3_2_1_9_1"},{"unstructured":"Virusshare - http:\/\/tinyurl.com\/j6vx542 2016.  Virusshare - http:\/\/tinyurl.com\/j6vx542 2016.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2857705.2857739"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2843859.2843860"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Secur.","author":"Antonakakis Manos","year":"2010","unstructured":"Manos Antonakakis , Roberto Perdisci , David Dagon , Wenke Lee , and Nick Feamster . Building a Dynamic Reputation System for DNS . USENIX Secur. , 2010 . Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, and Nick Feamster. Building a Dynamic Reputation System for DNS. USENIX Secur., 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"Konrad Rieck. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Symp. Netw. Distrib. Syst. Secur.","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp , Michael Spreitzenbarth , Hubner Malte , Hugo Gascon , Konrad Rieck , Malte Hubner , Hugo Gascon , and Konrad Rieck. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Symp. Netw. Distrib. Syst. Secur. , 2014 . Daniel Arp, Michael Spreitzenbarth, Hubner Malte, Hugo Gascon, Konrad Rieck, Malte Hubner, Hugo Gascon, and Konrad Rieck. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Symp. Netw. Distrib. Syst. Secur., 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2799979.2800003"},{"key":"e_1_3_2_1_16_1","author":"Blondel Vincent D.","year":"2008","unstructured":"Vincent D. Blondel , Jean-Loup Guillaume , Renaud Lambiotte , and Etienne Lefebvre . Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. , 2008 . Vincent D. Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp., 2008.","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"e_1_3_2_1_17_1","first-page":"27","author":"Borgatti Stephen P.","year":"2005","unstructured":"Stephen P. Borgatti . Centrality and network flow. Soc. Networks , 27 , 2005 . Stephen P. Borgatti. Centrality and network flow. Soc. Networks, 27, 2005.","journal-title":"Soc. Networks"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.diin.2015.05.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/S0169-7552(98)00110-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2875475.2875481"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Secur. Symp.","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale . In USENIX Secur. Symp. , 2015 . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. In USENIX Secur. Symp., 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc.","author":"Crussell Jonathan","year":"2012","unstructured":"Jonathan Crussell , Clint Gibler , and Hao Chen . Attack of the clones: Detecting cloned applications on android markets. In Eur. Symp. Res. Comput. Secur . Proc. 2012 . Jonathan Crussell, Clint Gibler, and Hao Chen. Attack of the clones: Detecting cloned applications on android markets. In Eur. Symp. Res. Comput. Secur. Proc. 2012."},{"key":"e_1_3_2_1_23_1","volume-title":"Hao Chen. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In Eur. Symp. Res. Comput. Secur. Egham","author":"Crussell Jonathan","year":"2013","unstructured":"Jonathan Crussell , Clint Gibler , and Hao Chen. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In Eur. Symp. Res. Comput. Secur. Egham , 2013 . Jonathan Crussell, Clint Gibler, and Hao Chen. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In Eur. Symp. Res. Comput. Secur. Egham, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2556464.2556467"},{"key":"e_1_3_2_1_25_1","volume-title":"AndroSimilar: Robust signature for detecting variants of Android malware","author":"Faruki Parvez","year":"2015","unstructured":"Parvez Faruki , Vijay Laxmi , Ammar Bharmal , M. S. Gaur , and Vijay Ganmoor . AndroSimilar: Robust signature for detecting variants of Android malware . 2015 . Parvez Faruki, Vijay Laxmi, Ammar Bharmal, M. S. Gaur, and Vijay Ganmoor. AndroSimilar: Robust signature for detecting variants of Android malware. 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2635868.2635869"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/2517312.2517315"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2307636.2307663"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/978-3-642-37300-8_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1155\/2015\/479174"},{"key":"e_1_3_2_1_31_1","first-page":"139","volume-title":"2016 11th International Conference on Malicious and Unwanted Software, MALWARE 2016","author":"Billah Karbab ElMouatez","year":"2017","unstructured":"ElMouatez Billah Karbab , Mourad Debbabi , Saed Alrabaee , and Djedjiga Mouheb . DySign : Dynamic fingerprinting for the automatic detection of android malware . 2016 11th International Conference on Malicious and Unwanted Software, MALWARE 2016 , pages 139 -- 146 , 2017 . ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, and Djedjiga Mouheb. DySign: Dynamic fingerprinting for the automatic detection of android malware. 2016 11th International Conference on Malicious and Unwanted Software, MALWARE 2016, pages 139--146, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/2991079.2991124"},{"key":"e_1_3_2_1_33_1","volume-title":"Android Malware Detection using Deep Learning on API Method Sequences","author":"Billah Karbab ElMouatez","year":"2017","unstructured":"ElMouatez Billah Karbab , Mourad Debbabi , Abdelouahid Derhab , and Djedjiga Mouheb . Android Malware Detection using Deep Learning on API Method Sequences . 2017 . ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. Android Malware Detection using Deep Learning on API Method Sequences. 2017."},{"key":"e_1_3_2_1_34_1","volume-title":"Digital Investigation","author":"Billah Karbab ElMouatez","year":"2018","unstructured":"ElMouatez Billah Karbab , Mourad Debbabi , Abdelouahid Derhab , and Djedjiga Mouheb . MalDozer : Automatic framework for android malware detection using deep learning . Digital Investigation , 2018 . ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. MalDozer: Automatic framework for android malware detection using deep learning. Digital Investigation, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1016\/j.diin.2016.04.013"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2811411.2811545"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/324133.324140"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1016\/j.cose.2013.08.010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1007\/978-3-642-41284-4_20"},{"key":"e_1_3_2_1_40_1","author":"Nidhi Grover Ritika Wason","year":"2012","unstructured":"Ritika Wason Nidhi Grover . Comparative Analysis Of Pagerank And HITS Algorithms. Int. J. Eng. Res. Technol. , 2012 . Ritika Wason Nidhi Grover. Comparative Analysis Of Pagerank And HITS Algorithms. Int. J. Eng. Res. Technol., 2012.","journal-title":"Algorithms. Int. J. Eng. Res. Technol."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/2480362.2480701"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1016\/j.eswa.2013.07.106"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/2766498.2766508"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/2666620.2666630"},{"key":"e_1_3_2_1_45_1","volume-title":"Passive DNS Replication. Technical report","author":"Weimer Florian","year":"2005","unstructured":"Florian Weimer . Passive DNS Replication. Technical report , 2005 . Florian Weimer. Passive DNS Replication. Technical report, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/2590296.2590314"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/2740070.2631434"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/2508859.2516689"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/2484313.2484359"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/2435349.2435377"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_52_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Symp. Netw. Distrib. Syst. Secur.","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Symp. Netw. Distrib. Syst. Secur. , 2012 . Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Symp. Netw. Distrib. Syst. Secur., 2012."}],"event":{"sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"acronym":"ARES 2018","name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230870","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230870"}},"subtitle":["Automatic Investigation of Android Malware Cyber-Infrastructures"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":52,"alternative-id":["10.1145\/3230833.3230870","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230870","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}