{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T13:30:52Z","timestamp":1776951052765,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236045","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"257-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["FraudDroid: automated ad fraud detection for Android apps"],"prefix":"10.1145","author":[{"given":"Feng","family":"Dong","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Tianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420954"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393666"},{"key":"e_1_3_2_1_5_1","unstructured":"AppBrain. 2018. Free vs. paid Android apps. https:\/\/www.appbrain.com\/stats\/ free-and-paid-android-applications  AppBrain. 2018. Free vs. paid Android apps. https:\/\/www.appbrain.com\/stats\/ free-and-paid-android-applications"},{"key":"e_1_3_2_1_6_1","unstructured":"China Communications Standards Association. 2017. Mobile Intelligent Terminal Malicious Push Information To Determine The Technical Requirements. http: \/\/www.ccsa.org.cn\/tc\/baopi.php?baopi_id=5244  China Communications Standards Association. 2017. Mobile Intelligent Terminal Malicious Push Information To Determine The Technical Requirements. http: \/\/www.ccsa.org.cn\/tc\/baopi.php?baopi_id=5244"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509549"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509552"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_1_13_1","unstructured":"RILEY CILLIAN. 2018. Google Play App: Font studio. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.rcplatform.fontphoto  RILEY CILLIAN. 2018. Google Play App: Font studio. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.rcplatform.fontphoto"},{"key":"e_1_3_2_1_14_1","unstructured":"CrazyFunnyApp. 2018. Google Play App: Ancient Tomb Run. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.CrazyRunGame1. Templeqqq  CrazyFunnyApp. 2018. Google Play App: Ancient Tomb Run. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.CrazyRunGame1. Templeqqq"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134059"},{"key":"e_1_3_2_1_17_1","unstructured":"Android Developers. 2017. The Monkey UI android testing tool. http:\/\/developer. android.com\/tools\/help\/monkey.html  Android Developers. 2017. The Monkey UI android testing tool. http:\/\/developer. android.com\/tools\/help\/monkey.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Android Developers. 2017. Profile Your Layout with Hierarchy Viewer. https: \/\/developer.android.com\/studio\/profile\/hierarchy-viewer.html  Android Developers. 2017. Profile Your Layout with Hierarchy Viewer. https: \/\/developer.android.com\/studio\/profile\/hierarchy-viewer.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Android Developers. 2017. UIautomator. https:\/\/developer.android.com\/training\/ testing\/ui-testing\/uiautomator-testing.html  Android Developers. 2017. UIautomator. https:\/\/developer.android.com\/training\/ testing\/ui-testing\/uiautomator-testing.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Developers Android","year":"2018"},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Developers Android","year":"2018"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Developers Android","year":"2018"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Developers Android","year":"2018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177102.3177113"},{"key":"e_1_3_2_1_25_1","unstructured":"DoubleClick. 2017. DoubleClick Ad Exchange Program Policies. https:\/\/support. google.com\/adxseller\/answer\/2728052?hl=en  DoubleClick. 2017. DoubleClick Ad Exchange Program Policies. https:\/\/support. google.com\/adxseller\/answer\/2728052?hl=en"},{"key":"e_1_3_2_1_26_1","unstructured":"Firebase. 2017. Banner Ads. https:\/\/firebase.google.com\/docs\/admob\/android\/ banner  Firebase. 2017. Banner Ads. https:\/\/firebase.google.com\/docs\/admob\/android\/ banner"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Freier Anne","year":"2017"},{"key":"e_1_3_2_1_28_1","volume-title":"MOBILE AD FRAUD: DEFINITION, TYPES, DETECTION. https:\/\/clickky.biz\/blog\/2016\/12\/mobile-ad-fraud-definition-types-detection\/","author":"MARIA","year":"2016"},{"key":"e_1_3_2_1_29_1","unstructured":"Google. 2017. Google AdMob &amp; AdSense policies. https:\/\/support.google.com\/ admob#topic=2745287  Google. 2017. Google AdMob &amp; AdSense policies. https:\/\/support.google.com\/ admob#topic=2745287"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_32_1","unstructured":"Robotium Developers Group. 2017. Robotium. https:\/\/github.com\/ RobotiumTech\/robotium  Robotium Developers Group. 2017. Robotium. https:\/\/github.com\/ RobotiumTech\/robotium"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_34_1","unstructured":"Heaveen. 2018. Google Play App: Thermo. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.heaven.thermo  Heaveen. 2018. Google Play App: Thermo. Retrieved March 9 2018 from https:\/\/play.google.com\/store\/apps\/details?id=com.heaven.thermo"},{"key":"e_1_3_2_1_35_1","volume-title":"Retrieved","author":"Jones Brandon","year":"2017"},{"key":"e_1_3_2_1_36_1","unstructured":"kevina. 2018. Spell Checker Oriented Word Lists. http:\/\/wordlist.aspell.net\/  kevina. 2018. Spell Checker Oriented Word Lists. http:\/\/wordlist.aspell.net\/"},{"key":"e_1_3_2_1_37_1","unstructured":"Pingfan Kong Li Li Jun Gao Kui Liu Tegawend\u00e9 Bissyand\u00e9 and Jacques Klein. 2017. Automated Testing of Android Apps: A Systematic Literature Review. (2017).  Pingfan Kong Li Li Jun Gao Kui Liu Tegawend\u00e9 Bissyand\u00e9 and Jacques Klein. 2017. Automated Testing of Android Apps: A Systematic Literature Review. (2017)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464459"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_1_40_1","unstructured":"Li Li Jun Gao M\u00e9d\u00e9ric Hurier Pingfan Kong Tegawend\u00e9 F Bissyand\u00e9 Alexandre Bartel Jacques Klein and Yves Le Traon. 2017. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. arXiv preprint arXiv:1709.05281 (2017).  Li Li Jun Gao M\u00e9d\u00e9ric Hurier Pingfan Kong Tegawend\u00e9 F Bissyand\u00e9 Alexandre Bartel Jacques Klein and Yves Le Traon. 2017. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. arXiv preprint arXiv:1709.05281 (2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.8"},{"key":"e_1_3_2_1_43_1","unstructured":"LibRadar. 2018. Detecting Third-party Libraries Used in Android Apps. https: \/\/github.com\/pkumza\/LibRadar  LibRadar. 2018. Detecting Third-party Libraries Used in Android Apps. https: \/\/github.com\/pkumza\/LibRadar"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820534"},{"key":"e_1_3_2_1_45_1","volume-title":"DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps.. In NSDI. 57\u201370.","author":"Liu Bin","year":"2014"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635896"},{"key":"e_1_3_2_1_49_1","unstructured":"Huawei Market. 2018. Huawei Market App Developer Policy. http:\/\/developer. huawei.com\/consumer\/cn\/devservice\/develop\/mobile  Huawei Market. 2018. Huawei Market App Developer Policy. http:\/\/developer. huawei.com\/consumer\/cn\/devservice\/develop\/mobile"},{"key":"e_1_3_2_1_50_1","unstructured":"Tencent Myapp Market. 2018. Tencent Myapp Market App Developer Policy. http:\/\/open.qq.com\/  Tencent Myapp Market. 2018. Tencent Myapp Market App Developer Policy. http:\/\/open.qq.com\/"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium (Security\u201912)","author":"McCoy Damon","year":"2012"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242606"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454161"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026661"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464452"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_58_1","unstructured":"Google Play. 2018. Google Play Developer Policy: Monetisation and Ads. https: \/\/play.google.com\/intl\/en-GB_ALL\/about\/monetization-ads\/ads\/ad-id\/  Google Play. 2018. Google Play Developer Policy: Monetisation and Ads. https: \/\/play.google.com\/intl\/en-GB_ALL\/about\/monetization-ads\/ads\/ad-id\/"},{"key":"e_1_3_2_1_59_1","volume-title":"Retrieved","author":"Project The Bro","year":"2018"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"e_1_3_2_1_61_1","volume-title":"Usenix Conference on Security. 211\u2013226","author":"Springborn Kevin","year":"2013"},{"key":"e_1_3_2_1_62_1","volume-title":"MoST","author":"Stevens Ryan","year":"2012"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_64_1","volume-title":"Retrieved","year":"2018"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_67_1","unstructured":"VirusTotal. 2018. Detection Result of com.scanpictrue.main. https:\/\/www. virustotal.com\/#\/file\/6dc84cb4b9ad3c47bb69797833a48d4405500394e594c582ae2ef\\ 91d66d41d86\/detection  VirusTotal. 2018. Detection Result of com.scanpictrue.main. https:\/\/www. virustotal.com\/#\/file\/6dc84cb4b9ad3c47bb69797833a48d4405500394e594c582ae2ef\\ 91d66d41d86\/detection"},{"key":"e_1_3_2_1_68_1","unstructured":"VirusTotal. 2018. Detection Result of com.zlqgame.yywd. https:\/\/www.virustotal. com\/#\/file\/7e59d0219ff4e465dcb083e12bacfbb0462c7b7a98af374e61996028bac496db\/ detection  VirusTotal. 2018. Detection Result of com.zlqgame.yywd. https:\/\/www.virustotal. com\/#\/file\/7e59d0219ff4e465dcb083e12bacfbb0462c7b7a98af374e61996028bac496db\/ detection"},{"key":"e_1_3_2_1_69_1","unstructured":"VirusTotal. 2018. VirusTotal. https:\/\/www.virustotal.com\/  VirusTotal. 2018. VirusTotal. https:\/\/www.virustotal.com\/"},{"key":"e_1_3_2_1_70_1","unstructured":"Wandoujia. 2018. Wandoujia (Ali App) Developer Policy. http:\/\/aliapp.open.uc. cn\/wiki\/?p=140  Wandoujia. 2018. Wandoujia (Ali App) Developer Policy. http:\/\/aliapp.open.uc. cn\/wiki\/?p=140"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_3_2_1_73_1","first-page":"1373","article-title":"Automated Detection and Classification of Third-Party Libraries in Large Scale Android Apps","volume":"28","author":"Wang Haoyu","year":"2017","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417621"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086677"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052712"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.23"},{"key":"e_1_3_2_1_78_1","unstructured":"Wikipedia. 2018. Histogram. https:\/\/en.wikipedia.org\/wiki\/Histogram  Wikipedia. 2018. Histogram. https:\/\/en.wikipedia.org\/wiki\/Histogram"},{"key":"e_1_3_2_1_79_1","unstructured":"Wikipedia. 2018. Perceptual hashing. https:\/\/en.wikipedia.org\/wiki\/Perceptual_ hashing  Wikipedia. 2018. Perceptual hashing. https:\/\/en.wikipedia.org\/wiki\/Perceptual_ hashing"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536881"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718540"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:26Z","timestamp":1750208246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":81,"alternative-id":["10.1145\/3236024.3236045","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236045","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}