{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:13:23Z","timestamp":1763968403549,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["61822205, 61902211, 61632020, 61632013"],"award-info":[{"award-number":["61822205, 61902211, 61632020, 61632013"]}]},{"name":"National Key R&D Program of China","award":["2018YFB1004700"],"award-info":[{"award-number":["2018YFB1004700"]}]},{"name":"Beijing National Research Center for Information Science and Technology (BNRist)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387530","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Experiences of landing machine learning onto market-scale mobile malware detection"],"prefix":"10.1145","author":[{"given":"Liangyi","family":"Gong","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Feng","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Zifan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Hao","family":"Lin","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074845"},{"key":"e_1_3_2_1_3_1","volume-title":"Porfirio Tramontana, Bryan Dzung Ta, and Atif M Memon.","author":"Amalfitano Domenico","year":"2014","unstructured":"Domenico Amalfitano , Anna Rita Fasolino , Porfirio Tramontana, Bryan Dzung Ta, and Atif M Memon. 2014 . MobiGUITAR: Automated Model-based Testing of Mobile Apps. IEEE Software 32 (2014). Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Bryan Dzung Ta, and Atif M Memon. 2014. MobiGUITAR: Automated Model-based Testing of Mobile Apps. IEEE Software 32 (2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"Android.com. 2008. UI\/Application Exerciser Monkey in Android Studio. https:\/\/developer.android.com\/studio\/test\/monkey.html.  Android.com. 2008. UI\/Application Exerciser Monkey in Android Studio. https:\/\/developer.android.com\/studio\/test\/monkey.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Android.com. 2020. Android Emulator. https:\/\/developer.android.com\/studio\/run\/emulator.  Android.com. 2020. Android Emulator. https:\/\/developer.android.com\/studio\/run\/emulator."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of ACM PLDI.","author":"Rasthofer Steven","year":"2014","unstructured":"Arzt, Steven and Rasthofer , Siegfried and Fritz , Christian and Bodden , Eric and Bartel , Alexandre and Klein , Jacques and Le Traon , Yves and Octeau , Damien and McDaniel , Patrick. 2014 . Flowdroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps . In Proc. of ACM PLDI. Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick. 2014. Flowdroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proc. of ACM PLDI."},{"key":"e_1_3_2_1_8_1","first-page":"582","article-title":"Classification and Regression Trees","volume":"40","author":"Breiman Leo","year":"1984","unstructured":"Leo Breiman , Jerome H. Friedman , Richard. Olshen, and Charles J. Stone . 1984 . Classification and Regression Trees . Encyclopedia of Ecology 40 , 3 (1984), 582 -- 588 . Leo Breiman, Jerome H. Friedman, Richard. Olshen, and Charles J. Stone. 1984. Classification and Regression Trees. Encyclopedia of Ecology 40, 3 (1984), 582--588.","journal-title":"Encyclopedia of Ecology"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"volume-title":"Proc. of USENIX Security.","author":"Chen Qi Alfred","key":"e_1_3_2_1_10_1","unstructured":"Qi Alfred Chen , Zhiyun Qian , and Z. Morley Mao . 2014. Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks . In Proc. of USENIX Security. Qi Alfred Chen, Zhiyun Qian, and Z. Morley Mao. 2014. Peeking into Your App without Actually Seeing it: UI State Inference and Novel Android Attacks. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326083"},{"key":"e_1_3_2_1_12_1","unstructured":"ErikDerr. 2017. axplorer. https:\/\/github.com\/reddr\/axplorer.  ErikDerr. 2017. axplorer. https:\/\/github.com\/reddr\/axplorer."},{"key":"e_1_3_2_1_13_1","unstructured":"dlgroupuoft. 2018. PScout. https:\/\/github.com\/dlgroupuoft\/PScout.  dlgroupuoft. 2018. PScout. https:\/\/github.com\/dlgroupuoft\/PScout."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of USENIX Security.","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J Wang , Alexander Moshchuk , Steve Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses . In Proc. of USENIX Security. Adrienne Porter Felt, Helen J Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606553"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_21_1","unstructured":"Google Group. 2009. Android-x86 - Porting Android to x86. http:\/\/www.android-x86.org\/.  Google Group. 2009. Android-x86 - Porting Android to x86. http:\/\/www.android-x86.org\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Chih-Wei Huang. 2016. Intel Houdini. https:\/\/osdn.net\/projects\/android-x86\/scm\/git\/vendor-intel-houdini\/.  Chih-Wei Huang. 2016. Intel Houdini. https:\/\/osdn.net\/projects\/android-x86\/scm\/git\/vendor-intel-houdini\/."},{"key":"e_1_3_2_1_23_1","unstructured":"INRIA. 2010. Scikit-learn. http:\/\/scikit-learn.org\/stable\/index.html.  INRIA. 2010. Scikit-learn. http:\/\/scikit-learn.org\/stable\/index.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Jason Brownlee. 2016. Data Leakage in Machine Learning. https:\/\/machinelearningmastery.com\/data-leakage-machine-learning\/.  Jason Brownlee. 2016. Data Leakage in Machine Learning. https:\/\/machinelearningmastery.com\/data-leakage-machine-learning\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of IEEE S&P.","author":"Jiang Xuxian","year":"2012","unstructured":"Xuxian Jiang and Yajin Zhou . 2012 . Dissecting Android Malware: Characterization and Evolution . In Proc. of IEEE S&P. Xuxian Jiang and Yajin Zhou. 2012. Dissecting Android Malware: Characterization and Evolution. In Proc. of IEEE S&P."},{"key":"e_1_3_2_1_26_1","unstructured":"O. Jon and M. Charlie. 2012. Dissecting the Android Bouncer. https:\/\/jon.oberheide.org\/files\/summercon12-bouncer.pdf.  O. Jon and M. Charlie. 2012. Dissecting the Android Bouncer. https:\/\/jon.oberheide.org\/files\/summercon12-bouncer.pdf."},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"QDroid: Mobile Application Quality Analyzer for App Market Curators","volume":"2016","author":"Lee Jemin","year":"2016","unstructured":"Jemin Lee and Hyungshin Kim . 2016 . QDroid: Mobile Application Quality Analyzer for App Market Curators . Mobile Information Systems 2016 , 1 (2016), 1 -- 11 . Jemin Lee and Hyungshin Kim. 2016. QDroid: Mobile Application Quality Analyzer for App Market Curators. Mobile Information Systems 2016, 1 (2016), 1--11.","journal-title":"Mobile Information Systems"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2010.99"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_30_1","unstructured":"John H. McDonald. 2019. Spearman Rank Correlation. http:\/\/www.biostathandbook.com\/spearman.html.  John H. McDonald. 2019. Spearman Rank Correlation. http:\/\/www.biostathandbook.com\/spearman.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_32_1","unstructured":"Rovo89. 2016. XposedBridge. https:\/\/github.com\/rovo89\/XposedBridge\/wiki\/Development-tutorial.  Rovo89. 2016. XposedBridge. https:\/\/github.com\/rovo89\/XposedBridge\/wiki\/Development-tutorial."},{"key":"e_1_3_2_1_33_1","article-title":"Android Malware Detection & Protection: A Survey","volume":"7","author":"Saba Arshad","year":"2016","unstructured":"Arshad Saba , Ali Shah Munam , Khan Abid , and Ahmed Mansoor . 2016 . Android Malware Detection & Protection: A Survey . International Journal of Advanced Computer Science and Applications 7 , 2 (2016). Arshad Saba, Ali Shah Munam, Khan Abid, and Ahmed Mansoor. 2016. Android Malware Detection & Protection: A Survey. International Journal of Advanced Computer Science and Applications 7, 2 (2016).","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_34_1","volume-title":"MTSA-A Matlab Program to Fit Thermal Shift Data. Analytical biochemistry 433, 1","author":"Landstr\u00f6m Mich\u00e8le","year":"2013","unstructured":"Schulz, Mich\u00e8le N and Landstr\u00f6m , Jens and Hubbard , Roderick E. 2013. MTSA-A Matlab Program to Fit Thermal Shift Data. Analytical biochemistry 433, 1 ( 2013 ), 43--47. Schulz, Mich\u00e8le N and Landstr\u00f6m, Jens and Hubbard, Roderick E. 2013. MTSA-A Matlab Program to Fit Thermal Shift Data. Analytical biochemistry 433, 1 (2013), 43--47."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_13"},{"key":"e_1_3_2_1_36_1","article-title":"A Framework for the Inference of Sensing Measurements based on Correlation","volume":"15","author":"Silvestri Simone","year":"2018","unstructured":"Simone Silvestri , Rahul Urgaonkar , Murtaza Zafer , and Bong Jun Ko . 2018 . A Framework for the Inference of Sensing Measurements based on Correlation . ACM Transactions on Sensor Networks 15 , 1 (2018). Simone Silvestri, Rahul Urgaonkar, Murtaza Zafer, and Bong Jun Ko. 2018. A Framework for the Inference of Sensing Measurements based on Correlation. ACM Transactions on Sensor Networks 15, 1 (2018).","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664245"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_39_1","volume-title":"Lyu","author":"Tao Guanhong","year":"2018","unstructured":"Guanhong Tao , Zibin Zheng , Ziying Guo , and Michael R . Lyu . 2018 . MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs. IEEE Transactions on Reliability 67 (2018). Guanhong Tao, Zibin Zheng, Ziying Guo, and Michael R. Lyu. 2018. MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs. IEEE Transactions on Reliability 67 (2018)."},{"key":"e_1_3_2_1_40_1","volume-title":"An Analogous Wood Barrel Theory to Explain the Occurrence of Hormesis: A Case Study of Sulfonamides and Erythromycin on Escherichia Coli Growth. PloS One 12, 7","author":"Wang Dali","year":"2017","unstructured":"Dali Wang , Zhifen Lin , Ting Wang , Xiruo Ding , and Ying Liu . 2017. An Analogous Wood Barrel Theory to Explain the Occurrence of Hormesis: A Case Study of Sulfonamides and Erythromycin on Escherichia Coli Growth. PloS One 12, 7 ( 2017 ). Dali Wang, Zhifen Lin, Ting Wang, Xiruo Ding, and Ying Liu. 2017. An Analogous Wood Barrel Theory to Explain the Occurrence of Hormesis: A Case Study of Sulfonamides and Erythromycin on Escherichia Coli Growth. PloS One 12, 7 (2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"volume-title":"Proc. of NDSS.","author":"Wong M.","key":"e_1_3_2_1_42_1","unstructured":"M. Wong and D. Lie . 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware . In Proc. of NDSS. M. Wong and D. Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In Proc. of NDSS."},{"volume-title":"Proc. of IEEE Asia JCIS.","author":"Wu D.","key":"e_1_3_2_1_43_1","unstructured":"D. Wu , C. Mao , T. Wei , H. Lee , and K. Wu . 2012. Droidmat: Android Malware Detection through Manifest and API Calls Tracing . In Proc. of IEEE Asia JCIS. D. Wu, C. Mao, T. Wei, H. Lee, and K. Wu. 2012. Droidmat: Android Malware Detection through Manifest and API Calls Tracing. In Proc. of IEEE Asia JCIS."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663761.2664223"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"key":"e_1_3_2_1_46_1","volume-title":"Detection of Malicious Behavior in Android Apps through API Calls and Permission Uses Analysis. Concurrency and Computation: Practice and Experience 29, 19","author":"Yang Ming","year":"2017","unstructured":"Ming Yang , Shan Wang , Zhen Ling , Yaowen Liu , and Zhenyu Ni. 2017. Detection of Malicious Behavior in Android Apps through API Calls and Permission Uses Analysis. Concurrency and Computation: Practice and Experience 29, 19 ( 2017 ). Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, and Zhenyu Ni. 2017. Detection of Malicious Behavior in Android Apps through API Calls and Permission Uses Analysis. Concurrency and Computation: Practice and Experience 29, 19 (2017)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300122"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of NDSS.","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . 2012 . Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets . In Proc. of NDSS. Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proc. of NDSS."}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Heraklion Greece","acronym":"EuroSys '20"},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387530","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:26Z","timestamp":1750207406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":50,"alternative-id":["10.1145\/3342195.3387530","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387530","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}