{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:22Z","timestamp":1773510922155,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380242","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"1715-1726","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps"],"prefix":"10.1145","author":[{"given":"Tianming","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Feng","family":"Dong","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Liu","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Tegawend\u00e9","family":"Bissyand\u00e9","sequence":"additional","affiliation":[{"name":"SnT University of Luxembourg"}]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"University of Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Xposed Framework API. https:\/\/api.xposed.info\/reference\/packages.html.  2016. Xposed Framework API. https:\/\/api.xposed.info\/reference\/packages.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Google Play Store malware targets porn ads at millions of kids. http:\/\/www.itpro.co.uk\/malware\/30294\/google-play-store-malware-targets-porn-ads-at-millions-of-kids.  2017. Google Play Store malware targets porn ads at millions of kids. http:\/\/www.itpro.co.uk\/malware\/30294\/google-play-store-malware-targets-porn-ads-at-millions-of-kids."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Malware Displaying Porn Ads Discovered in Game Apps on Google Play. https:\/\/research.checkpoint.com\/malware-displaying-porn-ads-discovered-in-game-apps-on-google-play\/.  2017. Malware Displaying Porn Ads Discovered in Game Apps on Google Play. https:\/\/research.checkpoint.com\/malware-displaying-porn-ads-discovered-in-game-apps-on-google-play\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Ad contents contain malicious coinminer scripts. http:\/\/bbs.360.cn\/thread-15338398-1-1.html.  2018. Ad contents contain malicious coinminer scripts. http:\/\/bbs.360.cn\/thread-15338398-1-1.html."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Detection Result. https:\/\/www.virustotal.com\/#\/file\/89225036f339ac101180699d85eef790e3017f1d0773d6e4a69e680a2bd27060\/detection.  2018. Detection Result. https:\/\/www.virustotal.com\/#\/file\/89225036f339ac101180699d85eef790e3017f1d0773d6e4a69e680a2bd27060\/detection."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Developer Policy Center: Monetization and Ads. https:\/\/play.google.com\/about\/monetization-ads\/.  2018. Developer Policy Center: Monetization and Ads. https:\/\/play.google.com\/about\/monetization-ads\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Open nsfw model. https:\/\/github.com\/yahoo\/open_nsfw  2018. Open nsfw model. https:\/\/github.com\/yahoo\/open_nsfw"},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Optical character recognition - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Optical_character_recognition.  2018. Optical character recognition - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Optical_character_recognition."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. The PASCAL Visual Object Classes Homepage. host.robots.ox.ac.uk\/pascal\/VOC\/.  2018. The PASCAL Visual Object Classes Homepage. host.robots.ox.ac.uk\/pascal\/VOC\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. Speeded up robust features. https:\/\/en.wikipedia.org\/wiki\/Speeded_up_robust_features.  2018. Speeded up robust features. https:\/\/en.wikipedia.org\/wiki\/Speeded_up_robust_features."},{"key":"e_1_3_2_1_11_1","unstructured":"2018. VirusTotal. https:\/\/www.virustotal.com\/.  2018. VirusTotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2018. YOLO: Real-Time Object Detection. https:\/\/pjreddie.com\/darknet\/yolo\/.  2018. YOLO: Real-Time Object Detection. https:\/\/pjreddie.com\/darknet\/yolo\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2019. Magic Candy - Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.gamoper.magiccandy.free.  2019. Magic Candy - Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.gamoper.magiccandy.free."},{"key":"e_1_3_2_1_14_1","unstructured":"AppBrain. 2018. Current number of Android apps on Google Play. https:\/\/www.appbrain.com\/stats.  AppBrain. 2018. Current number of Android apps on Google Play. https:\/\/www.appbrain.com\/stats."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_16_1","volume-title":"Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207\u2013217","author":"Chen Gong","year":"2019"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54472-4_61"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.62"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_22_1","unstructured":"Daoyoudao. 2019. Daoyoudao-Mobile Advertising. http:\/\/www.daoyoudao.com\/dsp.  Daoyoudao. 2019. Daoyoudao-Mobile Advertising. http:\/\/www.daoyoudao.com\/dsp."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134059"},{"key":"e_1_3_2_1_24_1","unstructured":"Shivang Desai. 2017. Malicious Android Ads leading to drive by downloads. https:\/\/www.zscaler.com\/blogs\/research\/malicious-android-ads-leading-drive-downloads.  Shivang Desai. 2017. Malicious Android Ads leading to drive by downloads. https:\/\/www.zscaler.com\/blogs\/research\/malicious-android-ads-leading-drive-downloads."},{"key":"e_1_3_2_1_25_1","unstructured":"Android Developers. 2017. Monkeyrunner. https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/index.html.  Android Developers. 2017. Monkeyrunner. https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/index.html."},{"key":"e_1_3_2_1_26_1","unstructured":"DIGIDAY. 2017. The state of mobile advertising. https:\/\/digiday.com\/marketing\/state-mobile-advertising\/.  DIGIDAY. 2017. The state of mobile advertising. https:\/\/digiday.com\/marketing\/state-mobile-advertising\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.23919\/MVA.2017.7986875"},{"key":"e_1_3_2_1_28_1","volume-title":"FraudDroid: Automated Ad Fraud Detection for Android Apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Dong Feng","year":"2018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177102.3177113"},{"key":"e_1_3_2_1_30_1","volume-title":"MOBILE AD FRAUD: DEFINITION, TYPES, DETECTION. https:\/\/clickky.biz\/blog\/2016\/12\/mobile-ad-fraud-definition-types-detection\/","author":"MARIA","year":"2016"},{"key":"e_1_3_2_1_31_1","unstructured":"Google. 2019. Healthcare and medicines - Advertising Policies Help. https:\/\/support.google.com\/adspolicy\/answer\/176031.  Google. 2019. Healthcare and medicines - Advertising Policies Help. https:\/\/support.google.com\/adspolicy\/answer\/176031."},{"key":"e_1_3_2_1_32_1","unstructured":"Google. 2019. Vision AI | Derive Image Insights via ML | Cloud Vision API | Google Cloud. https:\/\/cloud.google.com\/vision\/#industry-leading-accuracy-for-image-understanding.  Google. 2019. Vision AI | Derive Image Insights via ML | Cloud Vision API | Google Cloud. https:\/\/cloud.google.com\/vision\/#industry-leading-accuracy-for-image-understanding."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_34_1","unstructured":"MARSHALL HONOROF. 2017. Malicious Web Ad Infecting Android Phones. https:\/\/www.tomsguide.com\/us\/malvertising-lock-android-phones news-25255.html.  MARSHALL HONOROF. 2017. Malicious Web Ad Infecting Android Phones. https:\/\/www.tomsguide.com\/us\/malvertising-lock-android-phones news-25255.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668035"},{"key":"e_1_3_2_1_36_1","volume-title":"Dating with scambots: Understanding the ecosystem of fraudulent dating applications","author":"Hu Yangyu","year":"2019"},{"key":"e_1_3_2_1_37_1","volume-title":"Automated Testing of Android Apps: A Systematic Literature Review","author":"Kong Pingfan","year":"2018"},{"key":"e_1_3_2_1_38_1","unstructured":"Selena Larson. 2017. Spammy Ads That Hijack Your Smartphone Are Now A Virtual Plague. https:\/\/readwrite.com\/2014\/05\/15\/app-redirects-mobile-spam-ads\/.  Selena Larson. 2017. Spammy Ads That Hijack Your Smartphone Are Now A Virtual Plague. https:\/\/readwrite.com\/2014\/05\/15\/app-redirects-mobile-spam-ads\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Eric Lawrence. 2013. Understanding FiddlerScript. https:\/\/www.telerik.com\/blogs\/understanding-fiddlerscript.  Eric Lawrence. 2013. Understanding FiddlerScript. https:\/\/www.telerik.com\/blogs\/understanding-fiddlerscript."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Li Li Tegawend\u00e9\u00a0F Bissyand\u00e9 Mike Papadakis Siegfried Rasthofer Alexandre Bartel Damien Octeau Jacques Klein and Yves Le\u00a0Traon. 2017. Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology(2017).  Li Li Tegawend\u00e9\u00a0F Bissyand\u00e9 Mike Papadakis Siegfried Rasthofer Alexandre Bartel Damien Octeau Jacques Klein and Yves Le\u00a0Traon. 2017. Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology(2017).","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_43_1","unstructured":"Li Li Jun Gao M\u00e9d\u00e9ric Hurier Pingfan Kong Tegawend\u00e9\u00a0F Bissyand\u00e9 Alexandre Bartel Jacques Klein and Yves Le\u00a0Traon. 2017. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. arXiv preprint arXiv:1709.05281(2017).  Li Li Jun Gao M\u00e9d\u00e9ric Hurier Pingfan Kong Tegawend\u00e9\u00a0F Bissyand\u00e9 Alexandre Bartel Jacques Klein and Yves Le\u00a0Traon. 2017. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. arXiv preprint arXiv:1709.05281(2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.109"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.065"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"e_1_3_2_1_47_1","volume-title":"Software Engineering Companion (ICSE-C), 2017 IEEE\/ACM 39th International Conference on. IEEE, 23\u201326","author":"Li Yuanchun","year":"2017"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_49_1","volume-title":"16th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP","author":"Lin Yu-Chun","year":"2003"},{"key":"e_1_3_2_1_50_1","volume-title":"DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps.. In NSDI. 57\u201370.","author":"Liu Bin","year":"2014"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873597"},{"key":"e_1_3_2_1_52_1","volume-title":"DaPanda: Detecting Aggressive Push Notifications in Android Apps. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 66\u201378","author":"Liu Tianming","year":"2019"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866356"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_55_1","volume-title":"International journal of computers 5, 2","author":"Marcial-Basilio A","year":"2011"},{"key":"e_1_3_2_1_56_1","unstructured":"Huawei Market. 2018. Huawei Market App Developer Policy. http:\/\/developer.huawei.com\/consumer\/cn\/devservice\/develop\/mobile.  Huawei Market. 2018. Huawei Market App Developer Policy. http:\/\/developer.huawei.com\/consumer\/cn\/devservice\/develop\/mobile."},{"key":"e_1_3_2_1_57_1","unstructured":"Tencent\u00a0Myapp Market. 2018. Tencent Myapp Market App Developer Policy. http:\/\/open.qq.com\/.  Tencent\u00a0Myapp Market. 2018. Tencent Myapp Market App Developer Policy. http:\/\/open.qq.com\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2967210"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848047"},{"key":"e_1_3_2_1_60_1","unstructured":"Mondovo. 2019. The Most Searched Casino Keywords in Google | Mondovo. https:\/\/www.mondovo.com\/keywords\/casino-keywords.  Mondovo. 2019. The Most Searched Casino Keywords in Google | Mondovo. https:\/\/www.mondovo.com\/keywords\/casino-keywords."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.  Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_65_1","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767(2018).  Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767(2018)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2809727"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Sooel Son Daehyeok Kim and Vitaly Shmatikov. 2016. What Mobile Ads Know About Mobile Users.. In NDSS.  Sooel Son Daehyeok Kim and Vitaly Shmatikov. 2016. What Mobile Ads Know About Mobile Users.. In NDSS.","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516682"},{"key":"e_1_3_2_1_69_1","unstructured":"Guillermo Suarez-Tangil and Gianluca Stringhini. 2018. Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned. arXiv preprint arXiv:1801.08115(2018).  Guillermo Suarez-Tangil and Gianluca Stringhini. 2018. Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned. arXiv preprint arXiv:1801.08115(2018)."},{"key":"e_1_3_2_1_70_1","unstructured":"Telerik. 2019. Fiddler - Free Web Debugging Proxy - Telerik. https:\/\/www.telerik.com\/fiddler.  Telerik. 2019. Fiddler - Free Web Debugging Proxy - Telerik. https:\/\/www.telerik.com\/fiddler."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6011977"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_3_2_1_73_1","volume-title":"Malvertising: A Profound Threat to Mobile Advertising. https:\/\/www.blog.geoedge.com\/single-post\/2016\/05\/10\/Malvertising-A-Profound-Threat-to-Mobile-Advertising.","author":"Vuijsje Eliana","year":"2016"},{"key":"e_1_3_2_1_74_1","unstructured":"Wandoujia. 2018. Wandoujia (Ali App) Developer Policy. http:\/\/aliapp.open.uc.cn\/wiki\/?p=140.  Wandoujia. 2018. Wandoujia (Ali App) Developer Policy. http:\/\/aliapp.open.uc.cn\/wiki\/?p=140."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313611"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196412"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052712"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00031"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Chengpeng Zhang Haoyu Wang Ran Wang Yao Guo and Guoai Xu. 2018. Re-checking App Behavior against App Description in the Context of Third-party Libraries.. In SEKE. 665\u2013664.  Chengpeng Zhang Haoyu Wang Ran Wang Yao Guo and Guoai Xu. 2018. Re-checking App Behavior against App Description in the Context of Third-party Libraries.. In SEKE. 665\u2013664.","DOI":"10.18293\/SEKE2018-180"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:01Z","timestamp":1750199581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":82,"alternative-id":["10.1145\/3366423.3380242","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380242","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}