{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:52:28Z","timestamp":1773903148720,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447849","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"269-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Accurate Labeling of Android Apps for Reliable Malware Detection"],"prefix":"10.1145","author":[{"given":"Aleieldin","family":"Salem","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t M\u00fcnchen, Garching bei M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2019. K-9 Mail - Advanced Email for Android. http:\/\/tiny.cc\/1fbb7y  2019. K-9 Mail - Advanced Email for Android. http:\/\/tiny.cc\/1fbb7y"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66808-6_10"},{"key":"e_1_3_2_2_3_1","volume-title":"Michael Hesse and Alexander Pretschner","author":"Aleieldin Salem Jona Neumeier","year":"2019","unstructured":"Jona Neumeier Aleieldin Salem , Michael Hesse and Alexander Pretschner . 2019 . Towards Empirically Assessing Behavior Stimulation Approaches for Android Malware. In The 13th International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA) . Jona Neumeier Aleieldin Salem, Michael Hesse and Alexander Pretschner. 2019. Towards Empirically Assessing Behavior Stimulation Approaches for Android Malware. In The 13th International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_2_5_1","unstructured":"Hybrid Analysis. 2019. Free Automated Malware Analysis Service. http:\/\/tiny.cc\/okq8gz  Hybrid Analysis. 2019. Free Automated Malware Analysis Service. http:\/\/tiny.cc\/okq8gz"},{"key":"e_1_3_2_2_6_1","unstructured":"androguard. 2018. androguard: Reverse engineering Malware and goodware analysis of Android applications... and more (ninja!). https:\/\/goo.gl\/toC9dB  androguard. 2018. androguard: Reverse engineering Malware and goodware analysis of Android applications... and more (ninja!). https:\/\/goo.gl\/toC9dB"},{"key":"e_1_3_2_2_7_1","volume-title":"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS.","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp , Michael Spreitzenbarth , Malte Hubner , Hugo Gascon , and Konrad Rieck . 2014 . DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS. Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070262"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599730"},{"key":"e_1_3_2_2_10_1","unstructured":"OPSWAT Metadefender Cloud. 2019. OPSWAT Metadefender Cloud | Multiscanning Deep CDR and Sandbox API. http:\/\/tiny.cc\/7oq8gz  OPSWAT Metadefender Cloud. 2019. OPSWAT Metadefender Cloud | Multiscanning Deep CDR and Sandbox API. http:\/\/tiny.cc\/7oq8gz"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833292"},{"key":"e_1_3_2_2_12_1","volume-title":"28th USENIX Security Symposium. USENIX Association","author":"Johannes Kinder Feargus Pendlebury Roberto Jordaney","year":"2019","unstructured":"Roberto Jordaney Johannes Kinder Feargus Pendlebury , Fabio Pierazzi and Lorenzo Cavallaro . 2019 . TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time . In 28th USENIX Security Symposium. USENIX Association , Santa Clara, CA. Roberto Jordaney Johannes Kinder Feargus Pendlebury, Fabio Pierazzi and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In 28th USENIX Security Symposium. USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_8"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.57"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"e_1_3_2_2_16_1","volume-title":"The Independent IT-Security Institute","year":"2019","unstructured":"AV-Test : The Independent IT-Security Institute . 2019 . The best antivirus software for Android . http:\/\/tiny.cc\/1k66az AV-Test: The Independent IT-Security Institute. 2019. The best antivirus software for Android. http:\/\/tiny.cc\/1k66az"},{"key":"e_1_3_2_2_17_1","unstructured":"MIT App Inventor. 2019. About Us - Explore MIT App Inventor. http:\/\/tiny.cc\/byp89y  MIT App Inventor. 2019. About Us - Explore MIT App Inventor. http:\/\/tiny.cc\/byp89y"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808780"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"e_1_3_2_2_20_1","unstructured":"PC Magazin. 2008. BitDefender Free Edition. http:\/\/tiny.cc\/8vx9az  PC Magazin. 2008. BitDefender Free Edition. http:\/\/tiny.cc\/8vx9az"},{"key":"e_1_3_2_2_21_1","unstructured":"Malwr. 2019. Coming back soon! http:\/\/tiny.cc\/xmq8gz  Malwr. 2019. Coming back soon! http:\/\/tiny.cc\/xmq8gz"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_7"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_7"},{"key":"e_1_3_2_2_25_1","volume-title":"International Workshop on Information Security Applications. Springer, 231--241","author":"Mohaisen Aziz","year":"2013","unstructured":"Aziz Mohaisen , Omar Alrawi , Matt Larson , and Danny McPherson . 2013 . Towards a methodical evaluation of antivirus scans and labels . In International Workshop on Information Security Applications. Springer, 231--241 . Aziz Mohaisen, Omar Alrawi, Matt Larson, and Danny McPherson. 2013. Towards a methodical evaluation of antivirus scans and labels. In International Workshop on Information Security Applications. Springer, 231--241."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278505"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"e_1_3_2_2_28_1","article-title":"Android Malware Classification based on Mobile Security Framework","volume":"45","author":"Sachdeva Shefali","year":"2018","unstructured":"Shefali Sachdeva , Romuald Jolivot , and Worawat Choensawat . 2018 . Android Malware Classification based on Mobile Security Framework . IAENG International Journal of Computer Science , Vol. 45 , 4 (2018). Shefali Sachdeva, Romuald Jolivot, and Worawat Choensawat. 2018. Android Malware Classification based on Mobile Security Framework. IAENG International Journal of Computer Science, Vol. 45, 4 (2018).","journal-title":"IAENG International Journal of Computer Science"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243218.3243222"},{"key":"e_1_3_2_2_30_1","volume-title":"Garbage in, garbage out: how purportedly great ML models can be screwed up by bad data. Technical report","author":"Sanders Hillary","year":"2017","unstructured":"Hillary Sanders and Joshua Saxe . 2017. Garbage in, garbage out: how purportedly great ML models can be screwed up by bad data. Technical report ( 2017 ). Hillary Sanders and Joshua Saxe. 2017. Garbage in, garbage out: how purportedly great ML models can be screwed up by bad data. Technical report (2017)."},{"key":"e_1_3_2_2_31_1","unstructured":"scikit learn. 2019 a. sklearn.metrics.accuracy_score. http:\/\/tiny.cc\/x65xlz  scikit learn. 2019 a. sklearn.metrics.accuracy_score. http:\/\/tiny.cc\/x65xlz"},{"key":"e_1_3_2_2_32_1","unstructured":"scikit learn. 2019 b. sklearn.metrics.matthews_corrcoef. http:\/\/tiny.cc\/8gbb7y  scikit learn. 2019 b. sklearn.metrics.matthews_corrcoef. http:\/\/tiny.cc\/8gbb7y"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029825"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_3_2_2_35_1","unstructured":"VirusTotal. 2019. VirusTotal. http:\/\/tiny.cc\/xjbb7y  VirusTotal. 2019. VirusTotal. http:\/\/tiny.cc\/xjbb7y"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"e_1_3_2_2_37_1","volume-title":"Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252--276","author":"Wei Fengguo","year":"2017","unstructured":"Fengguo Wei , Yuping Li , Sankardas Roy , Xinming Ou , and Wu Zhou . 2017 . Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252--276 . Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 252--276."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134642"},{"key":"e_1_3_2_2_39_1","volume-title":"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Zhu Shuofei","year":"2020","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020 . Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium (USENIX Security 20) . Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium (USENIX Security 20)."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":39,"alternative-id":["10.1145\/3422337.3447849","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447849","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}