{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:46:18Z","timestamp":1774453578210,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"`the Fundamental Research Funds for the Central Universities'","award":["HUST: 2020JYCXJJ068"],"award-info":[{"award-number":["HUST: 2020JYCXJJ068"]}]},{"name":"the Key Program of National Science Foundation of China","award":["U1936211"],"award-info":[{"award-number":["U1936211"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3460319.3464833","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T22:18:43Z","timestamp":1625782723000},"page":"216-229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["HomDroid: detecting Android covert malware by social-network homophily analysis"],"prefix":"10.1145","author":[{"given":"Yueming","family":"Wu","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5338-7347","authenticated-orcid":false,"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Permission-based method. http:\/\/infosec.bjtu.edu.cn\/wangwei\/?page_id=85\/  2014. Permission-based method. http:\/\/infosec.bjtu.edu.cn\/wangwei\/?page_id=85\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2017. MaMaDroid. https:\/\/bitbucket.org\/gianluca_students\/mamadroid_code\/  2017. MaMaDroid. https:\/\/bitbucket.org\/gianluca_students\/mamadroid_code\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Cyber attacks on Android devices on the rise. https:\/\/www.gdatasoftware.com\/blog\/2018\/11\/31255-cyber-attacks-on-android-devices-on-the-rise\/  2018. Cyber attacks on Android devices on the rise. https:\/\/www.gdatasoftware.com\/blog\/2018\/11\/31255-cyber-attacks-on-android-devices-on-the-rise\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter\/  2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter\/"},{"key":"e_1_3_2_1_5_1","volume-title":"44 Must-Know Malware Statistics to Take Seriously","year":"2020","unstructured":"2020. 44 Must-Know Malware Statistics to Take Seriously in 2020 . https:\/\/https:\/\/legaljobsite.net\/malware-statistics\/ 2020. 44 Must-Know Malware Statistics to Take Seriously in 2020. https:\/\/https:\/\/legaljobsite.net\/malware-statistics\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Dissecting DEFENSOR: a stealthy Android banking malware. https:\/\/medium.com\/axdb\/%EF%B8%8F-dissecting-defensor-a-stealthy-android-banking-malware-6610b0468256.  2020. Dissecting DEFENSOR: a stealthy Android banking malware. https:\/\/medium.com\/axdb\/%EF%B8%8F-dissecting-defensor-a-stealthy-android-banking-malware-6610b0468256."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Insidious Android malware gives up all malicious features but one to gain stealth. https:\/\/www.welivesecurity.com\/2020\/05\/22\/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth\/.  2020. Insidious Android malware gives up all malicious features but one to gain stealth. https:\/\/www.welivesecurity.com\/2020\/05\/22\/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Stealthy new Android malware poses as ad blocker serves up ads instead. https:\/\/blog.malwarebytes.com\/android\/2019\/11\/stealthy-new-android-malware-poses-as-ad-blocker-serves-up-ads-instead\/.  2020. Stealthy new Android malware poses as ad blocker serves up ads instead. https:\/\/blog.malwarebytes.com\/android\/2019\/11\/stealthy-new-android-malware-poses-as-ad-blocker-serves-up-ads-instead\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. APK Protect - Provide Android APK Encryption and Protection. https:\/\/sourceforge.net\/projects\/apkprotect\/  2021. APK Protect - Provide Android APK Encryption and Protection. https:\/\/sourceforge.net\/projects\/apkprotect\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. AppCritique Mobile Application Security Testing. https:\/\/www.boozallen.com\/expertise\/products\/appcritique.html.  2021. AppCritique Mobile Application Security Testing. https:\/\/www.boozallen.com\/expertise\/products\/appcritique.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Because Sharing is Caring. https:\/\/virusshare.com\/.  2021. Because Sharing is Caring. https:\/\/virusshare.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. A Free Android App Market. http:\/\/www.appchina.com.  2021. A Free Android App Market. http:\/\/www.appchina.com."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. HomDroid. https:\/\/github.com\/CGCL-codes\/HomDroid.  2021. HomDroid. https:\/\/github.com\/CGCL-codes\/HomDroid."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. SandDroid - An automatic Android application analysis system. http:\/\/sanddroid.xjtu.edu.cn\/  2021. SandDroid - An automatic Android application analysis system. http:\/\/sanddroid.xjtu.edu.cn\/"},{"key":"e_1_3_2_1_15_1","unstructured":"2021. scikit-learn. https:\/\/scikit-learn.org\/  2021. scikit-learn. https:\/\/scikit-learn.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"2021. VirusTotal - free online virus malware and URL scanner. https:\/\/www.virustotal.com\/  2021. VirusTotal - free online virus malware and URL scanner. https:\/\/www.virustotal.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274744"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(01)00035-1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (Usenix Security\u201915)","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , Xiaofeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale . In Proceedings of the 24th USENIX Security Symposium (Usenix Security\u201915) . 659\u2013674. Kai Chen, Peng Wang, Yeonjoon Lee, Xiaofeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In Proceedings of the 24th USENIX Security Symposium (Usenix Security\u201915). 659\u2013674."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000139"},{"key":"e_1_3_2_1_28_1","unstructured":"Anthony Desnos. 2011. Androguard. https:\/\/github.com\/androguard\/androguard  Anthony Desnos. 2011. Androguard. https:\/\/github.com\/androguard\/androguard"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Homophily influences ranking of minorities in social networks","volume":"8","author":"Fariba Karimi","year":"2018","unstructured":"Karimi Fariba , G\u00e9nois Mathieu , Wagner Claudia , Singer Philipp , and Strohmaier Markus . 2018 . Homophily influences ranking of minorities in social networks . Scientific Reports , 8 , 1 (2018), 1 \u2013 12 . Karimi Fariba, G\u00e9nois Mathieu, Wagner Claudia, Singer Philipp, and Strohmaier Markus. 2018. Homophily influences ranking of minorities in social networks. Scientific Reports, 8, 1 (2018), 1\u201312.","journal-title":"Scientific Reports"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517315"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1093\/qje\/qjs021"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912)","author":"Grace Michael C.","year":"2012","unstructured":"Michael C. Grace , Yajin Zhou , Zhi Wang , and Xuxian Jiang . 2012 . Systematic detection of capability leaks in stock android smartphones . In Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912) . 1\u201315. Michael C. Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912). 1\u201315."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911805"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.010"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00024"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274731"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.06.015"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036106"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0706851105"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056919"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2745575"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.40"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134642"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180223"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912)","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou , Zhi Wang , Wu Zhou , and Xuxian Jiang . 2012 . Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets . In Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912) . 1\u201313. Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 2012 Annual Symposium on Network and Distributed System Security (NDSS\u201912). 1\u201313."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"}],"event":{"name":"ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Denmark","acronym":"ISSTA '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460319.3464833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:36Z","timestamp":1750195476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":63,"alternative-id":["10.1145\/3460319.3464833","10.1145\/3460319"],"URL":"https:\/\/doi.org\/10.1145\/3460319.3464833","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}