{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T12:57:37Z","timestamp":1773838657091,"version":"3.50.1"},"reference-count":16,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NIPA-2014-H0301-14-1004"],"award-info":[{"award-number":["NIPA-2014-H0301-14-1004"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2014R1A1A1006228"],"award-info":[{"award-number":["2014R1A1A1006228"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NIPA-2014-H0301-14-1004"],"award-info":[{"award-number":["NIPA-2014-H0301-14-1004"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2014R1A1A1006228"],"award-info":[{"award-number":["2014R1A1A1006228"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NIPA-2014-H0301-14-1004"],"award-info":[{"award-number":["NIPA-2014-H0301-14-1004"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2014R1A1A1006228"],"award-info":[{"award-number":["2014R1A1A1006228"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,6,1]]},"abstract":"<jats:p> Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional underground actors; however previous studies overlooked such information as a feature in detecting and classifying malware and in attributing malware to creators. Guided by this insight, we propose a method to improve the performance of Android malware detection by incorporating the creator's information as a feature and classify malicious applications into similar groups. We developed a system that implements this method in practice. Our system enables fast detection of malware by using creator information such as serial number of certificate. Additionally, it analyzes malicious behaviors and permissions to increase detection accuracy. The system also can classify malware based on similarity scoring. Finally, we showed detection and classification performance with 98% and 90% accuracy, respectively. <\/jats:p>","DOI":"10.1155\/2015\/479174","type":"journal-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T21:05:28Z","timestamp":1433365528000},"page":"479174","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":100,"title":["Detecting and Classifying Android Malware Using Static Analysis along with Creator Information"],"prefix":"10.1177","volume":"11","author":[{"given":"Hyunjae","family":"Kang","sequence":"first","affiliation":[{"name":"Graduate School of Information Security, Korea University, Seoul 136-713, Republic of Korea"}]},{"given":"Jae-wook","family":"Jang","sequence":"additional","affiliation":[{"name":"Graduate School of Information Security, Korea University, Seoul 136-713, Republic of Korea"}]},{"given":"Aziz","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"Verisign Labs, Reston, VA 20190, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0760-8807","authenticated-orcid":false,"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"Graduate School of Information Security, Korea University, Seoul 136-713, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"B23-2015-479174","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883436"},{"key":"B4-2015-479174","first-page":"71","volume-title":"Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security","author":"Pearce P."},{"key":"B6-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"B12-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"B13-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"B3-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"B7-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"B9-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"B14-2015-479174","first-page":"737","volume-title":"Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion","author":"Jang J."},{"key":"B11-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"B5-2015-479174","first-page":"5","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Zhou Y."},{"key":"B8-2015-479174","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2013.25"},{"key":"B10-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"B17-2015-479174","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.008"},{"key":"B18-2015-479174","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"B16-2015-479174","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2012.16"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/479174","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/479174","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/479174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T01:24:36Z","timestamp":1620264276000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/479174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,1]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6,1]]}},"alternative-id":["10.1155\/2015\/479174"],"URL":"https:\/\/doi.org\/10.1155\/2015\/479174","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,1]]}}}