{"updated":"2025-01-19T16:39:33.559481+00:00","links":{},"created":"2025-01-19T01:15:10.715676+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00214358","sets":["581:10433:10445"]},"path":["10445"],"owner":"44499","recid":"214358","title":["Auto-creation of Robust Android Malware Family Trees "],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-12-15"},"_buckets":{"deposit":"13b78589-f977-4bef-9394-e49a222fd6e4"},"_deposit":{"id":"214358","pid":{"type":"depid","value":"214358","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Auto-creation of Robust Android Malware Family Trees ","author_link":["550155","550156","550159","550158","550154","550160","550157","550153"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Auto-creation of Robust Android Malware Family Trees "},{"subitem_title":"Auto-creation of Robust Android Malware Family Trees ","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文(推薦論文)] Android, malware, family tree","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2021-12-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Waseda University/Presently with NTT Security (Japan) KK"},{"subitem_text_value":"NTT/Presently with NTT Security (Japan) KK"},{"subitem_text_value":"NTT"},{"subitem_text_value":"Waseda University"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University / Presently with NTT Security (Japan) KK","subitem_text_language":"en"},{"subitem_text_value":"NTT / Presently with NTT Security (Japan) KK","subitem_text_language":"en"},{"subitem_text_value":"NTT","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/214358/files/IPSJ-JNL6212025.pdf","label":"IPSJ-JNL6212025.pdf"},"date":[{"dateType":"Available","dateValue":"2023-12-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6212025.pdf","filesize":[{"value":"3.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f99f8084-53f8-4e9a-af51-9f3456e39325","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuya, Nomura"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daiki, Chiba"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Uchida"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuya, Nomura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daiki, Chiba","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mitsuaki, Akiyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masato, Uchida","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Malware targeting Android OS has been increasing for years and Android malware cyberattacks in particular are growing in number. To provide effective countermeasures against Android malware, we need to not only detect the malware at a certain point in time but also analyze the time-series changes in the malware, given that the family of Android malware will increase in number over time. In this paper, we propose a new method for automatically creating a “family tree” of Android malware that can represent how the newly detected Android malware relates to existing Android malware and its families and how they have changed over time. Our evaluation based on two actual Android malware datasets shows that our proposed family tree can accurately represent time-series changes between malware families.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.801\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Malware targeting Android OS has been increasing for years and Android malware cyberattacks in particular are growing in number. To provide effective countermeasures against Android malware, we need to not only detect the malware at a certain point in time but also analyze the time-series changes in the malware, given that the family of Android malware will increase in number over time. In this paper, we propose a new method for automatically creating a “family tree” of Android malware that can represent how the newly detected Android malware relates to existing Android malware and its families and how they have changed over time. Our evaluation based on two actual Android malware datasets shows that our proposed family tree can accurately represent time-series changes between malware families.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.29(2021) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.29.801\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2021-12-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicVolumeNumber":"62"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":214358}