{"id":"https://openalex.org/W4298375974","doi":"https://doi.org/10.1109/icict55905.2022.00024","title":"Vulnerability Assessment and Attack Simulation on a Rooted Android Device","display_name":"Vulnerability Assessment and Attack Simulation on a Rooted Android Device","publication_year":2022,"publication_date":"2022-03-01","ids":{"openalex":"https://openalex.org/W4298375974","doi":"https://doi.org/10.1109/icict55905.2022.00024"},"language":"en","primary_location":{"id":"doi:10.1109/icict55905.2022.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icict55905.2022.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074357452","display_name":"Bryan Juville C. Ecarma","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Bryan Juville C. Ecarma","raw_affiliation_strings":["School of Information Technology, Mapua University,Philippines","School of Information Technology, Mapua University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University,Philippines","institution_ids":["https://openalex.org/I137967721"]},{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089530091","display_name":"Justine Paul S. Luyon","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Justine Paul S. Luyon","raw_affiliation_strings":["School of Information Technology, Mapua University,Philippines","School of Information Technology, Mapua University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University,Philippines","institution_ids":["https://openalex.org/I137967721"]},{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012535272","display_name":"Ma. Michelle A. Pantoja","orcid":"https://orcid.org/0000-0002-1225-4863"},"institutions":[{"id":"https://openalex.org/I103911934","display_name":"University of the Philippines System","ror":"https://ror.org/02hqkr514","country_code":"PH","type":"education","lineage":["https://openalex.org/I103911934"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Ma. Michelle A. Pantoja","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Philippines","a University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Philippines","institution_ids":[]},{"raw_affiliation_string":"a University, Philippines","institution_ids":["https://openalex.org/I103911934"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084658748","display_name":"Kent Dominic A. Quiros","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Kent Dominic A. Quiros","raw_affiliation_strings":["School of Information Technology, Mapua University,Philippines","School of Information Technology, Mapua University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University,Philippines","institution_ids":["https://openalex.org/I137967721"]},{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006271724","display_name":"Joacquin Carlo R. Sobrepe\u00f1a","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Joacquin Carlo R. Sobrepena","raw_affiliation_strings":["School of Information Technology, Mapua University,Philippines","School of Information Technology, Mapua University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University,Philippines","institution_ids":["https://openalex.org/I137967721"]},{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027459129","display_name":"Eric Blancaflor","orcid":"https://orcid.org/0000-0002-7189-3040"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Eric B. Blancaflor","raw_affiliation_strings":["School of Information Technology, Mapua University,Philippines","School of Information Technology, Mapua University, Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University,Philippines","institution_ids":["https://openalex.org/I137967721"]},{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074357452"],"corresponding_institution_ids":["https://openalex.org/I137967721"],"apc_list":null,"apc_paid":null,"fwci":0.2972,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5108714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9537000060081482,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8568634986877441},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.6838340759277344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6651232242584229},{"id":"https://openalex.org/keywords/upgrade","display_name":"Upgrade","score":0.6646506190299988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6496710777282715},{"id":"https://openalex.org/keywords/android-beam","display_name":"Android Beam","score":0.6468650698661804},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.6151618957519531},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5693939328193665},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5293805003166199},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.43849730491638184},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40426188707351685},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.343265175819397}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8568634986877441},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.6838340759277344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6651232242584229},{"id":"https://openalex.org/C2780615140","wikidata":"https://www.wikidata.org/wiki/Q920419","display_name":"Upgrade","level":2,"score":0.6646506190299988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6496710777282715},{"id":"https://openalex.org/C65902250","wikidata":"https://www.wikidata.org/wiki/Q4759452","display_name":"Android Beam","level":3,"score":0.6468650698661804},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.6151618957519531},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5693939328193665},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5293805003166199},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.43849730491638184},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40426188707351685},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.343265175819397},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icict55905.2022.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icict55905.2022.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2597473562","https://openalex.org/W2951530623","https://openalex.org/W3001765853","https://openalex.org/W3203945239"],"related_works":["https://openalex.org/W1994712384","https://openalex.org/W4240186231","https://openalex.org/W2885309848","https://openalex.org/W2166844173","https://openalex.org/W3170525725","https://openalex.org/W3089468277","https://openalex.org/W4310805820","https://openalex.org/W2119580333","https://openalex.org/W3200236636","https://openalex.org/W1838401043"],"abstract_inverted_index":{"A":[0],"rooted":[1,55,80],"android":[2,56,81,99],"device":[3,103],"is":[4],"a":[5,54,79],"means":[6],"of":[7,53,64,78],"unlocking":[8],"the":[9,24,28,31,40,51,61,71,74,84,98,102,106,113,120,123,130,146],"operating":[10,25,48],"system,":[11,26],"which":[12,91],"allows":[13],"any":[14],"user":[15],"to":[16,70,128,134],"install":[17],"unapproved":[18],"programs,":[19],"remove":[20],"unwanted":[21],"bloatware,":[22],"upgrade":[23],"replace":[27],"firmware,":[29],"overclock":[30],"processor,":[32],"modify":[33],"anything,":[34],"and":[35,66,89,116,136],"more.":[36],"In":[37],"this":[38],"study,":[39],"researchers":[41],"used":[42],"Android":[43,107],"7":[44],"Nougat":[45,109],"as":[46],"an":[47],"system":[49],"seeking":[50],"security":[52,63,132],"device.":[57,121,147],"To":[58],"test":[59],"out":[60],"overall":[62],"rootkits":[65],"advantages":[67],"they":[68],"claim":[69],"phone":[72,82],"itself,":[73],"group":[75],"conducted":[76],"penetration":[77],"using":[83],"infected":[85],"application,":[86],"msfvenom,":[87],"meterpreter,":[88],"metasploit,":[90],"resulted":[92],"in":[93],"successfully":[94],"compromising":[95],"or":[96],"attacking":[97],"phone.":[100],"Despite":[101],"being":[104],"rooted,":[105],"7.0":[108],"could":[110,140],"not":[111,118,141],"recognize":[112],"malicious":[114,143],"files":[115,144],"did":[117],"protect":[119],"Though":[122],"rooting":[124],"process":[125],"was":[126],"expected":[127],"boost":[129],"device&#x0027;s":[131],"due":[133],"superusers":[135],"administrative":[137],"permissions,":[138],"it":[139],"prevent":[142],"into":[145]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
