OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy
Leonid Glanz, Patrick Müller, Lars Baumgärtner, et al.
(2020), pp. 694-707
Open Access | Times Cited: 20

Showing 20 citing articles:

A survey of android application and malware hardening
Vikas Sihag, Manu Vardhan, Pradeep Kumar Singh
Computer Science Review (2021) Vol. 39, pp. 100365-100365
Closed Access | Times Cited: 61

Use of cryptography in malware obfuscation
Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 1, pp. 135-152
Closed Access | Times Cited: 9

Precisely Extracting Complex Variable Values from Android Apps
Marc Miltenberger, Steven Arzt
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-56
Open Access | Times Cited: 2

Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
Journal of Systems and Software (2021) Vol. 183, pp. 111092-111092
Open Access | Times Cited: 15

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6

Programming Languages and Systems

Lecture notes in computer science (2024)
Closed Access | Times Cited: 1

A Modular Soundness Theory for the Blackboard Analysis Architecture
Sven Keidel, Dominik Helm, Tobias Roth, et al.
Lecture notes in computer science (2024), pp. 361-390
Open Access | Times Cited: 1

Demystifying Hidden Sensitive Operations in Android Apps
Xiaoyu Sun, Xiao Chen, Li Li, et al.
ACM Transactions on Software Engineering and Methodology (2022) Vol. 32, Iss. 2, pp. 1-30
Open Access | Times Cited: 6

Enabling Collaborative Data Science Development with the Ballet Framework
Micah J. Smith, Jürgen Cito, Kelvin Lu, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-39
Open Access | Times Cited: 6

Toward a Secure Platform for Brain-Connected Devices—Issues and Current Solutions
Scott C. Greenhorn
IEEE Transactions on Technology and Society (2020) Vol. 1, Iss. 3, pp. 161-172
Closed Access | Times Cited: 3

FA 3
Yan Lin, Joshua Wong, Debin Gao
(2023), pp. 74-80
Open Access | Times Cited: 1

Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps
Ulf Kargén, Noah Mauthe, Nahid Shahmehri
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023)
Open Access | Times Cited: 1

Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
Mandy Knöchel, Sebastian Karius
(2024) Vol. 3, pp. 113-124
Closed Access

ValBench: Benchmarking Exact Value Analysis
Marc Miltenberger, Steven Arzt
(2024), pp. 45-51
Open Access

ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing
Martijn de Vos, Johan Pouwelse
arXiv (Cornell University) (2021)
Open Access | Times Cited: 3

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
Guosheng Xu, Siyi Li, Hao Zhou, et al.
Proceedings of the ACM Web Conference 2022 (2022), pp. 3327-3335
Closed Access | Times Cited: 2

Collect Responsibly But Deliver Arbitrarily?
Shuai Li, Zhemin Yang, Nan Hua, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 1887-1900
Closed Access | Times Cited: 2

Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification
Francisco Handrick da Costa, Ismael Medeiros, Thales Menezes, et al.
arXiv (Cornell University) (2021)
Closed Access

Page 1

Scroll to top