A comprehensive analysis about the evasion mechanisms used by existing social bots.
We collect the source code, builders and execution traces of existing social bot.
We examine three state-of-the-art detection approaches over our collected traces.
A new detection approach with nine new features and two new correlation mechanisms.
Our approach is proved to detect existing social bots with significant results.