{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:41Z","timestamp":1726003961600},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_16","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T17:03:08Z","timestamp":1546016588000},"page":"281-293","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Chao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jianan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Song","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Chen, K., Wang, X., Chen, Y., et al.: Following devil\u2019s footprints: cross-platform analysis of potentially harmful libraries on android and iOS. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 357\u2013376. IEEE (2016)","DOI":"10.1109\/SP.2016.29"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/TIFS.2017.2787905","volume":"13","author":"J Chen","year":"2017","unstructured":"Chen, J., Wang, C., Zhao, Z., Chen, K., et al.: Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 13, 1286\u20131300 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyand\u00e9, T.F., Octeau, D., et al.: DroidRa: taming reflection to support whole-program analysis of android apps. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 318\u2013329. ACM (2016)","DOI":"10.1145\/2931037.2931044"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 329\u2013334. ACM (2013)","DOI":"10.1145\/2484313.2484355"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: DroidDetector: android malware characterization and detection using deep learning. J. Tsinghua Univ. (Sci. Technol.) 21(1), 114\u2013123 (2016)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"issue":"8","key":"16_CR6","first-page":"1","volume":"11","author":"X Ping","year":"2014","unstructured":"Ping, X., Xiaofeng, W., Wenjia, N., et al.: Android malware detection with contrasting permission patterns. China Commun. 11(8), 1\u201314 (2014)","journal-title":"China Commun."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Li, M., Liu, Y., Yu, M., et al.: FEPDF: a robust feature extractor for malicious PDF detection. In: Trustcom\/bigdatase\/icess. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.240"},{"key":"16_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-319-78813-5_22","volume-title":"Security and Privacy in Communication Networks","author":"J Jiang","year":"2018","unstructured":"Jiang, J., et al.: A deep learning based online malicious URL and DNS detection scheme. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 238, pp. 438\u2013448. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78813-5_22"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Barros, P., Just, R., Millstein, S., Vines, P., Dietl, W., Ernst, M.D.: Static analysis of implicit control flow: resolving Java reflection and android intents. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE, Lincoln, Nebraska (2015)","DOI":"10.1109\/ASE.2015.69"},{"issue":"4","key":"16_CR10","first-page":"27","volume":"2","author":"H Haohua","year":"2017","unstructured":"Haohua, H., Zhanqi, C., Minxue, P., et al.: Automatic detection of malicious Android applications based on static and dynamic combination. J. Inf. Secur. 2(4), 27\u201340 (2017)","journal-title":"J. Inf. Secur."},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TIFS.2016.2639339","volume":"12","author":"L Yu","year":"2017","unstructured":"Yu, L., Zhang, T., Luo, X., et al.: Toward automatically generating privacy policy for Android apps. IEEE Trans. Inf. Forensics Secur. 12(4), 865\u2013880 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., et al.: PScout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228. ACM (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Kazdagli, M., Huang, L., Reddi, V., et al.: Morpheus: benchmarking computational diversity in mobile malware. In: Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, p. 3. ACM (2014)","DOI":"10.1145\/2611765.2611767"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., et al.: ANDRUBIS\u20131,000,000 apps later: a view on current Android malware behaviors. In: 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 3\u201317. IEEE (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyand\u00e9, T.F., Octeau, D., et al.: Reflection-aware static analysis of android apps. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 756\u2013761. ACM (2016)","DOI":"10.1145\/2970276.2970277"},{"key":"16_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-319-24177-7_15","volume-title":"Computer Security\u2013ESORICS 2015","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Luo, X., Yin, H.: DexHunter: toward extracting hidden code from packed android applications. In: Pernul, G., Y A Ryan, P., Weippl, E. (eds.) Computer Security\u2013ESORICS 2015. LNCS, vol. 9327, pp. 293\u2013311. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_15"},{"issue":"6","key":"16_CR17","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. ACM Sigplan Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM Sigplan Not."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., et al.: DREBIN: effective and explainable detection of Android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"16_CR19","unstructured":"Virus Share [EB\/OL]. https:\/\/virusshare.com\/ . Accessed 12 Nov 2017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:16:35Z","timestamp":1573625795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}