{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T01:00:28Z","timestamp":1762390828455},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_1","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"3-21","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Mobile Botnet That Meets Up at Twitter"],"prefix":"10.1007","author":[{"given":"Yulong","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jun","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"unstructured":"Google announces over 2 billion monthly active devices on android. https:\/\/www.theverge.com\/2017\/5\/17\/15654454\/android-reaches-2-billion-monthly-active-users","key":"1_CR1"},{"doi-asserted-by":"crossref","unstructured":"Eslahi, M., Rostami, M.R., Hashim, H., Tahir, N.M., Naseri, M.V.: A data collection approach for mobile botnet analysis and detection. In: The IEEE Symposium on Wireless Technology and Applications (ISWTA), pp. 199\u2013204. IEEE, Kota Kinabalu (2014)","key":"1_CR2","DOI":"10.1109\/ISWTA.2014.6981187"},{"doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner D.: A survey of mobile malware in the wild. In: The 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM, Chicago (2011)","key":"1_CR3","DOI":"10.1145\/2046614.2046618"},{"unstructured":"Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: The Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, p. 6. USENIX, Cambridge (2005)","key":"1_CR4"},{"doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.,: A survey of botnet technology and defenses. In: The Conference for Homeland Security on Cybersecurity Applications & Technology (CATCH09), pp. 299\u2013304. IEEE, Washington (2009)","key":"1_CR5","DOI":"10.1109\/CATCH.2009.40"},{"doi-asserted-by":"crossref","unstructured":"Eslahi, M., Salleh, R., Anuar, N.B.: MoBots: a new generation of botnets on mobile devices and networks. In: IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 262\u2013266. IEEE, Kota Kinabalu (2012)","key":"1_CR6","DOI":"10.1109\/ISCAIE.2012.6482109"},{"doi-asserted-by":"crossref","unstructured":"Malatras, A., Freyssinet, E., Beslay, L.: Mobile botnets taxonomy and challenges. In: European Intelligence and Security Informatics Conference, pp. 149\u2013152. IEEE, Manchester (2015)","key":"1_CR7","DOI":"10.1109\/EISIC.2015.13"},{"doi-asserted-by":"crossref","unstructured":"Dagon, D., Gu, G., Lee, C.P., Lee, W.: A taxonomy of botnet structures. In: 23rd Annual Computer Security Applications Conference, pp. 325\u2013339. IEEE, Miami Beach (2007)","key":"1_CR8","DOI":"10.1109\/ACSAC.2007.44"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-07620-1_8","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"K Krombholz","year":"2014","unstructured":"Krombholz, K., Fr\u00fchwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E.: QR code security: a survey of attacks and challenges for usable security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 79\u201390. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_8"},{"doi-asserted-by":"crossref","unstructured":"Kieseberg, P., et al.: QR code security. In: 8th International Conference on Advances in Mobile Computing and Multimedia, pp. 430\u2013435. ACM, Paris (2010)","key":"1_CR10","DOI":"10.1145\/1971519.1971593"},{"doi-asserted-by":"crossref","unstructured":"Kharraz, A., Kirda, E., Robertson, W., Balzarotti, D., Francillon, A.: Optical delusions: a study of malicious QR codes in the wild. In: the IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 192\u2013203. IEEE, Atlanta (2014)","key":"1_CR11","DOI":"10.1109\/DSN.2014.103"},{"unstructured":"Cui, X., Fang, B., Yin, L., Liu, X., Zang, T.: Andbot: towards advanced mobile botnets. In: the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, p. 11. USENIX, Boston (2011)","key":"1_CR12"},{"key":"1_CR13","first-page":"11","volume":"5","author":"A Singh","year":"2013","unstructured":"Singh, A., Toderici, A.H., Ross, K., Stamp, M.: Social networking for botnet command and control. Int. J. Comput. Netw. Inf. Secur. 5, 11\u201317 (2013)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"Yin, T., Zhang, Y., Li, S.: DR-SNBot: a social network-based botnet with strong destroy-resistance. In: 9th IEEE International Conference on Networking. Architecture, and Storage, pp. 191\u2013199. IEEE, Tianjin (2014)","key":"1_CR14","DOI":"10.1109\/NAS.2014.37"},{"doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Conficker and beyond: a large-scale empirical study. In: the 26th Annual Computer Security Applications Conference, pp. 151\u2013160. ACM, Austin (2010)","key":"1_CR15","DOI":"10.1145\/1920261.1920285"},{"unstructured":"Conficker\u2019s estimated economic cost? $$\\$$$9.1 billion. http:\/\/www.zdnet.com\/article\/confickers-estimated-economic-cost-9-1-billion\/","key":"1_CR16"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second- generation onion router. In: the 13th Conference on USENIX Security Symposium, p. 21. USENIX, San Diego (2004)","key":"1_CR17","DOI":"10.21236\/ADA465464"},{"unstructured":"Orbot. https:\/\/www.torproject.org\/docs\/android.html.en","key":"1_CR18"},{"unstructured":"Dong, Y.: An Android botnet that meets up at Twitter. http:\/\/csus-dspace.calstate.edu\/handle\/10211.3\/198844","key":"1_CR19"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-21040-2_19","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"J Hua","year":"2011","unstructured":"Hua, J., Sakurai, K.: A SMS-based mobile botnet using flooding algorithm. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 264\u2013279. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21040-2_19"},{"doi-asserted-by":"crossref","unstructured":"Zeng, Y., Shin, K.G., Hu, X.: Design of SMS commanded-and- controlled and P2P-structured mobile botnets. In: The 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 137\u2013148. ACM, Tucson (2012)","key":"1_CR21","DOI":"10.1145\/2185448.2185467"},{"doi-asserted-by":"crossref","unstructured":"Faghani, M. R., Nguyen, U. T.: Socellbot: A new botnet design to infect smartphones via online social networking. In: 25th IEEE Canadian Conference on Electrical and Computer Engineering, pp. 1\u20135. IEEE, Montreal (2012)","key":"1_CR22","DOI":"10.1109\/CCECE.2012.6334962"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-24178-9_21","volume-title":"Information Hiding","author":"S Nagaraja","year":"2011","unstructured":"Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: a covert social network botnet. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 299\u2013313. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_21"},{"doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Lain, D., Lovisotto, G., Mancini, L.V.: Boten ELISA: A novel approach for botnet C&C in online social networks. In: IEEE Conference on Communications and Network Security, pp. 74\u201382. IEEE, Florence (2015)","key":"1_CR24","DOI":"10.1109\/CNS.2015.7346813"},{"unstructured":"Koobface: inside a crimeware network. https:\/\/www.nartv.org\/2010\/11\/12\/koobface-inside-a-crimeware-network\/","key":"1_CR25"},{"doi-asserted-by":"crossref","unstructured":"Thomas, K., Nicol, D.M.: The Koobface botnet and the rise of social malware. In: The 5th International Conference on Malicious and Unwanted Software, pp. 63\u201370. IEEE, Nancy (2010)","key":"1_CR26","DOI":"10.1109\/MALWARE.2010.5665793"},{"unstructured":"Web 2.0 Botnet Evolution Koobface Revisited. https:\/\/www.trendmicro.de\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp__web-2-0-botnet-evolution-koobface.pdf","key":"1_CR27"},{"unstructured":"Chasing Advanced Persistent Threats (APT). https:\/\/www.secureworks.com\/research\/chasing_apt","key":"1_CR28"},{"doi-asserted-by":"crossref","unstructured":"Yao, H., Shin, D.: Towards preventing QR code based attacks on android phone using security warnings. In: The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 341\u2013346. ACM, Hangzhou (2013)","key":"1_CR29","DOI":"10.1145\/2484313.2484357"},{"key":"1_CR30","first-page":"1","volume":"21","author":"RL Rivest","year":"2012","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 1\u20135 (2012)","journal-title":"Commun. ACM"},{"key":"1_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"unstructured":"Mobile twitter search. https:\/\/mobile.twitter.com\/search","key":"1_CR32"},{"unstructured":"Botnet prototype demonstration. https:\/\/youtu.be\/LkfYa4OgvYI","key":"1_CR33"},{"unstructured":"How secure is AES against brute force attacks. https:\/\/www.eetimes.com\/document.asp?doc id=1279619","key":"1_CR34"},{"unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol and structure-independent botnet detection. In: The 17th USENIX Security Symposium, pp. 1\u20135. USENIX, San Jose (2008)","key":"1_CR35"},{"doi-asserted-by":"crossref","unstructured":"Gopalan, S., Kulkarni, A., Shah, A., Dai, J., Ouyang, J., Muyan-Ozcelik, P., Sun, X.: Dont be surprised: i see your mobile app stealing your data. In: ICNC 2018-Mobile Computing & Vehicle Communications Symposium, to appear. ICNC, Hawaii (2018)","key":"1_CR36","DOI":"10.1109\/ICCNC.2018.8390242"},{"unstructured":"Filter bubble. https:\/\/www.techopedia.com\/definition\/28556\/filter-bubble","key":"1_CR37"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:02:08Z","timestamp":1573606928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}