{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:07:16Z","timestamp":1775246836566,"version":"3.50.1"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030024499","type":"print"},{"value":"9783030024505","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02450-5_11","type":"book-chapter","created":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T08:54:57Z","timestamp":1539161697000},"page":"177-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["CDGDroid: Android Malware Detection Based on Deep Learning Using CFG and DFG"],"prefix":"10.1007","author":[{"given":"Zhiwu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Kerong","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Shengchao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Florin","family":"Craciun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"11_CR1","unstructured":"Report from IDC. http:\/\/www.idc.com\/promo\/smartphone-market-share\/os"},{"key":"11_CR2","unstructured":"Report from G DATA (2017). https:\/\/www.gdatasoftware.com\/blog\/2017\/04\/29712-8-400-new-android-malware-samples-every-day"},{"issue":"6","key":"11_CR3","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"Steven Arzt","year":"2014","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI 2014, pp. 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Notices"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Wei, F., Roy, S., Ou, X.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. In: CCS 2014, pp. 1329\u20131341 (2014)","DOI":"10.1145\/2660267.2660357"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/2494522","volume":"57","author":"William Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI 2014, pp. 393\u2013407 (2014)","journal-title":"Communications of the ACM"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., Mcdaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A., et al.: Android permissions demystified. In: CCS 2011, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Grace, M., et al.: Riskranker: scalable and accurate zero-day android malware detection. In: MobiSys 2012, pp. 281\u2013294 (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: EISIC 2012, pp. 141\u2013147 (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"11_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-28865-9_2","volume-title":"Security and Privacy in Communication Networks","author":"Y Li","year":"2015","unstructured":"Li, Y., Shen, T., Sun, X., Pan, X., Mao, B.: Detection, classification and characterization of android malware using API data dependency. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICST, vol. 164, pp. 23\u201340. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28865-9_2"},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10664-014-9352-6","volume":"21","author":"K Allix","year":"2016","unstructured":"Allix, K., et al.: Empirical assessment of machine learning-based malware detectors for android. Empirical Softw. Eng. 21(1), 183\u2013211 (2016)","journal-title":"Empirical Softw. Eng."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Liu, Y., Chen, L., Liu, J.: Adaptive and scalable android malware detection through online learning. In: IJCNN 2016, pp. 157\u2013175 (2016)","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Mclaughlin, N., et al.: Deep android malware detection. In: CODASPY 2017, pp. 301\u2013308 (2017)","DOI":"10.1145\/3029806.3029823"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.cose.2017.11.007","volume":"73","author":"S Chen","year":"2017","unstructured":"Chen, S., et al.: Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach. Comput. Secur. 73, 326\u2013344 (2017)","journal-title":"Comput. Secur."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Arp, D., et al.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS 2014 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"11_CR17","unstructured":"VirusTotal. https:\/\/www.virustotal.com"},{"key":"11_CR18","unstructured":"Wi$$\\acute{s}$$niewski, R., Tumbleson, C.: Apktool: a tool for reverse engineering Android APK files. https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"11_CR19","unstructured":"Dalvik Bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode"},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1007\/s10664-017-9539-8","volume":"23","author":"A Narayanan","year":"2017","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to android malware detection and malicious code localization. Empirical Softw. Eng. 23(3), 1222\u20131274 (2017)","journal-title":"Empirical Softw. Eng."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Platzer, C.: Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis. In: ComSAC 2015, pp. 422\u2013433 (2015)","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"11_CR22","unstructured":"VirusShare. https:\/\/virusshare.com\/"},{"key":"11_CR23","unstructured":"Contagiodump. http:\/\/contagiodump.blogspot.com\/"},{"key":"11_CR24","unstructured":"Mi App Store. https:\/\/dev.mi.com\/en"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Narayanan, A., et al.: Contextual Weisfeiler-Lehman graph kernel for malware detection. In: IJCNN 2016, pp. 4701\u20134708 (2016)","DOI":"10.1109\/IJCNN.2016.7727817"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Yang, W., et al.: Appcontext: differentiating malicious and benign mobile app behaviors using context. In: ICSE 2015, pp. 303\u2013313 (2015)","DOI":"10.1109\/ICSE.2015.50"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-319-11698-3_43","volume-title":"Network and System Security","author":"R Andriatsimandefitra","year":"2014","unstructured":"Andriatsimandefitra, R., Tong, V.V.T.: Capturing android malware behaviour using system flow graph. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 534\u2013541. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11698-3_43"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: CCS 2014, pp. 1105\u20131116 (2014)","DOI":"10.1145\/2660267.2660359"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, L., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: FSE 2014, pp. 576\u2013587 (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Feng, Y., et al.: Automated synthesis of semantic malware signatures using maximum satisfiability. CoRR, abs\/1608.06254 (2016)","DOI":"10.14722\/ndss.2017.23379"},{"key":"11_CR31","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive and scalable android malware detection through online learning (extended version). CoRR, abs\/1706.00947 (2017)"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: AISec 2013, pp. 45\u201354 (2013)","DOI":"10.1145\/2517312.2517315"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Du, Y., Wang, J., Li, Q.: An android malware detection approach using community structures of weighted function call graphs. IEEE Access PP(99), 1 (2017)","DOI":"10.1109\/ACCESS.2017.2720160"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Fan, M., et al.: Frequent subgraph based familial classification of android malware. In: ISSRE 2016, pp. 24\u201335 (2016)","DOI":"10.1109\/ISSRE.2016.14"},{"key":"11_CR35","unstructured":"Chen, K., et al.: Contextual policy enforcement in android applications with permission event graphs. Heredity 110(6), 586 (2013)"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Shen, T., et al.: Detect android malware variants using component based topology graph. In: TrustCom 2014, pp. 406\u2013413 (2014)","DOI":"10.1109\/TrustCom.2014.52"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-Sec: deep learning in android malware detection. In: SIGCOMM 2014, pp. 371\u2013372 (2014)","DOI":"10.1145\/2740070.2631434"},{"issue":"1","key":"11_CR38","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TST.2016.7399288","volume":"21","author":"Z Yuan","year":"2016","unstructured":"Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114\u2013123 (2016)","journal-title":"Tsinghua Sci. Technol."},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Su, X., Zhang, D., Li, W., Zhao, K.: A deep learning approach to android malware feature learning and detection. In: TrustCom 2016, pp. 244\u2013251 (2016)","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"11_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-47121-1_5","volume-title":"Web-Age Information Management","author":"S Hou","year":"2016","unstructured":"Hou, S., Saas, A., Ye, Y., Chen, L.: DroidDelver: an android malware detection system using deep belief network based on API call blocks. In: Song, S., Tong, Y. (eds.) WAIM 2016. LNCS, vol. 9998, pp. 54\u201366. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47121-1_5"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Wang, Z., Cai, J., Cheng, S., Li, W.: Droiddeeplearner: identifying android malware using deep learning. In: Sarnoff 2016, pp. 160\u2013165 (2016)","DOI":"10.1109\/SARNOF.2016.7846747"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Nix, R., Zhang, J.: Classification of android apps and malware using deep neural networks. In: IJCNN 2017, pp. 1871\u20131878 (2017)","DOI":"10.1109\/IJCNN.2017.7966078"},{"key":"11_CR43","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"E Karbab","year":"2018","unstructured":"Karbab, E., Debbabi, M., Derhab, A., Mouheb, D.: Maldozer: automatic framework for android malware detection using deep learning. Digit. Invest. 24, S48\u2013S59 (2018)","journal-title":"Digit. Invest."},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In: WIW 2017, pp. 104\u2013111 (2017)","DOI":"10.1109\/WIW.2016.040"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Nauman, M., Tanveer, T., Khan, S., Syed, T.: Deep neural architectures for large scale android malware analysis. Cluster Comput. 1\u201320 (2017)","DOI":"10.1007\/s10586-017-0944-y"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Zhu, D., et al.: Deepflow: deep learning-based malware detection by mining android application for abnormal usage of sensitive data. In: ISCC 2017, pp. 438\u2013443, July 2017","DOI":"10.1109\/ISCC.2017.8024568"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02450-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:19:24Z","timestamp":1775243964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02450-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030024499","9783030024505"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02450-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.formal-analysis.com\/icfem\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}