{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:07Z","timestamp":1740099187863,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030036379"},{"type":"electronic","value":"9783030036386"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_22","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T03:12:53Z","timestamp":1541041973000},"page":"352-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["UpDroid: Updated Android Malware and Its Familial Classification"],"prefix":"10.1007","author":[{"given":"Kursat","family":"Aktas","sequence":"first","affiliation":[]},{"given":"Sevil","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"22_CR1","unstructured":"blcheck: Test a mail servers against black lists, March 2018. https:\/\/github.com\/darko-poljak\/blcheck"},{"key":"22_CR2","unstructured":"Droidbox: Dynamic analysis of android apps, March 2018. https:\/\/github.com\/pjlantz\/droidbox"},{"key":"22_CR3","unstructured":"Apkpure: Android market place, March 2018. https:\/\/apkpure.com\/"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: Proceedings of the Network and Distributed System Security (NDSS) Symposium (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"22_CR5","unstructured":"Ashishb: android-malware, March 2018. https:\/\/github.com\/ashishb\/android-malware"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., et al.: Mining apps for abnormal usage of sensitive data. In: Proceedings of the 37th International Conference on Software Engineering, vol. 1, pp. 426\u2013436. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.61"},{"key":"22_CR7","unstructured":"AVTEST: Security report 2016\/2017 (2017). https:\/\/www.av-test.org\/fileadmin\/pdf\/security_report\/AV-TEST_Security_Report_2016-2017.pdf"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Aysan, A.I., Sen, S.: Do you want to install an update of this application? A rigorous analysis of updated android applications. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 181\u2013186. IEEE (2015)","DOI":"10.1109\/CSCloud.2015.97"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Chakraborty, T., Pierazzi, F., Subrahmanian, V.: EC2: ensemble clustering and classification for predicting android malware families. IEEE Trans. Dependable Secur. Comput. (1), 1 (2017)","DOI":"10.1109\/TDSC.2017.2739145"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Choudhary, S.R., Gorla, A., Orso, A.: Automated test input generation for android: are we there yet?(e). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 429\u2013440. IEEE (2015)","DOI":"10.1109\/ASE.2015.89"},{"key":"22_CR11","unstructured":"Comodo: Comodo threat research labs warns android users of tordow v2.0 outbreak, March 2018. https:\/\/blog.comodo.com\/comodo-news\/comodo-warns-android-users-of-tordow-v2-0-outbreak\/"},{"key":"22_CR12","unstructured":"Contagio: contagio, March 2016. http:\/\/contagiodump.blogspot.com.tr\/"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Dash, S.K., et al.: DroidScribe: classifying android malware based on runtime behavior. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 252\u2013261. IEEE (2016)","DOI":"10.1109\/SPW.2016.25"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Deshotels, L., Notani, V., Lakhotia, A.: DroidLegacy: automated familial classification of android malware. In: Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014, p. 3. ACM (2014)","DOI":"10.1145\/2556464.2556467"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Fan, M., et al.: Android malware familial classification and representative sample selection via frequent subgraph analysis. IEEE Trans. Inf. Forensics Secur. (2018)","DOI":"10.1109\/TIFS.2018.2806891"},{"issue":"3","key":"22_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3162625","volume":"26","author":"Joshua Garcia","year":"2018","unstructured":"Garcia, J., Hammad, M., Malek, S.: Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Trans. Softw. Eng. Methodol. (TOSEM) 26(3), 11 (2018)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., et al.: The WEKA data mining software: an update. SIGKDD Explor. 11, 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2), 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"22_CR19","unstructured":"Koodous: Online malware analysis platform, March 2018. https:\/\/koodous.com\/"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., Platzer, C.: Andrubis-1,000,000 apps later: A view on current android malware behaviors. In: 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 3\u201317. IEEE (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2015.02.007","volume":"51","author":"D Maiorca","year":"2015","unstructured":"Maiorca, D., Ariu, D., Corona, I., Aresu, M., Giacinto, G.: Stealth attacks: an extended insight into the obfuscation effects on android malware. Comput. Secur. 51, 16\u201331 (2015)","journal-title":"Comput. Secur."},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Marastoni, N., Continella, A., Quarta, D., Zanero, S., Preda, M.D.: GroupDroid: automatically grouping mobile malware by extracting code similarities. In: Proceedings of the 7th Software Security, Protection, and Reverse Engineering\/Software Security and Protection Workshop, p. 1. ACM (2017)","DOI":"10.1145\/3151137.3151138"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Ping, M., Alsulami, B., Mancoridis, S.: On the effectiveness of application characteristics in the automatic classification of malware on smartphones. In: 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/MALWARE.2016.7888732"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Poeplau, S., Fratantonio, Y., Bianchi, A., Kruegel, C., Vigna, G.: Execute this! Analyzing unsafe and malicious dynamic code loading in android applications. In: NDSS, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23328"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Qu, Z., Alam, S., Chen, Y., Zhou, X., Hong, W., Riley, R.: DyDroid: measuring dynamic code loading and its security implications in android applications. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 415\u2013426. IEEE (2017)","DOI":"10.1109\/DSN.2017.14"},{"key":"22_CR26","unstructured":"Spreitzenbarth: Current android malware, March 2018. https:\/\/forensics.spreitzenbarth.de\/android-malware\/"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Suarez-Tangil, G., Dash, S.K., Ahmadi, M., Kinder, J., Giacinto, G., Cavallaro, L.: DroidSieve: fast and accurate classification of obfuscated android malware. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 309\u2013320. ACM (2017)","DOI":"10.1145\/3029806.3029825"},{"issue":"4","key":"22_CR28","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.eswa.2013.07.106","volume":"41","author":"G Suarez-Tangil","year":"2014","unstructured":"Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Blasco, J.: DenDroid: a text mining approach to analyzing and classifying code structures in android malware families. Expert. Syst. Appl. 41(4), 1104\u20131117 (2014)","journal-title":"Expert. Syst. Appl."},{"key":"22_CR29","unstructured":"Symantec: Internet security threat report, April 2016. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf"},{"key":"22_CR30","unstructured":"Symantec: Internet security threat report, vol. 22, April 2017. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-22-2017-en.pdf"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"22_CR32","unstructured":"VirusTotal: Virustotal, March 2018. https:\/\/www.virustotal.com"},{"key":"22_CR33","unstructured":"Website, A.: Android malware behaviors, March 2018. http:\/\/amd.arguslab.org\/behaviors"},{"key":"22_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-60876-1_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"F Wei","year":"2017","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 252\u2013276. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_12"},{"key":"22_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1105\u20131116. ACM (2014)","DOI":"10.1145\/2660267.2660359"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP) pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T06:17:12Z","timestamp":1572416232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}