{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:09:35Z","timestamp":1742972975305,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050894"},{"type":"electronic","value":"9783030050900"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05090-0_21","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T13:24:32Z","timestamp":1546003472000},"page":"238-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware"],"prefix":"10.1007","author":[{"given":"Junyang","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"21_CR1","unstructured":"Global market share held by the leading smartphone operating systems in sales to end users from 1st quarter 2009 to 1st quarter 2017. https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems\/ (2017). Accessed 28 June 2017"},{"key":"21_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 86\u2013103. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"6","key":"21_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Bartel, A., Klein, J., Le Traon, Y., Monperrus, M.: Dexpler: converting android Dalvik Bytecode to Jimple for static analysis with soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, pp. 27\u201338. ACM (2012)","DOI":"10.1145\/2259051.2259056"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55\u201362. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: MAST: triage for market-scale mobile malware analysis. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"21_CR9","unstructured":"Desnos, A.: Androguard (2011). https:\/\/github.com\/androguard\/androguard"},{"key":"21_CR10","unstructured":"Desnos, A., Gueguen, G.: Android: from reversing to decompilation. In: Proceedings of Black Hat Abu Dhabi, pp. 77\u2013101 (2011)"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"21_CR12","unstructured":"Enck, W., Octeau, D., McDaniel, P.D., Chaudhuri, S.: A study of android application security. In: USENIX Security Symposium, vol. 2, p. 2 (2011)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Faruki, P., Ganmoor, V., Laxmi, V., Gaur, M.S., Bharmal, A.: AndroSimilar: robust statistical feature signature for Android malware detection. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 152\u2013159. ACM (2013)","DOI":"10.1145\/2523514.2523539"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576\u2013587. ACM (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Feng, Y., Bastani, O., Martins, R., Dillig, I., Anand, S.: Automated synthesis of semantic malware signatures using maximum satisfiability. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23379"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 45\u201354. ACM (2013)","DOI":"10.1145\/2517312.2517315"},{"issue":"4","key":"21_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Their Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Their Appl."},{"issue":"2","key":"21_CR18","first-page":"2579","volume":"9","author":"GE Hinton","year":"2008","unstructured":"Hinton, G.E.: Visualizing high-dimensional data using t-SNE. Vigiliae Christianae 9(2), 2579\u20132605 (2008)","journal-title":"Vigiliae Christianae"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: HinDroid: an intelligent android malware detection system based on structured heterogeneous information network (2017)","DOI":"10.1145\/3097983.3098026"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-35473-1_12","volume-title":"Advances in Intelligent Systems and Applications","author":"CY Huang","year":"2013","unstructured":"Huang, C.Y., Tsai, Y.T., Hsu, C.H.: Performance evaluation on permission-based detection for Android malware. In: Pan, J.S., Yang, C.N., Lin, C.C. (eds.) Advances in Intelligent Systems and Applications, vol. 2, pp. 111\u2013120. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35473-1_12"},{"key":"21_CR21","unstructured":"Lueg, C.: 8,400 new Android malware samples every day, April 2017. https:\/\/www.gdatasoftware.com\/blog\/2017\/04\/29712-8-400-new-android-malware-samples-every-day. Accessed 28 June 2017"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., McDaniel, P.: Retargeting android applications to Java Bytecode. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, p. 6. ACM (2012)","DOI":"10.1145\/2393596.2393600"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 209\u2013220. ACM (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-33018-6_30","volume-title":"International Joint Conference CISIS\u201912-ICEUTE$$^\\prime $$12-SOCO$$^\\prime $$12 Special Sessionspp","author":"B Sanz","year":"2013","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: permission usage to detect malware in android. In: Herrero, \u00c1., et al. (eds.) International Joint Conference CISIS\u201912-ICEUTE$$^\\prime $$12-SOCO$$^\\prime $$12 Special Sessionspp, pp. 289\u2013298. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33018-6_30"},{"key":"21_CR25","unstructured":"Snell, B.: Mobile threat report: what\u2019s on the horizon for 2016. Intel Security and McAfee, 1 March 2016"},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.scico.2013.11.037","volume":"92","author":"ER Wognsen","year":"2014","unstructured":"Wognsen, E.R., Karlsen, H.S., Olesen, M.C., Hansen, R.R.: Formalisation and analysis of Dalvik Bytecode. Sci. Comput. Program. 92, 25\u201355 (2014)","journal-title":"Sci. Comput. Program."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Wu, C., Zhou, Y., Patel, K., Liang, Z., Jiang, X.: AirBag: boosting smartphone resistance to malware infection. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23164"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62\u201369. IEEE (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"21_CR29","unstructured":"Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: USENIX Security Symposium, pp. 569\u2013584 (2012)"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: AppContext: differentiating malicious and Benign mobile app behaviors using context. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE), vol. 1, pp. 303\u2013313. IEEE (2015)","DOI":"10.1109\/ICSE.2015.50"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Vetting undesirable behaviors in android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 611\u2013622. ACM (2013)","DOI":"10.1145\/2508859.2516689"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, M., Sun, M., Lui, J.C.: Droid analytics: a signature based analytic system to collect, extract, analyze and associate android malware. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 163\u2013171. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.25"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05090-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:44:22Z","timestamp":1709822662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-05090-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050894","9783030050900"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05090-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adma2018.nuaa.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}