{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:27:35Z","timestamp":1742920055636,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129415"},{"type":"electronic","value":"9783030129422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_2","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"17-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Android Malware Analysis: From Technical Difficulties to Scientific Challenges"],"prefix":"10.1007","author":[{"given":"Jean-Fran\u00e7ois","family":"Lalande","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume":"127","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. Secur. Privacy Commun. Netw. 127, 86\u2013103 (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-319-04283-1_6","journal-title":"Secur. Privacy Commun. Netw."},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Abraham, A., Andriatsimandefitra, R., Brunelat, A., Lalande, J.F., Viet Triem Tong, V.: GroddDroid: a gorilla for triggering malicious behaviors. In: 2015 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, Puerto Rico, pp. 119\u2013127. IEEE Computer Society, October 2016. \n                    https:\/\/doi.org\/10.1109\/MALWARE.2015.7413692","DOI":"10.1109\/MALWARE.2015.7413692"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of Android apps for the research community. In: 13th International Workshop on Mining Software Repositories, Austin, USA, pp. 468\u2013471. ACM Press, May 2016. \n                    https:\/\/doi.org\/10.1145\/2901739.2903508","DOI":"10.1145\/2901739.2903508"},{"issue":"6","key":"2_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"Steven Arzt","year":"2014","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK, vol. 49, pp. 259\u2013269. ACM Press, June 2014. \n                    https:\/\/doi.org\/10.1145\/2666356.2594299","journal-title":"ACM SIGPLAN Notices"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Chen, K., et al.: Following devil\u2019s footprints: cross-platform analysis of potentially harmful libraries on Android and iOS. In: S&P (2016). \n                    https:\/\/doi.org\/10.1109\/SP.2016.29","DOI":"10.1109\/SP.2016.29"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Duan, Y., et al.: Things you may not know about android (un)packers: a systematic study based on whole-system emulation. In: 24th Annual Network and Distributed System Security Symposium, February 2018","DOI":"10.14722\/ndss.2018.23296"},{"key":"2_CR7","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: 9th USENIX Symposium on Operating Systems Design and Implementation, Vancouver, BC, Canada, pp. 393\u2013407. USENIX Association, October 2010"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., Mcdaniel, P.: On Lightweight Mobile Phone Application Certification. Categories and Subject Descriptors (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"2_CR9","unstructured":"Kiss, N., Lalande, J.F., Leslous, M., Viet Triem Tong, V.: Kharon dataset: android malware under a microscope. In: The LASER Workshop: Learning from Authoritative Security Experiment Results, San Jose, United States, pp. 1\u201312. USENIX Association, May 2016"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Lalande, J.F., Vi\u00eat Triem Tong, V., Leslous, M., Graux, P.: Challenges for reliable and large scale evaluation of android malware analysis. In: International Workshop on Security and High Performance Computing Systems, Orl\u00e9ans, France, pp. 1068\u20131070. IEEE Computer Society, July 2018. \n                    https:\/\/doi.org\/10.1109\/HPCS.2018.00173","DOI":"10.1109\/HPCS.2018.00173"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Leslous, M., Viet Triem Tong, V., Lalande, J.F., Genet, T.: GPFinder: tracking the invisible in android malware. In: 12th International Conference on Malicious and Unwanted Software, Fajardo, pp. 39\u201346. IEEE Conputer Society, October 2017. \n                    https:\/\/doi.org\/10.1109\/MALWARE.2017.8323955","DOI":"10.1109\/MALWARE.2017.8323955"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Li, L., Meng, G., Klein, J., Malek, S. (eds.): 1st International Workshop on Advances in Mobile App Analysis, A-Mobile@ASE 2018, Montpellier, France, 4 September 2018. ACM Press (2018). \n                    https:\/\/doi.org\/10.1145\/3243218","DOI":"10.1145\/3243218"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: 22nd Annual Network and Distributed System Security Symposium, San Diego, California, USA. The Internet Society, February 2015","DOI":"10.14722\/ndss.2015.23145"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-60876-1_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"F Wei","year":"2017","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 252\u2013276. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-60876-1_12"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Wong, M.Y., Lie, D.: IntelliDroid: a targeted input generator for the dynamic analysis of android malware. In: The Network and Distributed System Security Symposium, San Diego, USA, no. February, pp. 21\u201324. The Internet Society, February 2016. \n                    https:\/\/doi.org\/10.14722\/ndss.2016.23118","DOI":"10.14722\/ndss.2016.23118"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Yang, W., Kong, D., Xie, T., Gunter, C.A.: Malware detection in adversarial settings: exploiting feature evolutions and confusions in android apps. In: 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 4\u20138 December 2017, pp. 288\u2013302 (2017). \n                    https:\/\/doi.org\/10.1145\/3134600.3134642","DOI":"10.1145\/3134600.3134642"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy, San Jose, USA, no. 4, pp. 95\u2013109. IEEE Computer Society, May 2012. \n                    https:\/\/doi.org\/10.1109\/SP.2012.16","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:40:02Z","timestamp":1558478402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}