{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:49:47Z","timestamp":1726037387390},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_29","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"384-396","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Topic Model Based Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Yucai","family":"Song","sequence":"first","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Lang","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaojie","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"29_CR1","unstructured":"Lab: 2018 Android malware special report (2019)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., Zhang, X.: Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9, 1869\u20131882 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR3","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: AndroDialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M.: Leakminer: detect information leakage on android with static taint analysis. In: 2012 Third World Congress on Software Engineering (WCSE), pp. 101\u2013104. IEEE (2012)","DOI":"10.1109\/WCSE.2012.26"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Osono, F.C.C.: \u201cTrustDroid\u2122\u201d: preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking. In: 2012 7th International Conference on Malicious and Unwanted Software (MALWARE), pp. 135\u2013143. IEEE (2012)","DOI":"10.1109\/MALWARE.2012.6461017"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not. 49, 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Not."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Burket, J., Flynn, L., Klieber, W., Lim, J., Snavely, W.: Making DidFail succeed: enhancing the CERT static taint analyzer for Android app sets (2015)","DOI":"10.21236\/ADA619331"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 8, 35\u201344 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Seo, J., Kim, D., Cho, D., Shin, I., Kim, T.: FLEXDROID: enforcing in-app privilege separation in android. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23485"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Afonso, V.M., et al.: Going native: using a large-scale analysis of android apps to create a practical native-code sandboxing policy. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23384"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: DREBIN: effective and explainable detection of android malware in your pocket. In: NDSS, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-60876-1_12","volume-title":"Detection of intrusions and malware, and vulnerability assessment","author":"F Wei","year":"2017","unstructured":"Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current android malware. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 252\u2013276. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-60876-1_12"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TDSC.2014.2355839","volume":"12","author":"L Cen","year":"2015","unstructured":"Cen, L., Gates, C.S., Si, L., Li, N.: A probabilistic discriminative model for android malware detection with decompiled source code. IEEE Trans. Dependable Secur. Comput. 12, 400\u2013412 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"17478","DOI":"10.1109\/ACCESS.2017.2720160","volume":"5","author":"Y Du","year":"2017","unstructured":"Du, Y., Wang, J., Li, Q.: An android malware detection approach using community structures of weighted function call graphs. IEEE Access 5, 17478\u201317486 (2017)","journal-title":"IEEE Access"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, H., Zhang, W., Wei, F., Chen, Y.: Analysis of Android malware family characteristic based on isomorphism of sensitive API call graph. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 319\u2013327. IEEE (2017)","DOI":"10.1109\/DSC.2017.77"},{"key":"29_CR18","unstructured":"Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A Multi-view Context-aware approach to android malware detection and malicious code localization (2017). arXiv preprint: \n                    arXiv:1704.01759"},{"key":"29_CR19","unstructured":"Desnos, A., Lantz, P.: Droidbox: An android application sandbox for dynamic analysis (2011)"},{"key":"29_CR20","unstructured":"Droidmon. \n                    https:\/\/github.com\/idanr1986\/droidmon"},{"key":"29_CR21","unstructured":"Winsniewski, R.: Android\u2013apktool: a tool for reverse engineering android APK files. Technical report (2012)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Ma, Z., Wang, H., Guo, Y., Chen, X.: LibRadar: fast and accurate detection of third-party libraries in Android apps. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 653\u2013656. ACM (2016)","DOI":"10.1145\/2889160.2889178"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Derr, E.: Reliable third-party library detection in Android and its security applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 356\u2013367. ACM (2016)","DOI":"10.1145\/2976749.2978333"},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inf. Process. Manag. 24, 513\u2013523 (1988)","journal-title":"Inf. Process. Manag."},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41, 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Chen, S., Xue, M., Tang, Z., Xu, L., Zhu, H.: Stormdroid: a streaminglized machine learning-based system for detecting android malware. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 377\u2013388. ACM (2016)","DOI":"10.1145\/2897845.2897860"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794. ACM (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"29_CR28","first-page":"1871","volume":"9","author":"R-E Fan","year":"2008","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of android apps for the research community. In: 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468\u2013471. IEEE (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"29_CR30","unstructured":"Total, V.: VirusTotal-Free online virus, malware and URL scanner (2012). \n                    https:\/\/www.virustotal.com\/en"},{"key":"29_CR31","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10664-014-9352-6","volume":"21","author":"K Allix","year":"2016","unstructured":"Allix, K., Bissyand\u00e9, T.F., J\u00e9rome, Q., Klein, J., Le Traon, Y.: Empirical assessment of machine learning-based malware detectors for Android. Empir. Softw. Eng. 21, 183\u2013211 (2016)","journal-title":"Empir. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:07:30Z","timestamp":1562785650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}