{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:47:20Z","timestamp":1761709640848,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030306182"},{"type":"electronic","value":"9783030306199"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30619-9_6","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T06:51:47Z","timestamp":1568184707000},"page":"63-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9116-2694","authenticated-orcid":false,"given":"Cong","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Pengbin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"6_CR1","unstructured":"Androguard - Reverse engineering, malware and goodware analysis of android applications. \nhttps:\/\/github.com\/androguard"},{"key":"6_CR2","unstructured":"Android platform APIs. \nhttps:\/\/developer.android.com\/reference\/packages"},{"key":"6_CR3","unstructured":"Androwarn - Yet another static code analyzer for malicious android applications. \nhttps:\/\/github.com\/maaaaz\/androwarn"},{"key":"6_CR4","unstructured":"Apktool. \nhttps:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"6_CR5","unstructured":"Common vulnerabilities and exposures (CVEs). \nhttps:\/\/cve.mitre.org"},{"key":"6_CR6","unstructured":"Exploit database. \nhttps:\/\/www.exploit-db.com\/"},{"key":"6_CR7","unstructured":"VirusShare. \nhttps:\/\/virusshare.com\/"},{"key":"6_CR8","unstructured":"WALA-T. J. Watson libraries for analysis. \nhttp:\/\/wala.sourceforge.net"},{"key":"6_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"6_CR10","first-page":"37","volume":"6","author":"DW Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D.F., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6, 37\u201366 (1991)","journal-title":"Mach. Learn."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: AndroZoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories MSR 2016, pp. 468\u2013471 (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of android malware in your pocket. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: ACM SIGPLAN Conference on Programming Language Design and Implementation PLDI 2014, pp. 259\u2013269 (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., et al.: Mining apps for abnormal usage of sensitive data. In: 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015, pp. 426\u2013436 (2015)","DOI":"10.1109\/ICSE.2015.61"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: SPSM 2011, Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2011, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"issue":"6","key":"6_CR16","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/TIFS.2018.2879302","volume":"14","author":"H Cai","year":"2019","unstructured":"Cai, H., Meng, N., Ryder, B.G., Yao, D.: DroidCat: effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics Secur. 14(6), 1455\u20131470 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Cao, Y., et al.: EdgeMiner: automatically detecting implicit control flow transitions through the android framework. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015 (2015)","DOI":"10.14722\/ndss.2015.23140"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Chen, W., Aspinall, D., Gordon, A.D., Sutton, C.A., Muttik, I.: More semantics more robust: improving android malware classifiers. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks WISEC 2016, pp. 147\u2013158 (2016)","DOI":"10.1145\/2939918.2939931"},{"issue":"3","key":"6_CR19","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Dash, S.K., et al.: DroidScribe: classifying android malware based on runtime behavior. In: 2016 IEEE Security and Privacy Workshops, SP Workshops 2016, pp. 252\u2013261 (2016)","DOI":"10.1109\/SPW.2016.25"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Dimjasevic, M., Atzeni, S., Ugrina, I., Rakamaric, Z.: Evaluation of android malware detection based on system calls. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, pp. 1\u20138 (2016)","DOI":"10.1145\/2875475.2875487"},{"key":"6_CR22","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: 9th USENIX Symposium on Operating Systems Design and Implementation OSDI 2010, pp. 393\u2013407 (2010)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"30996","DOI":"10.1109\/ACCESS.2018.2844349","volume":"6","author":"P Feng","year":"2018","unstructured":"Feng, P., Ma, J., Sun, C., Xu, X., Ma, Y.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6, 30996\u201331011 (2018)","journal-title":"IEEE Access"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: HinDroid: an intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1507\u20131515 (2017)","DOI":"10.1145\/3097983.3098026"},{"key":"6_CR25","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in bayesian classifiers. In: UAI 1995: Proceedings of the Eleventh Annual Conference on Uncertainty in Artificial Intelligence, pp. 338\u2013345 (1995)"},{"key":"6_CR26","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-28865-9_2","volume-title":"Security and Privacy in Communication Networks","author":"Y Li","year":"2015","unstructured":"Li, Y., Shen, T., Sun, X., Pan, X., Mao, B.: Detection, classification and characterization of android malware using API data dependency. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICST, vol. 164, pp. 23\u201340. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-28865-9_2"},{"issue":"3","key":"6_CR27","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M., et al.: Classification and regression by randomForest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Meng, G., Xue, Y., Xu, Z., Liu, Y., Zhang, J., Narayanan, A.: Semantic modelling of Android malware for effective malware comprehension, detection, and classification. In: Proceedings of the 25th International Symposium on Software Testing and Analysis ISSTA 2016, pp. 306\u2013317 (2016)","DOI":"10.1145\/2931037.2931043"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., McDaniel, P.D.: Retargeting Android applications to Java bytecode. In: 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT\/FSE 2012, p. 6 (2012)","DOI":"10.1145\/2393596.2393600"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Olejnik, K., Dacosta, I., Machado, J.S., Huguenin, K., Khan, M.E., Hubaux, J.: SmarPer: context-aware and automatic runtime-permissions for mobile devices. In: 2017 IEEE Symposium on Security and Privacy SP 2017, pp. 1058\u20131076 (2017)","DOI":"10.1109\/SP.2017.25"},{"key":"6_CR31","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Qu, Z., Rastogi, V., Zhang, X., Chen, Y., Zhu, T., Chen, Z.: AutoCog: measuring the description-to-permission fidelity in Android applications. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1354\u20131365 (2014)","DOI":"10.1145\/2660267.2660287"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing Android sources and sinks. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014 (2014)","DOI":"10.14722\/ndss.2014.23039"},{"issue":"1","key":"6_CR34","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","volume":"15","author":"A Saracino","year":"2016","unstructured":"Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: MADAM: effective and efficient behavior-based Android malware detection and prevention. IEEE Trans. Dependable Secur. Comput. 15(1), 83\u201397 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TR.2017.2778147","volume":"67","author":"G Tao","year":"2018","unstructured":"Tao, G., Zheng, Z., Guo, Z., Lyu, M.R.: MalPat: mining patterns of malicious and benign Android apps via permission-related APIs. IEEE Trans. Relia. 67(1), 355\u2013369 (2018)","journal-title":"IEEE Trans. Relia."},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Wei, F., Roy, S., Ou, X., Robby: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of Android apps. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1329\u20131341 (2014)","DOI":"10.1145\/2660267.2660357"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Wong, M.Y., Lie, D.: IntelliDroid: a targeted input generator for the dynamic analysis of android malware. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016 (2016)","DOI":"10.14722\/ndss.2016.23118"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-11203-9_10","volume-title":"Computer Security - ESORICS 2014","author":"C Yang","year":"2014","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in Android applications. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163\u2013182. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-11203-9_10"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1105\u20131116 (2014)","DOI":"10.1145\/2660267.2660359"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30619-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:06:32Z","timestamp":1584403592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30619-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030306182","9783030306199"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30619-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ml4cs2019.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}