{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:11:53Z","timestamp":1726053113937},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_57","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"485-494","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Model Checking to Detect the Hummingbad Malware"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Vittoria","family":"Nardone","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[]},{"given":"Gigliola","family":"Vaglini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Andersen, J.R., Andersen, N., Enevoldsen, S., Hansen, M.M., Larsen, K.G., Olesen, S.R., Srba, J., Wortmann, J.K.: CAAL: concurrency workbench, aalborg edition. In: Theoretical Aspects of Computing - ICTAC 2015 - 12th International Colloquium Cali, Colombia, 29\u201331 October 2015, Proceedings, Lecture Notes in Computer Science, vol. 9399, pp. 573\u2013582. Springer (2015)","DOI":"10.1007\/978-3-319-25150-9_33"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket. In: Proceedings of 21th Annual Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Canfora, G., Di Sorbo, A., Mercaldo, F., Visaggio, C.A.: Obfuscation techniques against signature-based detection: a case study. In: Proceedings of Workshop on Mobile System Technologies (2015)","DOI":"10.1109\/MST.2015.8"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Moriano, G., Visaggio, C.A.: Composition-malware: building android malware at run time. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 318\u2013326. IEEE (2015)","DOI":"10.1109\/ARES.2015.64"},{"issue":"3","key":"57_CR5","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.ymeth.2014.06.005","volume":"69","author":"M Ceccarelli","year":"2014","unstructured":"Ceccarelli, M., Cerulo, L., Santone, A.: De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods. Methods 69(3), 298\u2013305 (2014)","journal-title":"Methods"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Cimitile, A., Martinelli, F., Mercaldo, F.: Machine learning meets iOS malware: identifying malicious applications on apple environment. In: ICISSP, pp. 487\u2013492 (2017)","DOI":"10.5220\/0006217304870492"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press (2001)","DOI":"10.1016\/B978-044450813-3\/50026-6"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235\u2013245. ACM (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"57_CR10","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the 2nd USENIX Conference on Web Application Development, p. 7 (2011)"},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Nardone, V., Santone, A.: Car hacking identification through fuzzy logic algorithms (2017). Cited By 13","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Orlando, A., Nardone, V., Santone, A., Sangaiah, A.K.: Human behavior characterization for driving style recognition in vehicle system. Comput. Electr. Eng. (2018). Cited By 10; Article in Press","DOI":"10.1016\/j.compeleceng.2017.12.050"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Hey malware, i can find you! pp. 261\u2013262 (2016). Cited By 10","DOI":"10.1109\/WETICE.2016.67"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A.: Ransomware inside out. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 628\u2013637. IEEE (2016)","DOI":"10.1109\/ARES.2016.35"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? no, thanks: how formal methods can block update attacks. In: Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, pp. 22\u201328. ACM (2016)","DOI":"10.1145\/2897667.2897673"},{"key":"57_CR16","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Hey malware, i can find you! In: 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 261\u2013262. IEEE (2016)","DOI":"10.1109\/WETICE.2016.67"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Ransomware steals your phone. Formal methods rescue it. In: International Conference on Formal Techniques for Distributed Objects, Components, and Systems, pp. 212\u2013221. Springer (2016)","DOI":"10.1007\/978-3-319-39570-8_14"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Visaggio, C.A., Canfora, G., Cimitile, A.: Mobile malware detection in the real world. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 744\u2013746. ACM (2016)","DOI":"10.1145\/2889160.2892656"},{"key":"57_CR19","unstructured":"Milner, R.: Communication and Concurrency. PHI Series in Computer Science. Prentice Hall (1989)"},{"key":"57_CR20","doi-asserted-by":"crossref","unstructured":"Oh, H.-S., Kim, B.-J., Choi, H.-K., Moon, S.-M.: Evaluation of android dalvik virtual machine. In: Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems, pp. 115\u2013124. ACM (2012)","DOI":"10.1145\/2388936.2388956"},{"key":"57_CR21","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 329\u2013334. ACM (2013)","DOI":"10.1145\/2484313.2484355"},{"issue":"5","key":"57_CR22","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00236-012-0161-3","volume":"49","author":"A Santone","year":"2012","unstructured":"Santone, A., Vaglini, G.: Abstract reduction in directed model checking ccs processes. Acta Informatica 49(5), 313\u2013341 (2012)","journal-title":"Acta Informatica"},{"key":"57_CR23","unstructured":"Stirling, C.: An introduction to modal and temporal logics for CCS. In: Yonezawa, A., Ito, T. (eds.) Concurrency: Theory, Language, and Architecture. LNCS, vol. 491, pp. 2\u201320. Springer (1989)"},{"issue":"4","key":"57_CR24","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao, X., Zhang, S., Mercaldo, F., Hu, G., Sangaiah, A.K.: Android malware detection based on system call sequences and LSTM. Multimed. Tools Appl. 78(4), 3979\u20133999 (2019)","journal-title":"Multimed. Tools Appl."}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:37:51Z","timestamp":1569922671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_57","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}