{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:49:11Z","timestamp":1776530951612,"version":"3.51.2"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030372279","type":"print"},{"value":"9783030372286","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_11","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:00:05Z","timestamp":1576472405000},"page":"214-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Obfusifier: Obfuscation-Resistant Android Malware Detection System"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Li","sequence":"first","affiliation":[]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[]},{"given":"Yutaka","family":"Tsutano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"11_CR1","unstructured":"f-secure.com. \nhttps:\/\/www.f-secure.com\/sw-desc\/adware_android_dowgin.shtml"},{"key":"11_CR2","unstructured":"guardsquare.com. \nhttps:\/\/www.guardsquare.com\/en\/products\/dexguard"},{"key":"11_CR3","unstructured":"preemptive.com. \nhttps:\/\/www.preemptive.com\/products\/dasho\/overview"},{"key":"11_CR4","unstructured":"Apkpure.com, December 2017. \nhttps:\/\/apkpure.com\/"},{"key":"11_CR5","unstructured":"Virusshare.com, December 2017. \nhttps:\/\/virusshare.com\/"},{"key":"11_CR6","unstructured":"Alan-android-malware.com, April 2019. \nhttp:\/\/seclist.us\/alan-android-malware-evaluating-tools-released.html"},{"key":"11_CR7","unstructured":"Virustotal.com, April 2019. \nhttps:\/\/www.virustotal.com\/#\/home\/upload"},{"key":"11_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"6","key":"11_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM Sigplan Not."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228. ACM (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., et al.: Mining apps for abnormal usage of sensitive data. In: Proceedings of the 37th International Conference on Software Engineering-vol. 1, pp. 426\u2013436 (2015)","DOI":"10.1109\/ICSE.2015.61"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Bacci, A., Bartoli, A., Martinelli, F., Medvet, E., Mercaldo, F., Visaggio, C.A.: Impact of code obfuscation on android malware detection based on static and dynamic analysis. In: ICISSP, pp. 379\u2013385 (2018)","DOI":"10.5220\/0006642503790385"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-008-0084-2","volume":"4","author":"J-M Borello","year":"2008","unstructured":"Borello, J.-M., M\u00e9, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211\u2013220 (2008)","journal-title":"J. Comput. Virol."},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"11_CR16","unstructured":"Cannell, J.: Obfuscation: Malware\u2019s best friend, March 2016. \nhttps:\/\/blog.malwarebytes.com\/threat-analysis\/2013\/03\/obfuscation-malwares-best-friend\/"},{"key":"11_CR17","unstructured":"Collberg, C.S., Thomborson, C.D., Low, D.W.K.: Obfuscation techniques for enhancing software security, December 23 2003. US Patent 6,668,325"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Duan, Y., et al.: Things you may not know about android (un) packers: a systematic study based on whole-system emulation. In: 25th Annual Network and Distributed System Security Symposium, NDSS, pp. 18\u201321 (2018)","DOI":"10.14722\/ndss.2018.23296"},{"issue":"4","key":"11_CR19","first-page":"39","volume":"9","author":"J Garcia","year":"2017","unstructured":"Garcia, J., Hammad, M., Malek, S.: Obfuscation-resilient, efficient, and accurate detection and family identification of android malware. ACM Trans. Softw. Eng. Methodol. 9(4), 39 (2017)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 45\u201354. ACM (2013)","DOI":"10.1145\/2517312.2517315"},{"key":"11_CR21","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM - software protection for the masses. In: Wyseur, B. (ed.) Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO 2015, Firenze, Italy, May 19th, 2015, pp. 3\u20139. IEEE (2015)"},{"issue":"1\u20132","key":"11_CR22","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"95","author":"N Landwehr","year":"2005","unstructured":"Landwehr, N., Hall, M., Frank, E.: Logistic model trees. Mach. Learn. 95(1\u20132), 161\u2013205 (2005)","journal-title":"Mach. Learn."},{"key":"11_CR23","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-030-01701-9_15","volume-title":"Security and Privacy in Communication Networks","author":"Z Li","year":"2018","unstructured":"Li, Z., Sun, J., Yan, Q., Srisa-an, W., Bachala, S.: GranDroid: graph-based detection of malicious network behaviors in android applications. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 264\u2013280. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-01701-9_15"},{"key":"11_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-3-319-59608-2_33","volume-title":"Security and Privacy in Communication Networks","author":"Z Li","year":"2017","unstructured":"Li, Z., Sun, L., Yan, Q., Srisa-an, W., Chen, Z.: DroidClassifier: efficient adaptive mining of application-layer header for classifying android malware. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds.) SecureComm 2016. LNICST, vol. 198, pp. 597\u2013616. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-59608-2_33"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TIFS.2013.2290431","volume":"9","author":"V Rastogi","year":"2014","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Catch me if you can: evaluating android anti-malware against transformation attacks. IEEE Trans. Inf. Forensics Secur. 9(1), 99\u2013108 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR26","volume-title":"Support Vector Machines","author":"I Steinwart","year":"2008","unstructured":"Steinwart, I., Christmann, A.: Support Vector Machines, 1st edn. Springer Publishing Company, Incorporated (2008)","edition":"1"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Sun, L., Li, Z., Yan, Q., Srisa-an, W., Pan, Y.: Sigpid: significant permission identification for android malware detection. In: Proceedings of MALWARE, pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/MALWARE.2016.7888730"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Tsutano, Y., Bachala, S., Srisa-an, W., Rothermel, G., Dinh, J.: An efficient, robust, and scalable approach for analyzing interacting android apps. In: Proceedings of ICSE, Buenos Aires, Argentina (2017)","DOI":"10.1109\/ICSE.2017.37"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot: a java bytecode optimization framework. In: CASCON First Decade High Impact Papers, pp. 214\u2013224. IBM Corp. (2010)","DOI":"10.1145\/1925805.1925818"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: Droidminer: automated mining and characterization of fine-grained malicious behaviors in android applications. Texas A&M, Technical report (2014)","DOI":"10.1007\/978-3-319-11203-9_10"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: Appcontext: differentiating malicious and benign mobile app behaviors using context. In: Proceedings of the 37th International Conference on Software Engineering-vol. 1, pp. 303\u2013313. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.50"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297\u2013300. IEEE (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Proceedings of CCS, pp. 1105\u20131116 (2014)","DOI":"10.1145\/2660267.2660359"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of IEEE S&P, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:00:32Z","timestamp":1576472432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}