{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:33:54Z","timestamp":1766493234614,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503222"},{"type":"electronic","value":"9783030503239"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50323-9_10","type":"book-chapter","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T23:02:48Z","timestamp":1591570968000},"page":"148-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DroidAutoML: A Microservice Architecture to Automate the Evaluation of Android Machine Learning Detection Systems"],"prefix":"10.1007","author":[{"given":"Y\u00e9rom-David","family":"Bromberg","sequence":"first","affiliation":[]},{"given":"Louison","family":"Gitzinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"unstructured":"Cisco visual networking index: Global mobile data traffic forecast update, 2017\u20132022. https:\/\/s3.amazonaws.com\/media.mediapost.com\/uploads\/CiscoForecast.pdf. Accessed 20 042020","key":"10_CR1"},{"unstructured":"Contagio dataset. http:\/\/contagiodump.blogspot.com\/. Accessed 12 Sept 2019","key":"10_CR2"},{"unstructured":"Cyber attacks on android devices on the rise. https:\/\/www.gdatasoftware.com\/blog\/2018\/11\/31255-cyber-attacks-on-android-devices-on-the-rise. Accessed 30 Jan 2020","key":"10_CR3"},{"unstructured":"Mcafee mobile threat report q1 (2018). https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-mobile-threat-report-2018.pdf. Accessed 30 Jan 2020","key":"10_CR4"},{"unstructured":"Nomad by hashicorp. https:\/\/www.nomadproject.io\/. Accessed 10 Feb 2020","key":"10_CR5"},{"unstructured":"There are now 2.5 billion active android devices - the verge. https:\/\/www.theverge.com\/2019\/5\/7\/18528297\/google-io-2019-android-devices-play-store-total-number-statistic-keynote. Accessed 30 Jan 2020","key":"10_CR6"},{"unstructured":"Threat intelligence report 2019. https:\/\/networks.nokia.com\/solutions\/threat-intelligence\/infographic. Accessed 30 Jan 2020","key":"10_CR7"},{"unstructured":"Virustotal. https:\/\/www.virustotal.com\/gui\/home\/upload. Accessed 04 Feb 2020","key":"10_CR8"},{"unstructured":"Yara. https:\/\/virustotal.github.io\/yara\/. Accessed 04 Feb 2020","key":"10_CR9"},{"unstructured":"Malware statistics & trends report | av-test (2020). https:\/\/www.av-test.org\/en\/statistics\/malware\/. Accessed 20 Apr 2020","key":"10_CR10"},{"doi-asserted-by":"crossref","unstructured":"Aafer, Y., Du, W., Yin, H.: Droidapiminer: mining API-level features for robust malware detection in android. In: Security and Privacy in Communication Networks (SecureCom) (2013)","key":"10_CR11","DOI":"10.1007\/978-3-319-04283-1_6"},{"unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: Symposium on Operating Systems Design and Implementation (OSDI) (2016)","key":"10_CR12"},{"unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: Androzoo: collecting millions of android apps for the research community. In: Working Conference on Mining Software Repositories (MSR)","key":"10_CR13"},{"doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: Are your training datasets yet relevant? In: International Symposium on Engineering Secure Software and Systems (2015)","key":"10_CR14","DOI":"10.1007\/978-3-319-15618-7_5"},{"doi-asserted-by":"crossref","unstructured":"Amos, B., Turner, H., White, J.: Applying machine learning classifiers to dynamic android malware detection at scale. In: International Wireless Communications and Mobile Computing Conference (IWCMC) (2013)","key":"10_CR15","DOI":"10.1109\/IWCMC.2013.6583806"},{"doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: Effective and explainable detection of android malware in your pocket. In: Annual Network and Distributed System Security Symposium (NDSS) (2014)","key":"10_CR16","DOI":"10.14722\/ndss.2014.23247"},{"doi-asserted-by":"crossref","unstructured":"Bedford, A., et al.: Andrana: Quick and Accurate Malware Detection for Android (2017)","key":"10_CR17","DOI":"10.1007\/978-3-319-51966-1_2"},{"key":"10_CR18","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"unstructured":"Bergstra, J.S., Bardenet, R., Bengio, Y., K\u00e9gl, B.: Algorithms for hyper-parameter optimization (2011)","key":"10_CR19"},{"unstructured":"Bottou, L., Bousquet, O.: The tradeoffs of large scale learning (2008)","key":"10_CR20"},{"unstructured":"Chapelle, O., Vapnik, V., Bousquet, O., Mukherjee, S.: Choosing multiple parameters for support vector machines. arXiv preprint arXiv:1502.02127 (2002)","key":"10_CR21"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2019","unstructured":"Chen, X., et al.: Android HIV: a study of repackaging malware for evading machine-learning detection. Trans. Inf. Forens. Secur. (TIFS) 15, 987\u20131001 (2019)","journal-title":"Trans. Inf. Forens. Secur. (TIFS)"},{"unstructured":"Claesen, M., De Moor, B.: Hyperparameter search in machine learning. arXiv preprint arXiv:1502.02127 (2015)","key":"10_CR23"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1137\/0207001","volume":"7","author":"EG Coffman Jr","year":"1978","unstructured":"Coffman Jr., E.G., Garey, M.R., Johnson, D.S.: An application of bin-packing to multiprocessor scheduling. SIAM J. Comput. 7(1), 1\u201317 (1978)","journal-title":"SIAM J. Comput."},{"unstructured":"Cortes, C., Jackel, L.D., Chiang, W.P.: Limits on learning machine accuracy imposed by data quality. In: Advances in Neural Information Processing Systems (NIPS) (1995)","key":"10_CR25"},{"doi-asserted-by":"crossref","unstructured":"Dai, S., Tongaonkar, A., Wang, X., Nucci, A., Song, D.: Networkprofiler: towards automatic fingerprinting of android apps. In: 2013 Proceedings IEEE INFOCOM (2013)","key":"10_CR26","DOI":"10.1109\/INFCOM.2013.6566868"},{"issue":"2","key":"10_CR27","first-page":"5","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)","journal-title":"Trans. Comput. Syst. (TOCS)"},{"doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: International Symposium on Foundations of Software Engineering (FSE) (2014)","key":"10_CR28","DOI":"10.1145\/2635868.2635869"},{"unstructured":"Feurer, M., Eggensperger, K., Falkner, S., Lindauer, M., Hutter, F.: Practical automated machine learning for the AUTOML challenge 2018. In: International Workshop on Automatic Machine Learning at ICML (2018)","key":"10_CR29"},{"key":"10_CR30","series-title":"The Springer Series on Challenges in Machine Learning","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-05318-5_6","volume-title":"Automated Machine Learning","author":"M Feurer","year":"2019","unstructured":"Feurer, M., Klein, A., Eggensperger, K., Springenberg, J.T., Blum, M., Hutter, F.: Auto-sklearn: efficient and robust automated machine learning. In: Hutter, F., Kotthoff, L., Vanschoren, J. (eds.) Automated Machine Learning. TSSCML, pp. 113\u2013134. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05318-5_6"},{"unstructured":"Fogla, P., Sharif, M.I., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic blending attacks. In: USENIX Security Symposium (2006)","key":"10_CR31"},{"doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, H., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2012)","key":"10_CR32","DOI":"10.1145\/2307636.2307663"},{"doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4maldroid: a deep learning framework for android malware detection based on Linux kernel system call graphs. In: International Conference on Web Intelligence Workshops (WIW) (2016)","key":"10_CR33","DOI":"10.1109\/WIW.2016.040"},{"key":"10_CR34","first-page":"826","volume":"18","author":"L Kotthoff","year":"2017","unstructured":"Kotthoff, L., Thornton, C., Hoos, H.H., Hutter, F., Leyton-Brown, K.: Auto-weka 2.0: automatic model selection and hyperparameter optimization in Weka. J. Mach. Learn. Res. 18, 826\u2013830 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.infsof.2017.04.001","volume":"88","author":"L Li","year":"2017","unstructured":"Li, L., et al.: Static analysis of android apps: a systematic literature review. Inf. Software Technol. 88, 67\u201395 (2017)","journal-title":"Inf. Software Technol."},{"issue":"1","key":"10_CR36","first-page":"6765","volume":"18","author":"L Li","year":"2017","unstructured":"Li, L., Jamieson, K., DeSalvo, G., Rostamizadeh, A., Talwalkar, A.: Hyperband: a novel bandit-based approach to hyperparameter optimization. J. Mach. Learn. Res. 18(1), 6765\u20136816 (2017)","journal-title":"J. Mach. Learn. Res."},{"issue":"4","key":"10_CR37","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1016\/j.eswa.2007.08.088","volume":"35","author":"SW Lin","year":"2008","unstructured":"Lin, S.W., Ying, K.C., Chen, S.C., Lee, Z.J.: Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Syst. Appl. 35(4), 1817\u20131824 (2008)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Conference on Computer and Communications Security (CCS) (2012)","key":"10_CR38","DOI":"10.1145\/2382196.2382223"},{"doi-asserted-by":"crossref","unstructured":"Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building Markov chains of behavioral models. In: Annual Network and Distributed System Security Symposium (NDSS) (2017)","key":"10_CR39","DOI":"10.14722\/ndss.2017.23353"},{"key":"10_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-40667-1_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"B Miller","year":"2016","unstructured":"Miller, B., et al.: Reviewer integration and performance measurement for malware detection. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 122\u2013141. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_7"},{"key":"10_CR41","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and API calls. In: International Conference on Tools with Artificial Intelligence (2013)","key":"10_CR42","DOI":"10.1109\/ICTAI.2013.53"},{"unstructured":"Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J., Cavallaro, L.: Tesseract: eliminating experimental bias in malware classification across space and time. In: USENIX Security Symposium (2019)","key":"10_CR43"},{"doi-asserted-by":"crossref","unstructured":"Petsas, T., Voyatzis, G., Athanasopoulos, E., Polychronakis, M., Ioannidis, S.: Rage against the virtual machine: hindering dynamic analysis of android malware. In: Proceedings of the Seventh European Workshop on System Security (2014)","key":"10_CR44","DOI":"10.1145\/2592791.2592796"},{"issue":"5","key":"10_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1387673.1387674","volume":"30","author":"MD Preda","year":"2008","unstructured":"Preda, M.D., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. (TOPLAS) 30(5), 1\u201354 (2008)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"unstructured":"Probst, P., Bischl, B., Boulesteix, A.L.: Tunability: importance of hyperparameters of machine learning algorithms. arXiv preprint arXiv:1802.09596 (2018)","key":"10_CR46"},{"doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Lovat, E., Bodden, E.: Droidforce: enforcing complex, data-centric, system-wide policies in android. In: International Conference on Availability, Reliability and Security (2014)","key":"10_CR47","DOI":"10.1109\/ARES.2014.13"},{"doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Symposium on Information, Computer and Communications Security - ASIA CCS 2013 (2013)","key":"10_CR48","DOI":"10.1145\/2484313.2484355"},{"issue":"1","key":"10_CR49","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","volume":"15","author":"A Saracino","year":"2016","unstructured":"Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: Madam: effective and efficient behavior-based android malware detection and prevention. Trans. Depend. Secur. Comput. 15(1), 83\u201397 (2016)","journal-title":"Trans. Depend. Secur. Comput."},{"issue":"1","key":"10_CR50","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: \u201candromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Sun, M., Wei, T., Lui, J.C.: Taintart: a practical multi-level information-flow tracking system for android runtime. In: Conference on Computer and Communications Security (CCS) (2016)","key":"10_CR51","DOI":"10.1145\/2976749.2978343"},{"issue":"1","key":"10_CR52","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TNN.2005.860885","volume":"17","author":"JT Tsai","year":"2006","unstructured":"Tsai, J.T., Chou, J.H., Liu, T.K.: Tuning the structure and parameters of a neural network by using hybrid Taguchi-genetic algorithm. Trans. Neural Netw. 17(1), 69\u201380 (2006)","journal-title":"Trans. Neural Netw."},{"doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android malware classification using weighted contextual API dependency graphs. In: Conference on Computer and Communications Security (SIGSAC) (2014)","key":"10_CR53","DOI":"10.1145\/2660267.2660359"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50323-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T23:03:55Z","timestamp":1717801435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50323-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503222","9783030503239"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50323-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Distributed Applications and Interoperable Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dais2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.discotec.org\/2020\/dais","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}