{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:46:56Z","timestamp":1743029216463,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030869694"},{"type":"electronic","value":"9783030869700"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86970-0_7","type":"book-chapter","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T06:03:57Z","timestamp":1631253837000},"page":"79-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Family Matters: On the Investigation of [Malicious] Mobile Apps Clustering"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0017-4644","authenticated-orcid":false,"given":"Thalita Scharr Rodrigues","family":"Pimenta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8313-6688","authenticated-orcid":false,"given":"Rafael Duarte Coelho","family":"dos Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1766-5757","authenticated-orcid":false,"given":"Andr\u00e9","family":"Gr\u00e9gio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"7_CR1","unstructured":"A. F. A. Kadir, N.S., Ghorbani, A.A.: Understanding android financial malware attacks: taxonomy, characterization, and challenges. J. Cyber Secur. Mob. 7, 1\u201352 (2018)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.1093\/comjnl\/bxu148","volume":"58","author":"S Alam","year":"2015","unstructured":"Alam, S., Traore, I., Sogukpinar, I.: Annotated control flow graph for metamorphic malware detection. Comput. J. 58, 2608\u20132621 (2015)","journal-title":"Comput. J."},{"issue":"1\u20132","key":"7_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11416-012-0162-3","volume":"8","author":"A Apvrille","year":"2012","unstructured":"Apvrille, A., Strazzere, T.: Reducing the window of opportunity for android malware Gotta catch\u2019em all. J. Comput. Virol. 8(1\u20132), 61\u201371 (2012)","journal-title":"J. Comput. Virol."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Awad, R.A., Sayre, K.D.: Automatic clustering of malware variants. In: IEEE Conference on Intelligence and Security Informatics (ISI) (2016)","DOI":"10.1109\/ISI.2016.7745494"},{"key":"7_CR5","unstructured":"Burke, D.: Fake covid notification apps and websites aim to steal money and personal data. https:\/\/www.cbc.ca\/news\/canada\/nova-scotia\/covid-apps-phones-scammers-fraudulent-personal-data-1.5877496"},{"issue":"2","key":"7_CR6","first-page":"1","volume":"1","author":"SH Cha","year":"2007","unstructured":"Cha, S.H.: Comprehensive survey on distance\/similarity measures between probability density functions. City 1(2), 1 (2007)","journal-title":"City"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"101568","DOI":"10.1016\/j.cose.2019.101568","volume":"87","author":"LY Connolly","year":"2019","unstructured":"Connolly, L.Y., Wall, D.S.: The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Comput. Secur. 87, 101568 (2019)","journal-title":"Comput. Secur."},{"key":"7_CR8","unstructured":"Desnos, A., et al.: Androguard-reverse engineering, malware and goodware analysis of android applications. google.com\/p\/androguard 153 (2013)"},{"key":"7_CR9","first-page":"53","volume":"45","author":"R Fedler","year":"2013","unstructured":"Fedler, R., Schutte, J., Kulicke, M.: On the effectiveness of malware protection on android. Fraunhofer AISEC 45, 53 (2013)","journal-title":"Fraunhofer AISEC"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah, A., Anuar, N.B.R., Salleh, G.S.T., Furnell, S.: AndroDialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1631\/FITEE.1601491","volume":"19","author":"A Firdaus","year":"2018","unstructured":"Firdaus, A., Anuar, N., Karim, A., Razak, M.F.A.: Discovering optimal features using static analysis and a genetic search based method for android malware detection. Front. Inf. Technol. Electron. Eng. 19, 712\u2013736 (2018)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Hsiao, S.W., Sun, Y.S., Chen, M.C.: Behavior grouping of android malware family. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7511424"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11416-005-0002-9","volume":"1","author":"ME Karim","year":"2005","unstructured":"Karim, M.E., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1, 13\u201323 (2005)","journal-title":"J. Comput. Virol."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20137 (2018)","DOI":"10.1109\/CCST.2018.8585560"},{"key":"7_CR16","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. In: Soviet Physics Doklady, pp. 707\u2013710. Soviet Union (1966)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-66332-6_9","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"Y Li","year":"2017","unstructured":"Li, Y., Jang, J., Hu, X., Ou, X.: Android malware clustering through malicious payload mining. In: Dacier, M., Bailey, M., Polychronakis, M., Antonakakis, M. (eds.) RAID 2017. LNCS, vol. 10453, pp. 192\u2013214. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66332-6_9"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 328\u2013332. ACM (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Mart\u00edn, A., Fuentes-Hurtado, F., Naranjo, V., Camacho, D.: Evolving deep neural networks architectures for android malware classification. In: IEEE Congress on Evolutionary Computation (CEC) (2017)","DOI":"10.1109\/CEC.2017.7969501"},{"key":"7_CR20","unstructured":"Metz, J.: An\u00e1lise e extra\u00e7\u00e3o de caracter\u00edsticas estruturais e comportamentais para perfis de malware. Master\u2019s thesis, Mestra em Ci\u00eancias de Computa\u00e7\u00e3o e Matem\u00e1tica Computacional - USP., S\u00e3o Carlos - SP (Junho 2006)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 421\u2013430. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.4413008"},{"key":"7_CR22","unstructured":"Nadeem, A.: Clustering malware\u2019s network behavior using simple sequential features. Master\u2019s thesis, University of Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, September 2018"},{"key":"7_CR23","unstructured":"News, S.W.: The covid-19 hoax scareware. https:\/\/securitynews.sonicwall.com\/xmlpost\/the-covid-19-hoax-scareware\/. Accessed 25 Mar 2021"},{"key":"7_CR24","unstructured":"Perdisci, R., W.Lee, Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI, vol. 10, p. 14 (2010)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Pfeffer, A., et al.: Malware analysis and attribution using genetic information. In: 7th International Conference on Malicious and Unwanted Software (2012)","DOI":"10.1109\/MALWARE.2012.6461006"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Poeplau, S., Fratantonio, Y.A., Bianchi, C.K., Vigna, G.: Execute this! Analyzing unsafe and malicious dynamic code loading in android applications. In: NDSS Symposium 2014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23328"},{"key":"7_CR27","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/978-3-030-16660-1_64","volume-title":"Intelligent Systems Design and Applications","author":"H Rathore","year":"2020","unstructured":"Rathore, H., Sahay, S.K., Chaturvedi, P., Sewak, M.: Android malicious application classification using clustering. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds.) ISDA 2018 2018. AISC, vol. 941, pp. 659\u2013667. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-16660-1_64"},{"issue":"1","key":"7_CR28","first-page":"27","volume":"5","author":"E Rend\u00f3n","year":"2011","unstructured":"Rend\u00f3n, E., Abundez, I., Arizmendi, A., Quiroz, E.M.: Internal versus external cluster validation indexes. Int. J. Comput. Commun. 5(1), 27\u201334 (2011)","journal-title":"Int. J. Comput. Commun."},{"key":"7_CR29","unstructured":"Samani, R.: Mcafee mobile threat report: Mobile malware is playing hide and steal. https:\/\/www.mcafee.com\/enterprise\/pt-br\/assets\/reports\/rp-quarterly-threats-nov-2020.pdf. Accessed 25 Mar 2021"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., et al.: Static analysis of executables for collaborative malware detection on android. In: 2009 IEEE International Conference on Communications (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Skovoroda, A., Gamayunov, D.: Review of the mobile malware detection approaches. In: 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (2015)","DOI":"10.1109\/PDP.2015.54"},{"key":"7_CR32","unstructured":"Team, N.: What is scareware and how can i avoid it? https:\/\/uk.norton.com\/norton-blog\/2015\/09\/what_is_scarewarean.html"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"W\u00fcchner, T., Ochoa, M., Pretschner, A.: Malware detection with quantitative data flow graphs. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (2014)","DOI":"10.1145\/2590296.2590319"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In 2012 IEEE symposium on security and privacy (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86970-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T06:07:57Z","timestamp":1631254077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86970-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030869694","9783030869700"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86970-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}