{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:54Z","timestamp":1767339354511,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105500"},{"type":"electronic","value":"9783031105517"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10551-7_13","type":"book-chapter","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T14:04:56Z","timestamp":1656684296000},"page":"169-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Sandbox Environment for\u00a0Real Time Malware Analysis of\u00a0IoT Devices"],"prefix":"10.1007","author":[{"given":"Gaurav Pramod","family":"Kachare","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Choudhary","sequence":"additional","affiliation":[]},{"given":"Shishir Kumar","family":"Shandilya","sequence":"additional","affiliation":[]},{"given":"Vikas","family":"Sihag","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,2]]},"reference":[{"issue":"5","key":"13_CR1","doi-asserted-by":"publisher","first-page":"8977","DOI":"10.1109\/JIOT.2019.2925929","volume":"6","author":"H Alasmary","year":"2019","unstructured":"Alasmary, H., et al.: Analyzing and detecting emerging Internet of Things malware: a graph-based approach. IEEE Internet Things J. 6(5), 8977\u20138988 (2019)","journal-title":"IEEE Internet Things J."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Alhanahnah, M., Lin, Q., Yan, Q., Zhang, N., Chen, Z.: Efficient signature generation for classifying cross-architecture IoT malware. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139 (2018)","DOI":"10.1109\/CNS.2018.8433203"},{"issue":"10","key":"13_CR3","doi-asserted-by":"publisher","first-page":"3763","DOI":"10.1109\/JBHI.2021.3063173","volume":"25","author":"PV Astillo","year":"2021","unstructured":"Astillo, P.V., Choudhary, G., Duguma, D.G., Kim, J., You, I.: TrMAps: trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system. IEEE J. Biomed. Health Inform. 25(10), 3763\u20133775 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Borana, P., Sihag, V., Choudhary, G., Vardhan, M., Singh, P.: An assistive tool for fileless malware detection. In: 2021 World Automation Congress (WAC), pp. 21\u201325. IEEE (2021)","DOI":"10.23919\/WAC50355.2021.9559449"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chang, K.-C., Tso, R., Tsai, M.-C.: IoT sandbox: to analysis IoT malware Zollard. In: Proceedings of the Second International Conference on Internet of Things, Data and Cloud Computing, ICC 2017, Association for Computing Machinery, New York (2017)","DOI":"10.1145\/3018896.3018898"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, S.M., Ban, T., Huang, J.W., Hong, B.K., Inoue, D.: ELF analyzer demo: online identification for IoT malwares with multiple hardware architectures. In: 2020 IEEE Security and Privacy Workshops (SPW), p. 126 (2020)","DOI":"10.1109\/SPW50608.2020.00036"},{"key":"13_CR7","volume-title":"Mastering Machine Learning for Penetration Testing","author":"C Chiheb","year":"2018","unstructured":"Chiheb, C.: Mastering Machine Learning for Penetration Testing. Packt Publishing, Birmingham (2018)"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.1109\/TNSM.2020.3007535","volume":"17","author":"G Choudhary","year":"2020","unstructured":"Choudhary, G., Astillo, P.V., You, I., Yim, K., Chen, R., Cho, J.-H.: Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems. IEEE Trans. Netw. Serv. Manag. 17(4), 2496\u20132510 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Clincy, V., Shahriar, H.: IoT malware analysis. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 920\u2013921 (2019)","DOI":"10.1109\/COMPSAC.2019.00141"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2011.36","volume":"9","author":"A Ghosh","year":"2011","unstructured":"Ghosh, A., Greamo, C.: Sandboxing and virtualization: modern tools for combating malware. IEEE Secur. Priv. 9(2), 79\u201382 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","volume":"8","author":"J Jeon","year":"2020","unstructured":"Jeon, J., Park, J.H., Jeong, Y.: Dynamic analysis for IoT malware detection with convolution neural network model. IEEE Access 8, 96899\u201396911 (2020)","journal-title":"IEEE Access"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"145768","DOI":"10.1109\/ACCESS.2020.3014891","volume":"8","author":"HV Le","year":"2020","unstructured":"Le, H.V., Ngo, Q.D.: V-sandbox for dynamic analysis IoT botnet. IEEE Access 8, 145768\u2013145786 (2020)","journal-title":"IEEE Access"},{"key":"13_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-030-14657-3_14","volume-title":"IoT as a Service","author":"Z Liu","year":"2019","unstructured":"Liu, Z., et al.: An integrated architecture for IoT malware analysis and detection. In: Li, B., Yang, M., Yuan, H., Yan, Z. (eds.) IoTaaS 2018. LNICST, vol. 271, pp. 127\u2013137. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14657-3_14"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Usilng machine learning technliques to identify botnet traffic. In: Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, pp. 967\u2013974 (2006)","DOI":"10.1109\/LCN.2006.322210"},{"key":"13_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-981-16-9576-6_17","volume-title":"Mobile Internet Security","author":"D Moad","year":"2022","unstructured":"Moad, D., Sihag, V., Choudhary, G., Duguma, D.G., You, I.: Fingerprint defender: defense against browser-based user tracking. In: You, I., Kim, H., Youn, T.-Y., Palmieri, F., Kotenko, I. (eds.) MobiSec 2021. CCIS, vol. 1544, pp. 236\u2013247. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9576-6_17"},{"key":"13_CR16","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: 9th USENIX Workshop on Offensive Technologies (WOOT 2015) (2015)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Sahu, A., Singh, A.: Securing IoT devices using JavaScript based sandbox. In: 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp. 1476\u20131482 (2016)","DOI":"10.1109\/RTEICT.2016.7808077"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sihag, V., Choudhary, G., Vardhan, M., Singh, P., Seo, J.T.: PICAndro: packet inspection-based Android malware detection. Secur. Commun. Netw. (2021)","DOI":"10.1155\/2021\/9099476"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Sihag, V., Vardhan, M., Singh, P.: BLADE: robust malware detection against obfuscation in Android. Forensic Sci. Int. Digit. Invest. 38, 301176 (2021)","DOI":"10.1016\/j.fsidi.2021.301176"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Sihag, V., Vardhan, M., Singh, P.: A survey of Android application and malware hardening. Comput. Sci. Rev. 39, 100365 (2021)","DOI":"10.1016\/j.cosrev.2021.100365"},{"issue":"2","key":"13_CR21","first-page":"34","volume":"11","author":"V Sihag","year":"2021","unstructured":"Sihag, V., Vardhan, M., Singh, P., Choudhary, G., Son, S.: De-LADY: deep learning based Android malware detection using dynamic features. J. Internet Serv. Inf. Secur. (JISIS) 11(2), 34\u201345 (2021)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"13_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-981-16-9576-6_16","volume-title":"Mobile Internet Security","author":"R Sinha","year":"2022","unstructured":"Sinha, R., Sihag, V., Choudhary, G., Vardhan, M., Singh, P.: Forensic analysis of fitness applications on Android. In: You, I., Kim, H., Youn, T.-Y., Palmieri, F., Kotenko, I. (eds.) MobiSec 2021. CCIS, vol. 1544, pp. 222\u2013235. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9576-6_16"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Soliman, S.W., Sobh, M.A., Bahaa-Eldin, A.M.: Taxonomy of malware analysis in the IoT. In: 2017 12th International Conference on Computer Engineering and Systems (ICCES), pp. 519\u2013529 (2017)","DOI":"10.1109\/ICCES.2017.8275362"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1002\/spe.2420","volume":"47","author":"H Sun","year":"2016","unstructured":"Sun, H., Wang, X., Buyya, R., Su, J.: CloudEyes: cloud-based malware detection with reversible sketch for resource-constrained Internet of Things (IoT) devices. Softw. Pract. Exp. 47, 421\u2013441 (2016)","journal-title":"Softw. Pract. Exp."},{"key":"13_CR25","volume-title":"Machine Learning for Cybersecurity Cookbook: Over 80 Recipes on How to Implement Machine Learning Algorithms for Building Security Systems Using Python","author":"E Tsukerman","year":"2019","unstructured":"Tsukerman, E.: Machine Learning for Cybersecurity Cookbook: Over 80 Recipes on How to Implement Machine Learning Algorithms for Building Security Systems Using Python. Packt Publishing, Birmingham (2019)"},{"issue":"11","key":"13_CR26","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TC.2020.3015584","volume":"69","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Venkatraman, S., Akram, J., Qin, Z.: MTHAEL: cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654\u20131667 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Wright, W., Schroh, D., Proulx, P., Skaburskis, A., Cort, B.: The sandbox for analysis: concepts and methods. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 801\u2013810. Association for Computing Machinery, New York (2006)","DOI":"10.1145\/1124772.1124890"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K., Sharma, V., Choudhary, G., Chen, I.-R., Cho, J.-H.: Misbehavior detection of embedded IoT devices in medical cyber physical systems. In: Proceedings of the 2018 IEEE\/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, pp. 88\u201393 (2018)","DOI":"10.1145\/3278576.3278601"}],"container-title":["Communications in Computer and Information Science","Computing Science, Communication and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10551-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T14:09:45Z","timestamp":1656684585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10551-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105500","9783031105517"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10551-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMS2","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computing Science, Communication and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gandhingar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coms22022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/coms2.gnu.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}