{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:59:52Z","timestamp":1743062392064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031192074"},{"type":"electronic","value":"9783031192081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19208-1_38","type":"book-chapter","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:03:45Z","timestamp":1668643425000},"page":"466-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TraceDroid: Detecting Android Malware by\u00a0Trace of\u00a0Privacy Leakage"],"prefix":"10.1007","author":[{"given":"Yueqing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Guoming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xiaotao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"unstructured":"Cyber security statistics the ultimate list of stats, data & trends. purplesec.us\/resources\/cyber-security-statistics\/","key":"38_CR1"},{"doi-asserted-by":"crossref","unstructured":"Arzt, S., et al.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI (2014)","key":"38_CR2","DOI":"10.1145\/2594291.2594299"},{"doi-asserted-by":"publisher","unstructured":"Cai, Z., He, Z.: Trading private range counting over big iot data. In: 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7\u201310, 2019. pp. 144\u2013153. IEEE (2019). https:\/\/doi.org\/10.1109\/ICDCS.2019.00023","key":"38_CR3","DOI":"10.1109\/ICDCS.2019.00023"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TDSC.2016.2613521","volume":"15","author":"Z Cai","year":"2018","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 15(4), 577\u2013590 (2018). https:\/\/doi.org\/10.1109\/TDSC.2016.2613521","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"38_CR5","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","volume":"7","author":"Z Cai","year":"2020","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766\u2013775 (2020). https:\/\/doi.org\/10.1109\/TNSE.2018.2830307","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Cai, Z., Zheng, X., Wang, J., He, Z.: Private data trading towards range counting queries in internet of things. IEEE Trans. Mob. Comput. (2022)","key":"38_CR6","DOI":"10.1109\/TMC.2022.3164325"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2019","unstructured":"Chen, X., et al.: Android HIV: a study of repackaging malware for evading machine-learning detection. IEEE Trans. Inf. Forensics Security 15, 987\u20131001 (2019)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"doi-asserted-by":"crossref","unstructured":"Chen, X., Zhu, S.: Droidjust: automated functionality-aware privacy leakage analysis for android applications. In: WiSec (2015)","key":"38_CR8","DOI":"10.1145\/2766498.2766507"},{"unstructured":"Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)","key":"38_CR9"},{"doi-asserted-by":"crossref","unstructured":"Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of android applications in droidsafe. In: NDSS (2015)","key":"38_CR10","DOI":"10.14722\/ndss.2015.23089"},{"doi-asserted-by":"publisher","unstructured":"Grace, M.C., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Davies, N., Seshan, S., Zhong, L. (eds.) The 10th International Conference on Mobile Systems, Applications, and Services, MobiSys\u201912, Ambleside, United Kingdom - June 25\u201329, 2012. pp. 281\u2013294. ACM (2012). https:\/\/doi.org\/10.1145\/2307636.2307663","key":"38_CR11","DOI":"10.1145\/2307636.2307663"},{"unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai (1995)","key":"38_CR12"},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2015.02.003","volume":"52","author":"J Lee","year":"2015","unstructured":"Lee, J., Lee, S., Lee, H.: Screening smartphone applications using malware family signatures. Comput. Secur. 52, 234\u2013249 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.02.003","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Lu, K., et al.: Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting. In: NDSS (2015)","key":"38_CR14","DOI":"10.14722\/ndss.2015.23287"},{"doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: Learning to detect malicious web sites from suspicious urls. In: KDD (2009)","key":"38_CR15","DOI":"10.1145\/1557019.1557153"},{"doi-asserted-by":"crossref","unstructured":"Mariconti, E., Onwuzurike, L., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: Detecting android malware by building markov chains of behavioral models (2017)","key":"38_CR16","DOI":"10.14722\/ndss.2017.23353"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.neucom.2019.01.105","volume":"341","author":"Z Meng","year":"2019","unstructured":"Meng, Z., Xiong, Y., Huang, W., Qin, L., Jin, X., Yan, H.: Appscalpel: combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in android applications. Neurocomputing 341, 10\u201325 (2019). https:\/\/doi.org\/10.1016\/j.neucom.2019.01.105","journal-title":"Neurocomputing"},{"unstructured":"Pandita, R., Xiao, X., Yang, W., Enck, W., Xie, T.: WHYPER: towards automating risk assessment of mobile applications. In: King, S.T. (ed.) Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14\u201316, 2013. pp. 527\u2013542. USENIX Association (2013). www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/pandita","key":"38_CR18"},{"doi-asserted-by":"publisher","unstructured":"Qu, Z., Rastogi, V., Zhang, X., Chen, Y., Zhu, T., Chen, Z.: Autocog: Measuring the description-to-permission fidelity in android applications. In: Ahn, G., Yung, M., Li, N. (eds.) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3\u20137, 2014. pp. 1354\u20131365. ACM (2014). https:\/\/doi.org\/10.1145\/2660267.2660287","key":"38_CR19","DOI":"10.1145\/2660267.2660287"},{"doi-asserted-by":"crossref","unstructured":"Raghuramu, A., Zang, H., Chuah, C.N.: Uncovering the footprints of malicious traffic in cellular data networks. In: PAM (2015)","key":"38_CR20","DOI":"10.1007\/978-3-319-15509-8_6"},{"doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing android sources and sinks. In: NDSS (2014)","key":"38_CR21","DOI":"10.14722\/ndss.2014.23039"},{"unstructured":"Ren, J., Rao, A., Lindorfer, M., Legout, A., Choffnes, D.: Recon: Revealing and controlling pii leaks in mobile network traffic. In: MobiSys (2016)","key":"38_CR22"},{"unstructured":"Sihan, Q.: Research progress on android security. Ruan Jian Xue Bao J. Softw. 1, 27 (2016)","key":"38_CR23"},{"unstructured":"Vall\u00e9e-Rai, R. Co, P., Gagnon, E., Hendren, L.J., Lam, P., Sundaresan, V.: Soot - a java bytecode optimization framework. In: MacKay, S.A., Johnson, J.H. (eds.) Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, November 8\u201311, 1999, Mississauga, Ontario, Canada. p. 13. IBM (1999). dl.acm.org\/citation.cfm?id=782008","key":"38_CR24"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.pmcj.2016.06.018","volume":"32","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Li, C., Yuan, Z., Guan, Y., Xue, Y.: Droidchain: a novel android malware detection method based on behavior chains. Pervasive Mob. Comput. 32, 3\u201314 (2016). https:\/\/doi.org\/10.1016\/j.pmcj.2016.06.018","journal-title":"Pervasive Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"W\u00fcchner, T., Cislak, A., Ochoa, M., Pretschner, A.: Leveraging compression-based graph mining for behavior-based malware detection. IEEE Trans. Dependable Secur. Comput. 16(1), 99\u2013112 (2019)","key":"38_CR26","DOI":"10.1109\/TDSC.2017.2675881"},{"doi-asserted-by":"crossref","unstructured":"Xia, M., Gong, L., Lyu, Y., Qi, Z., Liu, X.: Effective real-time android application auditing. In: S and P (2015)","key":"38_CR27","DOI":"10.1109\/SP.2015.60"},{"doi-asserted-by":"publisher","unstructured":"Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., Enck, W.: Appcontext: Differentiating malicious and benign mobile app behaviors using context. In: Bertolino, A., Canfora, G., Elbaum, S.G. (eds.) 37th IEEE\/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16\u201324, 2015, Volume 1. pp. 303\u2013313. IEEE Computer Society (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.50","key":"38_CR28","DOI":"10.1109\/ICSE.2015.50"},{"issue":"5","key":"38_CR29","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","volume":"38","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial Iots. IEEE J. Sel. Areas Commun. 38(5), 968\u2013979 (2020). https:\/\/doi.org\/10.1109\/JSAC.2020.2980802","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: S and P (2012)","key":"38_CR30","DOI":"10.1109\/SP.2012.16"},{"unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5\u20138, 2012. The Internet Society (2012), www.ndss-symposium.org\/ndss2012\/hey-you-get-my-market-detecting-malicious-apps-official-and-alternative-android-markets","key":"38_CR31"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19208-1_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:36:16Z","timestamp":1668645376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19208-1_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031192074","9783031192081"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19208-1_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"265","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}