{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:37Z","timestamp":1763468197187},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319085081"},{"type":"electronic","value":"9783319085098"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08509-8_4","type":"book-chapter","created":{"date-parts":[[2014,6,13]],"date-time":"2014-06-13T07:04:32Z","timestamp":1402643072000},"page":"51-71","source":"Crossref","is-referenced-by-count":30,"title":["AndRadar: Fast Discovery of Android Applications in Alternative Markets"],"prefix":"10.1007","author":[{"given":"Martina","family":"Lindorfer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stamatis","family":"Volanis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alessandro","family":"Sisto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthias","family":"Neugschwandtner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Platzer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Anubis, http:\/\/anubis.iseclab.org"},{"key":"4_CR2","unstructured":"VirusShare, http:\/\/www.virusshare.com"},{"key":"4_CR3","unstructured":"VirusTotal, http:\/\/www.virustotal.com"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Barrera, D., Clark, J., McCarney, D., van Oorschot, P.C.: Understanding and Improving App Installation Security Mechanisms Through Empirical Analysis of Android. In: Proceedings of the 2nd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2012)","DOI":"10.1145\/2381934.2381949"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: MAST: Triage for Market-scale Mobile Malware Analysis. In: Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chen, H.: Underground Economy of Android Application Plagiarism. In: Proceedings of the 1st International Workshop on Security in Embedded Systems and Smartphones, SESP (2013)","DOI":"10.1145\/2484417.2484419"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J. Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the Clones: Detecting Cloned Applications on Android Markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 37\u201354. Springer, Heidelberg (2012)"},{"key":"4_CR8","unstructured":"Desnos, A., Gueguen, G.: Android: From Reversing To Decompilation. In: Black Hat Abu Dhabi (2011)"},{"key":"4_CR9","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium (2011)"},{"key":"4_CR10","unstructured":"F-Secure: Threat Report H2 2013. (March 2014), http:\/\/www.f-secure.com\/static\/doc\/labs_global\/Research\/Threat_Report_H2_2013.pdf"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: AdRob: Examining the Landscape and Impact of Android Application Plagiarism. In: Proceedings of 11th International Conference on Mobile Systems, Applications and Services, MobiSys (2013)","DOI":"10.1145\/2462456.2466709"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: RiskRanker: Scalable and Accurate Zero-day Android Malware Detection. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, MobiSys (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"4_CR13","unstructured":"Gu, L.: The Mobile Cybercriminal Underground Market in China. Tech. rep., Trend Micro (March 2014), http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-the-mobile-cybercriminal-underground-market-in-china.pdf"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S. Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.\u00a07591, pp. 62\u201381. Springer, Heidelberg (2013)"},{"key":"4_CR15","unstructured":"IDC: Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains. (August 2013), http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24257413"},{"key":"4_CR16","unstructured":"Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee, W.: The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. In: Proceedings of the 20th Annual Network & Distributed System Security Symposium, NDSS (2013)"},{"key":"4_CR17","unstructured":"Ludwig, A., Davis, E., Larimer, J.: Android - Practical Security From the Ground Up. In: Virus Bulletin Conference (2013)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Maggi, F., Valdi, A., Zanero, S.: AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors. In: Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM (2013)","DOI":"10.1145\/2516760.2516768"},{"key":"4_CR19","unstructured":"McAfee Labs: McAfee Threats Report: Second Quarter (August 2013), http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q2-2013.pdf"},{"key":"4_CR20","unstructured":"One Platform Foundation: List of Android Appstores, http:\/\/www.onepf.org\/appstores\/"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., Karagiannis, T.: Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem. In: Proceedings of the 2013 Conference on Internet Measurement Conference, IMC (2013)","DOI":"10.1145\/2504730.2504749"},{"key":"4_CR22","unstructured":"Pouik, G0rfi3ld: Similarities for Fun & Profit. Phrack Magazine\u00a014(68) (2012)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: Evaluating Android Anti-malware Against Transformation Attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIACCS (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"4_CR24","unstructured":"Ruddock, D.: Google Pushes Major Update To Play Developer Content Policy, Kills Notification Bar Ads For Real This Time, And A Lot More (September 2013), http:\/\/www.androidpolice.com\/2013\/08\/23\/teardown-google-pushes-major-update-to-play-developer-content-policy-kills-notification-bar-ads-for-real-this-time-and-a-lot-more\/"},{"key":"4_CR25","unstructured":"Signals and Systems Telecom: The Mobile Device & Network Security Bible: 2013\u20132020. Tech. rep. (September 2013), http:\/\/www.reportsnreports.com\/reports\/267722-the-mobile-device-network-security-bible-2013-2020.html"},{"key":"4_CR26","unstructured":"Simon, Z.: Adwares. Are they viruses or not? (July 2012), http:\/\/androidmalwareresearch.blogspot.gr\/2012\/07\/adwares-are-they-viruses-or-not.html"},{"key":"4_CR27","unstructured":"Trend Micro: TrendLabs 2Q 2013 Security Roundup. (August 2013), http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-2q-2013-trendlabs-security-roundup.pdf"},{"key":"4_CR28","unstructured":"Uscilowski, B.: Mobile Adware and Malware Analysis. Tech. rep., Symantec (October 2013), http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/madware_and_malware_analysis.pdf"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Vidas, T., Christin, N.: Sweetening Android Lemon Markets: Measuring and Combating Malware in Application Marketplaces. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY) (2013)","DOI":"10.1145\/2435349.2435378"},{"key":"4_CR30","unstructured":"Weichselbaum, L., Neugschwandtner, M., Lindorfer, M., Fratantonio, Y., van der Veen, V., Platzer, C.: Andrubis: Android Malware Under The Magnifying Glass. Tech. Rep. TR-ISECLAB-0414-001, Vienna University of Technology (2014)"},{"key":"4_CR31","unstructured":"Zhang, Y., Xue, H., Wei, T., Song, D.: Monitoring Vulnaggressive Apps on Google Play (November 2013), http:\/\/www.fireeye.com\/blog\/technical\/2013\/11\/monitoring-vulnaggressive-apps-on-google-play.html"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-37300-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Zheng","year":"2013","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.\u00a07591, pp. 82\u2013101. Springer, Heidelberg (2013)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, Scalable Detection of \u201cPiggybacked\u201d Mobile Applications. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, CODASPY (2013)","DOI":"10.1145\/2435349.2435377"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting Android Malware: Characterization and Evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"4_CR36","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium, NDSS (2012)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08509-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T13:56:06Z","timestamp":1565531766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08509-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085081","9783319085098"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08509-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}