{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:03:59Z","timestamp":1743033839338,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_40","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"512-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On Malware Leveraging the Android Accessibility Framework"],"prefix":"10.1007","author":[{"given":"Joshua","family":"Kraunelis","sequence":"first","affiliation":[]},{"given":"Yinjie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"40_CR1","unstructured":"Accessibility. http:\/\/developer.android.com\/guide\/topics\/ui\/accessibility\/index.html (2013)"},{"key":"40_CR2","unstructured":"Accessibility services. http:\/\/developer.android.com\/guide\/topics\/ui\/accessibility\/services.html (2013)"},{"key":"40_CR3","unstructured":"Alcatelclub. http:\/\/www.alcatelclub.com\/ (2013)"},{"key":"40_CR4","unstructured":"Android open source project. http:\/\/source.android.com\/ (2013)"},{"key":"40_CR5","unstructured":"Application fundamentals. http:\/\/developer.android.com\/guide\/components\/fundamentals.html (2013)"},{"key":"40_CR6","unstructured":"eoemarket. http:\/\/www.eoemarket.com\/ (2013)"},{"key":"40_CR7","unstructured":"Gfan. http:\/\/www.gfan.com\/ (2013)"},{"key":"40_CR8","unstructured":"Juniper networks third annual mobile threats report. http:\/\/www.juniper.net\/us\/en\/local\/pdf\/additional-resources\/3rd-jnpr-mobile-threats-report-exec-summary.pdf (2013)"},{"key":"40_CR9","unstructured":"Making applications accessible. http:\/\/developer.android.com\/guide\/topics\/ui\/accessibility\/apps.html (2013)"},{"key":"40_CR10","unstructured":"Mmoovv. http:\/\/android.mmoovv.com\/web\/index.html (2013)"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 96\u2013111 (2011)","DOI":"10.1109\/SP.2011.29"},{"key":"40_CR12","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: Proceedings of the 19th Network and Distributed System Security Symposium (NDSS) (2012)"},{"key":"40_CR13","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proceedings of the 20th USENIX Conference on Security (2011)"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Hunt, R., Hansman, S.: A taxonomy of network and computer attack methodologies. Comput. Netw. 24(1) (2005). (Elsevier)","DOI":"10.1016\/j.cose.2004.06.011"},{"issue":"99","key":"40_CR16","first-page":"1","volume":"PP","author":"S Peng","year":"2013","unstructured":"Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutor. PP(99), 1\u201317 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"40_CR17","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"ML Polla","year":"2013","unstructured":"Polla, M.L., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446\u2013471 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. Short Paper, Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS) (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: android next target? In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"40_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-37300-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Zheng","year":"2013","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 82\u2013101. Springer, Heidelberg (2013)"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of IEEE Symposium on Security and Privacy (SP) (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"40_CR22","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Network and Distributed System Security Symposium (NDSS) (2012)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:53:58Z","timestamp":1676894038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_40","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}