{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:14Z","timestamp":1775913494000,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319132563","type":"print"},{"value":"9783319132570","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13257-0_19","type":"book-chapter","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T10:43:57Z","timestamp":1415011437000},"page":"328-344","source":"Crossref","is-referenced-by-count":13,"title":["Comprehensive Behavior Profiling for Proactive Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Britton","family":"Wolfe","sequence":"first","affiliation":[]},{"given":"Karim O.","family":"Elish","sequence":"additional","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Soot: a Java optimization framework (2012), http:\/\/www.sable.mcgill.ca\/soot\/"},{"key":"19_CR2","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y. Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: Mining API-level features for robust malware detection in android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol.\u00a0127, pp. 86\u2013103. Springer, Heidelberg (2013)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Amos, B., Turner, H., White, J.: Applying machine learning classifiers to dynamic android malware detection at scale. In: 2013 9th Int. Wireless Commun. and Mobile Computing Conf. (IWCMC), pp. 1666\u20131671 (2013)","DOI":"10.1109\/IWCMC.2013.6583806"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: Efficient and explainable detection of Android malware in your pocket. In: Proc. of 17th Network and Distributed System Security Symposium, NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: Behavior-based malware detection system for Android. In: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proc. of 19th Int. World Wide Web Conf. (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"19_CR7","unstructured":"Elish, K.O., Yao, D., Ryder, B.G.: User-centric dependence analysis for identifying malicious mobile apps. In: Proc. of the IEEE Mobile Security Technologies (MoST) Workshop, in conjunction with the IEEE Symposium on Security and Privacy (2012)"},{"key":"19_CR8","unstructured":"Elish, K.O., Yao, D., Ryder, B.G., Jiang, X.: A static assurance analysis of Android applications. Technical Report TR-13-03, Virginia Tech (2013)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: RiskRanker: scalable and accurate zero-day Android malware detection. In: Proc. of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 281\u2013294. ACM (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: An update. SIGKDD Explorations\u00a011 (2009)","DOI":"10.1145\/1656274.1656278"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"S. Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems\u00a012, 26\u201360 (1990)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"19_CR12","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: Proc. of the 1999 IEEE Symposium on Security and Privacy, pp. 120\u2013132. IEEE (1999)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-04342-0_13","volume-title":"Recent Advances in Intrusion Detection","author":"L. Liu","year":"2009","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing your cellphone from spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 244\u2013264. Springer, Heidelberg (2009)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of android apps. In: Proc. of the 2012 ACM Conf. on Computer and Commun. Security, CCS 2012, pp. 241\u2013252 (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to Android malware detection. In: 2012 European Intelligence and Security Informatics Conf. (EISIC), pp. 141\u2013147 (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"19_CR16","series-title":"AISC","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-33018-6_30","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"B. Sanz","year":"2013","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: Permission usage to detect malware in android. In: Herrero, \u00c1., Sn\u00e1\u0161el, V., Abraham, A., Zelinka, I., Baruque, B., Quinti\u00e1n, H., Calvo, J.L., Sedano, J., Corchado, E. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 289\u2013298. Springer, Heidelberg (2013)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yuksel, K., Camtepe, S., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: IEEE Int. Conf. on Commun., pp. 1\u20135 (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"issue":"1","key":"19_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A. Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for Android devices. Journal of Intelligent Inform. Syst.\u00a038(1), 161\u2013190 (2012)","journal-title":"Journal of Intelligent Inform. Syst."},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4304\/jcp.1.4.8-17","volume":"1","author":"A. Srivastava","year":"2006","unstructured":"Srivastava, A., Sural, S., Majumdar, A.K.: Database intrusion detection using weighted sequence mining. Journal of Computers\u00a01(4), 8\u201317 (2006)","journal-title":"Journal of Computers"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Tan, H., Goharian, N., Sherr, M.: $100,000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam. In: Proc. of the 35th Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, pp. 1175\u20131176. ACM (2012)","DOI":"10.1145\/2348283.2348526"},{"key":"19_CR21","unstructured":"Virustotal: Virus Total (2013), https:\/\/www.virustotal.com\/"},{"key":"19_CR22","unstructured":"Whitney, L.: iPhone market share shrinks as Android, Windows Phone grow (January 2014), http:\/\/news.cnet.com\/8301-13579_3-57616679-37\/iphone-market-share-shrinks-as-android-windows-phone-grow\/"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: Android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conf. on Inform. Security (Asia JCIS), pp. 62\u201369 (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Xie, P., Li, J.H., Ou, X., Liu, P., Levy, R.: Using Bayesian networks for cyber security analysis. In: 2010 IEEE\/IFIP Int. Conf. on Dependable Syst. and Networks (DSN), pp. 211\u2013220. IEEE (2010)","DOI":"10.1109\/DSN.2010.5544924"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting Android malware: Characterization and evolution. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13257-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T05:55:52Z","timestamp":1746510952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13257-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319132563","9783319132570"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13257-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}