{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:24:43Z","timestamp":1759134283924,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319205496"},{"type":"electronic","value":"9783319205502"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20550-2_9","type":"book-chapter","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T01:55:06Z","timestamp":1434938106000},"page":"165-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software"],"prefix":"10.1007","author":[{"given":"Iasonas","family":"Polakis","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Diamantaris","sequence":"additional","affiliation":[]},{"given":"Thanasis","family":"Petsas","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"9_CR1","unstructured":"Android developers - monkeyrunner. http:\/\/developer.android.com\/tools\/help\/monkeyrunner_concepts.html"},{"key":"9_CR2","unstructured":"Android malware genome project. http:\/\/www.malgenomeproject.org\/"},{"key":"9_CR3","unstructured":"Apktool. https:\/\/code.google.com\/p\/android-apktool\/"},{"key":"9_CR4","unstructured":"Contagio - mobile malware. http:\/\/contagiominidump.blogspot.com"},{"key":"9_CR5","unstructured":"Dex2jar. https:\/\/code.google.com\/p\/dex2jar\/"},{"key":"9_CR6","unstructured":"Java decompiler. http:\/\/jd.benow.ca\/"},{"key":"9_CR7","unstructured":"Beechey, J.: Application whitelisting: Panacea or propaganda (2010). http:\/\/www.sans.org\/reading-room\/whitepapers\/application\/application-whitelisting-panacea-propaganda-33599"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Bickford, J., Lagar-Cavilla, H.A., Varshavsky, A., Ganapathy, V., Iftode, L.: Security versus energy tradeoffs in host-based mobile malware detection. In: MobiSys (2011)","DOI":"10.1145\/1999995.2000017"},{"key":"9_CR9","unstructured":"Carroll, A., Heiser, G.: An analysis of power consumption in a smartphone. In: USENIX ATC (2010)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, Y., Ma, Z., Fernandes, F.C.A.: How is energy consumed in smartphone display applications? In: HotMobile (2013)","DOI":"10.1145\/2444776.2444781"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Friedman, R., Kogan, A., Krivolapov, Y.: On power and throughput tradeoffs of wifi and bluetooth in smartphones. In: INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935315"},{"key":"9_CR12","unstructured":"Harlalka, R.: How to stop your mobile app from being a serious battery drain (2013)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-41284-4_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"J Hoffmann","year":"2013","unstructured":"Hoffmann, J., Neumann, S., Holz, T.: Mobile malware detection based on energy fingerprints \u2014 a dead end? In: Stolfo, S.J., Stavrou, A., Wright, C.V. (eds.) RAID 2013. LNCS, vol. 8145, pp. 348\u2013368. Springer, Heidelberg (2013)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, MobiSys 2008 (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Maggi, F., Valdi, A., Zanero, S.: Andrototal: a flexible, scalable toolbox and service for testing mobile malware detectors. In: CCS SPSM (2013)","DOI":"10.1145\/2516760.2516768"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications(PerCom 2004) (2004)","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Merlo, A., Migliardi, M., Fontanelli, P.: On energy-based profiling of malware in android. In: HPCS (2014)","DOI":"10.1109\/HPCSim.2014.6903732"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-319-08509-8_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Mohaisen","year":"2014","unstructured":"Mohaisen, A., Alrawi, O.: AV-meter: an evaluation of antivirus scans and labels. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 112\u2013131. Springer, Heidelberg (2014)"},{"issue":"5","key":"9_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/s11036-013-0470-y","volume":"18","author":"AA Nacci","year":"2013","unstructured":"Nacci, A.A., Trov\u00f2, F., Maggi, F., Ferroni, M., Cazzola, A., Sciuto, D., Santambrogio, M.D.: Adaptive and flexible smartphone power modeling. Mob. Netw. Appl. 18(5), 600\u2013609 (2013)","journal-title":"Mob. Netw. Appl."},{"key":"9_CR20","unstructured":"Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: PerCom Workshops. IEEE Computer Society (2005)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Pathak, A., Hu, Y.C., Zhang, M.: Where is the energy spent inside my app? Fine grained energy accounting on smartphones with eprof. In: EuroSys (2012)","DOI":"10.1145\/2168836.2168841"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: ASIA CCS (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Rice, A.C., Hay, S.: Decomposing power measurements for mobile devices. In: PerCom (2010)","DOI":"10.1109\/PERCOM.2010.5466991"},{"key":"9_CR24","unstructured":"Symantec: Android Madware and Malware Trends (2013)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Thiagarajan, N., Aggarwal, G., Nicoara, A., Boneh, D., Singh, J.P.: Who killed my battery? Analyzing mobile browser energy consumption. In: WWW (2012)","DOI":"10.1145\/2187836.2187843"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Truong, H.T.T., Lagerspetz, E., Nurmi, P., Oliner, A.J., Tarkoma, S., Asokan, N., Bhattacharya, S.: The company you keep: mobile malware infection rates and inexpensive risk indicators. In: WWW (2014)","DOI":"10.1145\/2566486.2568046"},{"key":"9_CR27","unstructured":"Wang, T., Lu, K., Lu, L., Chung, S., Lee, W.: Jekyll on iOS: when benign apps become evil. In: Proceedings of the 22Nd USENIX Conference on Security, SEC 2013 (2013)"},{"key":"9_CR28","unstructured":"Yoon, C., Kim, D., Jung, W., Kang, C., Cha, H.: Appscope: application energy metering framework for android smartphones using kernel activity monitoring. In: USENIX ATC (2012)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, L., Tiwana, B., Qian, Z., Wang, Z., Dick, R.P., Mao, Z.M., Yang, L.: Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In: CODES\/ISSS (2010)","DOI":"10.1145\/1878961.1878982"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-37300-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Zheng","year":"2013","unstructured":"Zheng, M., Lee, P.P.C., Lui, J.C.S.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 82\u2013101. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20550-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T02:03:21Z","timestamp":1676945001000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-20550-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319205496","9783319205502"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20550-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}