{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:04:19Z","timestamp":1743069859775,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_11","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"171-191","source":"Crossref","is-referenced-by-count":4,"title":["FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis"],"prefix":"10.1007","author":[{"given":"Tom","family":"Deering","sequence":"first","affiliation":[]},{"given":"Ganesh Ram","family":"Santhanam","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Kothari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"11_CR1","unstructured":"Automated program analysis for cybersecurity (apac), July 2011. \n                      https:\/\/www.fbo.gov\/index?s=opportunity&mode=form&id=a14e4533c2a44c3288b6a29fa6fc5841&tab=core&_cview=1"},{"key":"11_CR2","unstructured":"Android 4.4.4 (kitkat), May 2015. \n                      http:\/\/www.android.com\/versions\/kit-kat-4-4\/"},{"key":"11_CR3","unstructured":"Extensible common software graph, March 2015. \n                      http:\/\/ensoftatlas.com\/wiki\/Extensible_Common_Software_Graph"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1007\/978-3-642-31057-7_30","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"K Ali","year":"2012","unstructured":"Ali, K., Lhot\u00e1k, O.: Application-only call graph construction. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 688\u2013712. Springer, Heidelberg (2012)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-39038-8_16","volume-title":"ECOOP 2013 \u2013 Object-Oriented Programming","author":"K Ali","year":"2013","unstructured":"Ali, K., Lhot\u00e1k, O.: Averroes: whole-program analysis without the whole program. In: Castagna, G. (ed.) ECOOP 2013. LNCS, vol. 7920, pp. 378\u2013400. Springer, Heidelberg (2013)"},{"issue":"6","key":"11_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. SIGPLAN Not. 49(6), 259\u2013269 (2014)","journal-title":"SIGPLAN Not."},{"key":"11_CR7","unstructured":"Burnette, E.: Hello, Android: introducing Google\u2019s mobile development platform. Pragmatic Bookshelf (2009)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Callahan, D.: The program summary graph and flow-sensitive interprocedual data flow analysis, vol. 23. ACM (1988)","DOI":"10.1145\/960116.53995"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Cao, Y., Fratantonio, Y., Bianchi, A., Egele, M., Kruegel, C., Vigna, G., Chen, Y.: Edgeminer: Automatically detecting implicit control flow transitions through the android framework. 22nd Annual Network and Distributed System Security Symposium, NDSS San Diego, California, USA (2015)","DOI":"10.14722\/ndss.2015.23140"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Ryder, B.G., Landi, W.A.: Relevant context inference. In: ACM Symposium on Principles of Programming Languages, pp. 133\u2013146. ACM (1999)","DOI":"10.1145\/292540.292554"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Clapp, L., Anand, S., Aiken, A.: Modelgen: mining explicit information flow specifications from concrete executions. In: International Symposium on Software Testing and Analysis, pp. 129\u2013140. ACM (2015)","DOI":"10.1145\/2771783.2771810"},{"key":"11_CR12","unstructured":"Deering, T.: April 2015. \n                      http:\/\/powerofpi.github.io\/FlowMiner\/"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Deering, T., Kothari, S., Sauceda, J., Mathews, J.: Atlas: a new way to explore software, build analysis tools. In: Companion Proceedings of the International Conference on Software Engineering, pp. 588\u2013591. ACM (2014)","DOI":"10.1145\/2591062.2591065"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1145\/506315.506316","volume":"23","author":"D Grove","year":"2001","unstructured":"Grove, D., Chambers, C.: A framework for call graph construction algorithms. ACM Trans. Prog. Lang. Syst. (TOPLAS) 23(6), 685\u2013746 (2001)","journal-title":"ACM Trans. Prog. Lang. Syst. (TOPLAS)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"LaToza, T., Myers, B.: Visualizing call graphs. In: Visual Languages and Human-Centric Computing (VL\/HCC), Symposium on, pp. 117\u2013124. IEEE (2011)","DOI":"10.1109\/VLHCC.2011.6070388"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Computer security applications conference, pp. 421\u2013430. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 49\u201361. ACM (1995)","DOI":"10.1145\/199448.199462"},{"key":"11_CR19","volume-title":"Android Application Development: Programming with the Google SDK","author":"R Rogers","year":"2009","unstructured":"Rogers, R., Lombardo, J., Mednieks, Z., Meike, B.: Android Application Development: Programming with the Google SDK. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Rosen, S., Qian, Z., Mao, Z.M.: Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users. In: Proceedings of the ACM conference on Data and application security and privacy, pp. 221\u2013232. ACM (2013)","DOI":"10.1145\/2435349.2435380"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11688839_2","volume-title":"Compiler Construction","author":"A Rountev","year":"2006","unstructured":"Rountev, A., Kagan, S., Marlowe, T.: Interprocedural dataflow analysis in the presence of large libraries. In: Mycroft, A., Zeller, A. (eds.) CC 2006. LNCS, vol. 3923, pp. 2\u201316. Springer, Heidelberg (2006)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-78791-4_4","volume-title":"Compiler Construction","author":"A Rountev","year":"2008","unstructured":"Rountev, A., Sharp, M., Xu, G.: IDE dataflow analysis in the presence of large object-oriented libraries. In: Hendren, L. (ed.) CC 2008. LNCS, vol. 4959, pp. 53\u201368. Springer, Heidelberg (2008)"},{"key":"11_CR23","first-page":"189","volume-title":"Program Flow Analysis: Theory and Applications","author":"M Sharir","year":"1981","unstructured":"Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis. In: Muchnick, S.S., Jones, N.D. (eds.) Program Flow Analysis: Theory and Applications, pp. 189\u2013234. Prentice Hall, New York (1981)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Yan, D., Xu, G., Rountev, A.: Rethinking soot for summary-based whole-program analysis. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, pp. 9\u201314. ACM (2012)","DOI":"10.1145\/2259051.2259053"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, W., Ryder, B.: Constructing accurate application call graphs for java to model library callbacks. In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation, SCAM 2006, pp. 63\u201374. IEEE (2006)","DOI":"10.1109\/SCAM.2006.9"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:03:33Z","timestamp":1559333013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}