{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:36Z","timestamp":1761401796443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319302218"},{"type":"electronic","value":"9783319302225"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30222-5_10","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T03:45:11Z","timestamp":1456803911000},"page":"201-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications"],"prefix":"10.1007","author":[{"given":"Gerardo","family":"Canfora","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Corrado Aaron","family":"Visaggio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,1]]},"reference":[{"key":"10_CR1","unstructured":"Androguard (2014). \n                    https:\/\/code.google.com\/p\/androguard\/"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS 2014, Network and Distributed System Security Symposium. IEEE (2014)","DOI":"10.14722\/ndss.2014.23247"},{"issue":"2","key":"10_CR3","first-page":"179","volume":"5","author":"S Attaluri","year":"2008","unstructured":"Attaluri, S., McGhee, S., Stamp, M.: Profile hidden markov models and metamorphic virus detection. J. Comput. Virol. Hacking Tech. 5(2), 179\u2013192 (2008)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11416-013-0185-4","volume":"9","author":"D Baysa","year":"2013","unstructured":"Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. Hacking Tech. 9(4), 179\u2013192 (2013)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: Opcodes as predictor for malware. Int. J. Electron. Secur. Digital Forensics 1(2), 156\u2013168 (2007)","journal-title":"Int. J. Electron. Secur. Digital Forensics"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.: A classifier of malicious android applications. In: IWSMA 2013, 2nd International Workshop on Security of Mobile Applications, in conjunction with the International Conference on Availability, Reliability and Security, pp. 607\u2013614. IEEE (2013)","DOI":"10.1109\/ARES.2013.80"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: Mast: triage for market-scale mobile malware analysis. In: WISEC 2013, 6th ACM Conference on Security in Wireless and Mobile Networks, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: ACSAC 2007, 23rd Annual Computer Security Applications Conference, pp. 463\u2013475. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.37"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Choucane, M., Lakhotia, A.: Using engine signature to detect metamorphic malware. In: WORM 2006, 4th ACM workshop on Recurring malcode, pp. 73\u201378. ACM (2006)","DOI":"10.1145\/1179542.1179558"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Desnos, A.: Android: static analysis using similarity distance. In: HICSS 2012, 45th Hawaii International Conference on System Sciences, pp. 5394\u20135403. IEEE (2012)","DOI":"10.1109\/HICSS.2012.114"},{"key":"10_CR11","unstructured":"Enck, W., Gilbert, P., Chun, B., Con, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI 2010, 9th USENIX Symposium on Operating Systems Design and Implementation (2010)"},{"key":"10_CR12","unstructured":"Fedler, R., Sch\u00fctte, J., Kulicke, M.: On the effectiveness of malware protection on android: An evaluation of android antivirus apps, (2014). \n                    http:\/\/www.aisec.fraunhofer.de\/\n                    \n                  , \n                    http:\/\/www.aisec.fraunhofer.de\/content\/dam\/aisec\/Dokumente\/Publikationen\/Studien_TechReports\/deutsch\/042013-Technical-Report-Android-Virus-Test.pdf"},{"key":"10_CR13","unstructured":"Gartner (2014). \n                    http:\/\/www.gartner.com\/newsroom\/id\/2944819"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012)"},{"key":"10_CR15","unstructured":"GoogleMobile (2014). \n                    http:\/\/googlemobile.blogspot.it\/2012\/02\/android-and-security.html"},{"key":"10_CR16","unstructured":"GooglePlay (2014). \n                    https:\/\/play.google.com\/"},{"key":"10_CR17","unstructured":"Marforio, C., Aurelien, F., Srdjan, C.: Application collusion attack on the permission-based security model and its implications for modern smartphone systems (2011). \n                    ftp:\/\/ftp.inf.ethz.ch\/doc\/tech-reports\/7xx\/724.pdf"},{"key":"10_CR18","unstructured":"Oberheide, J., Miller, C.: Dissecting the android bouncer. In: SummerCon (2012). \n                    https:\/\/jon.oberheide.org\/files\/summercon12-bouncer.pdf"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of android apps. In: CCS 2012, 19th ACM Conference on Computer and Communications Security, pp. 241\u2013252 (2012)","DOI":"10.1145\/2382196.2382224"},{"key":"10_CR20","unstructured":"Rad, B.B., Masrom, M.: Metamorphic virus variants classification using opcode frequency histogram. Latest Trends on Computers (Volume I) (2010)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Rad, B., Masrom, M., Ibrahim, S.: Opcodes histogram for classifying metamorphic portable executables malware. In: ICEEE 2012, International Conference on E-Learning and E-Technologies in Education, pp. 209\u2013213 (2012)","DOI":"10.1109\/ICeLeTE.2012.6333411"},{"key":"10_CR22","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: EUROSEC 2013, 6th European Workshop on Systems Security (2013)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: EISIC 2012, European Intelligence and Security Informatics Conference, pp. 141\u2013147 (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Ectler, F., Schreck, T., Freling, F., Hoffmann, J.: Mobilesandbox: looking deeper into android applications. In: SAC 2013, 28th International ACM Symposium on Applied Computing (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Wu, D., Mao, C., Wei, T., Lee, H., Wu, K.: Droidmat: android malware detection through manifest and api calls tracing. In: Asia JCIS 2012, 7th Asia Joint Conference on Information Security, pp. 62\u201369 (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Zheng, M., Sun, M., Lui, J.: Droid analytics: a signature based analytic system to collect, extract, analyze and associate android malware. In: TrustCom 2013, International Conference on Trust, Security and Privacy in Computing and Communications, pp. 163\u2013171 (2013)","DOI":"10.1109\/TrustCom.2013.25"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: SP 2012, IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30222-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:29:30Z","timestamp":1559392170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30222-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319302218","9783319302225"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30222-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}