{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:06Z","timestamp":1761401886290},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_34","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"617-636","source":"Crossref","is-referenced-by-count":17,"title":["GreatEatlon: Fast, Static Detection of Mobile Ransomware"],"prefix":"10.1007","author":[{"given":"Chengyu","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Dellarocca","sequence":"additional","affiliation":[]},{"given":"Niccol\u00f2","family":"Andronio","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"34_CR1","unstructured":"Statista: Number of smartphone users worldwide from 2014 to 2019, August 2015. \nhttp:\/\/www.statista.com\/"},{"key":"34_CR2","unstructured":"Ericcson: Mobility report, February 2016. \nhttp:\/\/www.ericsson.com\/"},{"key":"34_CR3","unstructured":"G Data: G data mobile malware report (2015). \nhttps:\/\/www.gdatasoftware.com\/"},{"key":"34_CR4","unstructured":"K Lab: The volume of new mobile malware tripled in 2015, February 2016. \nhttp:\/\/www.kaspersky.com\/"},{"key":"34_CR5","unstructured":"Avast Software: Avast ransomware removal, June 2014. \nhttps:\/\/play.google.com\/"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-319-26362-5_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"N Andronio","year":"2015","unstructured":"Andronio, N., Zanero, S., Maggi, F.: HelDroid: dissecting and detecting mobile ransomware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 382\u2013404. Springer, Cham (2015). doi:\n10.1007\/978-3-319-26362-5_18"},{"key":"34_CR7","unstructured":"Spreitzenbarth Mobile Security and Forensics: Summary of the year 2015, January 2016. \nhttp:\/\/forensics.spreitzenbarth.de\/"},{"key":"34_CR8","unstructured":"Symantec: Simplocker: first confirmed file-encrypting ransomware for android, June 2014. \nhttp:\/\/www.symantec.com\/"},{"key":"34_CR9","unstructured":"Avast: Mobile crypto-ransomware simplocker now on steroids, February 2015. \nhttp:\/\/www.symantec.com\/"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: SOUP\u2019S 2012 Proceedings of the Eighth Symposium on Usable Privacy and Security, no. 3 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"34_CR11","unstructured":"ESET: Eset simplocker decryptor, August 2014. \nhttp:\/\/www.eset.com\/"},{"key":"34_CR12","unstructured":"Apktool v2.0.3. \nhttps:\/\/github.com\/iBotPeaches\/Apktool"},{"key":"34_CR13","unstructured":"Venkatesan, D.: Android nougat prevents ransomware from resetting device passwords, July 2016. \nhttp:\/\/www.symantec.com\/connect\/blogs\/android-nougat-prevents-ransomware-resetting-device-passwords"},{"issue":"4","key":"34_CR14","first-page":"50","volume":"25","author":"Y Zhou","year":"2012","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. NDSS 25(4), 50\u201352 (2012)","journal-title":"NDSS"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: Mast: triage for market-scale mobile malware analysis. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2462096.2462100"},{"issue":"1","key":"34_CR17","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012)","journal-title":"J. Intell. Inf. Syst."},{"key":"34_CR18","unstructured":"Apvrille, L., Apvrille, A.: Pre-filtering mobile malware with heuristic techniques. In: Proceedings of GreHack (2013)"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP) 2012, pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der Veen, V., Platzer, C.: Andrubis-1,000,000 apps later: a view on current android malware behaviors. In: Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, pp. 259\u2013269 (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 3. ACM (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"34_CR24","unstructured":"Andrubin. \nhttps:\/\/anubis.iseclab.org"},{"key":"34_CR25","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)"},{"key":"34_CR26","first-page":"2014","volume":"20","author":"K Jarvis","year":"2013","unstructured":"Jarvis, K.: Cryptolocker ransomware. Viitattu 20, 2014 (2013)","journal-title":"Viitattu"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Domingos, P.: Metacost: a general method for making classifiers cost-sensitive. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 155\u2013164. ACM (1999)","DOI":"10.1145\/312129.312220"},{"key":"34_CR28","unstructured":"Contagio mobile. \nhttp:\/\/contagiominidump.blogspot.it\/"},{"key":"34_CR29","unstructured":"Virustotal. \nhttps:\/\/virustotal.com\/"},{"key":"34_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-08509-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Lindorfer","year":"2014","unstructured":"Lindorfer, M., Volanis, S., Sisto, A., Neugschwandtner, M., Athanasopoulos, E., Maggi, F., Platzer, C., Zanero, S., Ioannidis, S.: AndRadar: fast discovery of android applications in alternative markets. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 51\u201371. Springer, Cham (2014). doi:\n10.1007\/978-3-319-08509-8_4"},{"key":"34_CR31","doi-asserted-by":"crossref","unstructured":"Maggi, F., Valdi, A., Zanero, S.: Andrototal: a flexible, scalable toolbox and service for testing mobile malware detectors. In: Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM). ACM, November 2013","DOI":"10.1145\/2516760.2516768"},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Miltenberger, M., Bodden, E.: Harvesting runtime values in android applications that feature anti-analysis techniques. In: Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23066"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:43:26Z","timestamp":1497354206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_34","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}