{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:45:57Z","timestamp":1725907557835},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319654812"},{"type":"electronic","value":"9783319654829"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65482-9_26","type":"book-chapter","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T18:08:09Z","timestamp":1502388489000},"page":"387-396","source":"Crossref","is-referenced-by-count":0,"title":["An Android Malware Detection System Based on Behavior Comparison Analysis"],"prefix":"10.1007","author":[{"given":"Jing","family":"Tao","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiqi","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11416-008-0096-y","volume":"6","author":"B Lau","year":"2008","unstructured":"Lau, B., Svajcer, V.: Measuring virtual machine detection in malware using DSD tracer. J. Comput. Virol. 6(3), 181\u2013195 (2008)","journal-title":"J. Comput. Virol."},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75496-1_1","volume-title":"Information Security","author":"T Raffetseder","year":"2007","unstructured":"Raffetseder, T., Kruegel, C., Kirda, E.: Detecting System Emulators. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 1\u201318. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75496-1_1"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Paleari, R., Martignoni, L., Roglia, G., Bruschi, D.: A fistful of red-pills: how to automatically generate procedures to detect CPU emulators. In: The 3rd USENIX Conference on Offensive Technologies (WOOT 2009), Berkeley, CA, USA (2009)","DOI":"10.1145\/1572272.1572303"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Vidas, T., Christin, N.: Evading android runtime analysis via sandbox detection. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIA CCS 2014), Kyoto Garden Palace, Kyoto, Japan, pp. 447\u2013458 (2014)","DOI":"10.1145\/2590296.2590325"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Jing, Y., Zhao, Z., Ahn, G., Hu, H.: Morpheus: automatically generating heuristics to detect android emulators. In: Annual Computer Security Applications Conference (ACSAC 2014), New Orleans, Louisiana, USA, pp. 216\u2013225 (2014)","DOI":"10.1145\/2664243.2664250"},{"key":"26_CR6","unstructured":"Neuner, S., Veen, V.V.D., Lindorfer, M., et al.: Enter Sandbox: Android sandbox comparison. In: Proceedings of the IEEE Mobile Security Technologies workshop (MoST), San Jose, California, USA (2014)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of Android Malware behaviors. In: The Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, pp. 8\u201311 (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T., et al.: Mobile-Sandbox: having a deeper look into Android applications. In: ACM Symposium on Applied Computing (SAC), New York, NY, USA, pp. 1808\u20131815 (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Gajrani, J., Sarswat, J., Tripathi, M., et al.: A robust dynamic analysis system preventing SandBox detection by Android malware. In: Proceedings of the 8th International Conference on Security of Information and Networks (SIN 2015), New York, NY, USA, pp. 290\u2013295 (2015)","DOI":"10.1145\/2799979.2800004"},{"key":"26_CR10","unstructured":"Tal, G., Keith, A., Andrew, W., and Jason, F.: Compatibility is not transparency: VMM detection myths and realities. In: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS 2007), Berkeley, California, USA, pp. 6:1\u20136:6 (2007)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Petsas, T., Voyatzis, G., Athanasopoulos, E., Polychronakis, M., Ioannidis, S.: Rage against the virtual machine: hindering dynamic analysis of Android malware. In: Proceedings of the Seventh European Workshop on System Security (EuroSec 2014), Amsterdam, Netherlands, pp. 5:1\u20135:6 (2014)","DOI":"10.1145\/2592791.2592796"},{"issue":"2","key":"26_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Chun, B., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"26_CR13","unstructured":"Yan, L., Yin, H.: Droidscope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Security Symposium, Berkeley, California, USA, p. 29 (2012)"},{"key":"26_CR14","unstructured":"Dhilung, K., Giovanni, V., Christopher, K.: BareCloud: bare-metal analysis-based evasive malware detection. In: 23rd USENIX Security Symposium (USENIX Security 2014), San Diego, California, USA, pp. 287\u2013301 (2014)"},{"key":"26_CR15","unstructured":"Simone, M., Christopher, K. et al.: BareDroid: large-scale analysis of Android apps on real devices. In: Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, California, USA (2015)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65482-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T07:31:24Z","timestamp":1570001484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65482-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319654812","9783319654829"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65482-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}