{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:14:30Z","timestamp":1725912870150},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663319"},{"type":"electronic","value":"9783319663326"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_8","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"167-191","source":"Crossref","is-referenced-by-count":3,"title":["Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level"],"prefix":"10.1007","author":[{"given":"Kai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tongxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peiyuan","family":"Zong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"8_CR1","unstructured":"Aliyun cloud. https:\/\/www.aliyun.com\/"},{"key":"8_CR2","unstructured":"At&t managed security services. http:\/\/www.corp.att.com\/gov\/solution\/network_services\/mss.html"},{"key":"8_CR3","unstructured":"Cloaking. https:\/\/en.wikipedia.org\/wiki\/Cloaking"},{"key":"8_CR4","unstructured":"Data retention directive. https:\/\/en.wikipedia.org\/wiki\/Data_Retention_Directive"},{"key":"8_CR5","unstructured":"Fraudster phishing users with malicious mobile apps. https:\/\/info.phishlabs.com\/blog\/fraudster-phishing-users-with-malicious-mobile-apps"},{"key":"8_CR6","unstructured":"Jieba - chinese text segmentation. https:\/\/github.com\/fxsjy\/jieba"},{"key":"8_CR7","unstructured":"Linking to your products. https:\/\/developer.android.com\/distribute\/tools\/promote\/linking.html"},{"key":"8_CR8","unstructured":"Mobile\/tablet operating system market share. https:\/\/www.netmarketshare.com\/operating-system-market-share.aspx"},{"key":"8_CR9","unstructured":"Verizon managed security services. http:\/\/www.verizonenterprise.com\/products\/security\/monitoring-analytics\/managed-security-services.xml"},{"key":"8_CR10","unstructured":"Data retention across the eu (2016). http:\/\/fra.europa.eu\/en\/theme\/information-society-privacy-and-data-protection\/data-retention"},{"key":"8_CR11","unstructured":"Zip (file format) (2017). https:\/\/en.wikipedia.org\/wiki\/Zip_(file_format)"},{"issue":"4","key":"8_CR12","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.2307\/41703508","volume":"36","author":"A Abbasi","year":"2012","unstructured":"Abbasi, A., Albrecht, C., Vance, A., Hansen, J.: Metafraud: a meta-learning framework for detecting financial fraud. Mis Q. 36(4), 1293\u20131327 (2012)","journal-title":"Mis Q."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.D.: Effective and explainable detection of android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: ICSE (2014)","DOI":"10.1145\/2568225.2568286"},{"key":"8_CR15","unstructured":"Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., Zou, W., Liu, P.: Finding unknown malice in 10 seconds: mass vetting for new threats at the google-play scale. In: USENIX Security, vol. 15 (2015)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Chen, K., Wang, X., Chen, Y., Wang, P., Lee, Y., Wang, X., Ma, B., Wang, A., Zhang, Y., Zou, W.: Following devil\u2019s footprints: cross-platform analysis of potentially harmful libraries on android and IOS. In: IEEE Symposium on Security and Privacy (SP), pp. 357\u2013376. IEEE (2016)","DOI":"10.1109\/SP.2016.29"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-33167-1_3","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J Crussell","year":"2012","unstructured":"Crussell, J., Gibler, C., Chen, H.: Attack of the clones: detecting cloned applications on android markets. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 37\u201354. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33167-1_3"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"8_CR19","unstructured":"Foozy, C.F.M., Ahmad, R., Abdollah, M.F.: Phishing detection taxonomy for mobile device. Int. J. Comput. Sci. 10, 338\u2013344 (2013)"},{"key":"8_CR20","unstructured":"Google. Google report: Android security 2014 year in review (2014). https:\/\/static.googleusercontent.com\/media\/source.android.com\/en\/security\/reports\/Google_Android_Security_2014_Report_Final.pdf"},{"key":"8_CR21","unstructured":"Gu, G., Porras, P.A., Yegneswaran, V., Fong, M.W., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. In: Security (2007)"},{"key":"8_CR22","unstructured":"Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee, W.: The core of the matter: analyzing malicious traffic in cellular carriers. In: NDSS (2013)"},{"key":"8_CR23","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"V Monga","year":"2006","unstructured":"Monga, V., Evans, B.L.: Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans. Image Process. 15, 11 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"8_CR24","first-page":"1405","volume":"36","author":"X-M Niu","year":"2008","unstructured":"Niu, X.-M., Jiao, Y.-H.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405\u20131411 (2008)","journal-title":"Acta Electronica Sinica"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: CODASPY, pp. 209\u2013220 (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Ren, C., Chen, K., Liu, P.: Droidmarking: resilient software watermarking for impeding android application repackaging. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, pp. 635\u2013646. ACM (2014)","DOI":"10.1145\/2642937.2642977"},{"key":"8_CR27","unstructured":"RFC. Hypertext transfer protocol - http\/1.1 (1999). http:\/\/www.ietf.org\/rfc\/rfc2616.txt"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Sun, M., Li, M., Lui, J. Droideagle: seamless detection of visually similar android apps. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p. 9. ACM (2015)","DOI":"10.1145\/2766498.2766508"},{"key":"8_CR29","unstructured":"Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In: USENIX Security (2012)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, F., Huang, H., Zhu, S., Wu, D., Liu, P.: Viewdroid: towards obfuscation-resilient mobile application repackaging detection. In: WiSec (2014)","DOI":"10.1145\/2627393.2627395"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: CODASPY (2012)","DOI":"10.1145\/2133601.2133640"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T09:18:07Z","timestamp":1570180687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}