{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:28Z","timestamp":1740098968035,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_17","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"201-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PCSD: A Tool for Android Malware Detection"],"prefix":"10.1007","author":[{"given":"Bo","family":"Leng","sequence":"first","affiliation":[]},{"given":"Jianbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"She","sequence":"additional","affiliation":[]},{"given":"Wuqiang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Quanrun","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"17_CR1","unstructured":"IDC. \nhttp:\/\/www.idc.com\/promo\/smartphone-market-share\/os"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Liang, S., Du, X.: Permission-combination-based scheme for Android mobile malware detection. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 2301\u20132306 (2014)","DOI":"10.1109\/ICC.2014.6883666"},{"key":"17_CR3","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-35473-1_12","volume-title":"Advances in Intelligent Systems and Applications - Volume 2","author":"CY Huang","year":"2013","unstructured":"Huang, C.Y., Tsai, Y.T., Hsu, C.H.: Performance evaluation on permission-based detection for Android malware. In: Pan, J.S., Yang, C.N., Lin, C.C. (eds.) Advances in Intelligent Systems and Applications - Volume 2. SIST, vol. 21, pp. 111\u2013120. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35473-1_12"},{"key":"17_CR4","first-page":"228","volume":"2","author":"Z Aung","year":"2013","unstructured":"Aung, Z., Zaw, W.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2, 228\u2013234 (2013)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Shen, T., Zhongyang, Y., Xin, Z., Mao, B., Huang, H.: Detect Android malware variants using component based topology graph. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, pp. 406\u2013413 (2014)","DOI":"10.1109\/TrustCom.2014.52"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: IccTA: detecting inter-component privacy leaks in Android apps. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Florence, pp. 280\u2013291 (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Hoffmann, J., Ussath, M., Holz, T., Spreitzenbarth, M.: Slicing droids: program slicing for smali code. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013), pp. 1844\u20131851. ACM, New York (2013)","DOI":"10.1145\/2480362.2480706"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Tang, J., et al.: NIVAnalyzer: a tool for automatically detecting and verifying next-intent vulnerabilities in Android apps. In: 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), Tokyo, pp. 492\u2013499 (2017)","DOI":"10.1109\/ICST.2017.56"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S.J., Fattori, A., et al.: CopperDroid: automatic reconstruction of Android malware behaviors. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"17_CR10","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI 2010), pp. 393\u2013407. USENIX Association, Berkeley, CA, USA (2010)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, J.: A two-layered permission-based Android malware detection scheme. In: 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, pp. 142\u2013148 (2014)","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"17_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-33018-6_30","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions","author":"B Sanz","year":"2013","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., \u00c1lvarez, G.: PUMA: permission usage to detect malware in Android. In: Herrero, \u00c1., et al. (eds.) International Joint Conference CISIS\u201912-ICEUTE\u201912-SOCO\u201912 Special Sessions. AISC, vol. 189, pp. 289\u2013298. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-33018-6_30"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Klein, J., Traon, Y.L.: Automatically exploiting potential component leaks in Android applications. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, pp. 388\u2013397 (2014)","DOI":"10.1109\/TrustCom.2014.50"},{"issue":"6","key":"17_CR14","doi-asserted-by":"crossref","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), pp. 239\u2013252. ACM, New York (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M., Wu, K.P.: DroidMat: Android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security, Tokyo, pp. 62\u201369 (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new Android malware detection approach using Bayesian classification. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, pp. 121\u2013128 (2013)","DOI":"10.1109\/AINA.2013.88"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., et al.: DREBIN: effective and explainable detection of Android malware in your pocket. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Sahs, J., Khan, L.: A machine learning approach to Android malware detection. In: 2012 European Intelligence and Security Informatics Conference, Odense, pp. 141\u2013147 (2012)","DOI":"10.1109\/EISIC.2012.34"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, A., Dash, S.K.: Mining API calls and permissions for android malware detection. In: Cryptology and Network Security, pp. 191\u2013205 (2014)","DOI":"10.1007\/978-3-319-12280-9_13"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011), pp. 15\u201326. ACM, New York (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"17_CR22","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","volume-title":"Security and Privacy in Communication Networks","author":"Y Aafer","year":"2013","unstructured":"Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 86\u2013103. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04283-1_6"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-Sec: deep learning in android malware detection. In: SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 371\u2013372 (2014)","DOI":"10.1145\/2619239.2631434"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T., Hoffmann, J.: Mobile-sandbox: having a deeper look into android applications. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013), pp. 1808\u20131815. ACM, New York (2013)","DOI":"10.1145\/2480362.2480701"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van der Veen, V., Platzer, C.: ANDRUBIS \u2013 1,000,000 apps later: a view on current Android malware behaviors. In: 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Wroclaw, pp. 3\u201317 (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"17_CR26","unstructured":"A tool for reverse engineering Android APK files. \nhttps:\/\/ibotpeaches.github.io\/Apktool\/"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:59:18Z","timestamp":1512554358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}