{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:09Z","timestamp":1767339909202,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_6","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:29Z","timestamp":1328654309000},"page":"65-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Challenges for Dynamic Analysis of iOS Applications"],"prefix":"10.1007","author":[{"given":"Martin","family":"Szydlowski","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Apps - Android Market, https:\/\/market.android.com\/"},{"key":"6_CR2","unstructured":"BigAdmin: DTrace, http:\/\/www.oracle.com\/technetwork\/systems\/dtrace\/index.html"},{"key":"6_CR3","unstructured":"iPhone Developer Program License Agreement, http:\/\/www.eff.org\/files\/20100302_iphone_dev_agr.pdf"},{"key":"6_CR4","unstructured":"Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: Aeg: Automatic exploit generation. In: 17th Annual Network and Distributed System Security Symposium, NDSS 2011 (2011)"},{"key":"6_CR5","first-page":"135","volume-title":"ASIACCS 2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","author":"M. Balduzzi","year":"2010","unstructured":"Balduzzi, M., Egele, M., Kirda, E., Balzarotti, D., Kruegel, C.: A solution for the automated detection of clickjacking attacks. In: ASIACCS 2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 135\u2013144. ACM, New York (2010)"},{"key":"6_CR6","unstructured":"Beschizza, R.: iPhone game dev accused of stealing players\u2019 phone numbers, http:\/\/www.boingboing.net\/2009\/11\/05\/iphone-game-dev-accu.html"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.1145\/1133572.1133599"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Dinaburg, A., Royal, P., Sharif, M.I., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: ACM Conference on Computer and Communications Security (CCS), pp. 51\u201362 (2008)","DOI":"10.1145\/1455770.1455779"},{"key":"6_CR9","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: 17th Annual Network and Distributed System Security Symposium, NDSS 2011 (2011)"},{"key":"6_CR10","unstructured":"Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.X.: Dynamic spyware analysis. In: Proceedings of the 2007 USENIX Annual Technical Conference, pp. 233\u2013246 (2007)"},{"key":"6_CR11","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware analysis techniques and tools. ACM Computing Surveys (to appear)"},{"key":"6_CR12","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of OSDI 2010 (October 2010)"},{"key":"6_CR13","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium (August 2011)"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security and Privacy\u00a07(1), 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. In: ACM Workshop on Security and Privacy in Mobile Devices (SPSM), Chicago, IL, USA (October 2011)","DOI":"10.1145\/2046614.2046618"},{"key":"6_CR16","unstructured":"B.R. for The Register. iphone app grabs your mobile number, http:\/\/www.theregister.co.uk\/2009\/09\/30\/iphone_security\/"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Hallaraker, O., Vigna, G.: Detecting malicious javascript code in mozilla. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), pp. 85\u201394 (2005)","DOI":"10.1109\/ICECCS.2005.35"},{"key":"6_CR18","unstructured":"Hunt, G., Brubacher, D.: Detours: binary interception of Win32 functions. In: 3rd USENIX Windows NT Symposium, pp. 135\u2013143. USENIX Association, Berkeley (1999)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11790754_6","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"C. Mulliner","year":"2006","unstructured":"Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol.\u00a04064, pp. 91\u2013108. Springer, Heidelberg (2006)"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1127345.1127348","volume":"9","author":"D. Mutz","year":"2006","unstructured":"Mutz, D., Valeur, F., Vigna, G., Kr\u00fcgel, C.: Anomalous system call detection. ACM Trans. Inf. Syst. Secur.\u00a09(1), 61\u201393 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. In: Proceedings of the 2006 EuroSys Conference, pp. 15\u201327 (2006)","DOI":"10.1145\/1217935.1217938"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Vasudevan, A., Yerraballi, R.: Stealth breakpoints. In: 21st Annual Computer Security Applications Conference (ACSAC), pp. 381\u2013392 (2005)","DOI":"10.1109\/CSAC.2005.52"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Vasudevan, A., Yerraballi, R.: Cobra: Fine-grained malware analysis using stealth localized-executions. In: IEEE Symposium on Security and Privacy, pp. 264\u2013279 (2006)","DOI":"10.1109\/SP.2006.9"},{"key":"6_CR24","unstructured":"Vasudevan, A., Yerraballi, R.: Spike: engineering malware analysis tools using unobtrusive binary-instrumentation. In: Proceedings of the 29th Australasian Computer Science Conference, pp. 311\u2013320 (2006)"},{"issue":"2","key":"6_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C. Willems","year":"2007","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy\u00a05(2), 32\u201339 (2007)","journal-title":"IEEE Security and Privacy"},{"key":"6_CR26","unstructured":"Wired. Apple Approves, Pulls Flashlight App with Hidden Tethering Mode, http:\/\/www.wired.com\/gadgetlab\/2010\/07\/apple-approves-pulls-flashlight%2dapp-with-hidden-tethering-mode\/"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D.X., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: ACM Conference on Computer and Communications Security (CCS), pp. 116\u2013127 (2007)","DOI":"10.1145\/1315245.1315261"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T01:38:54Z","timestamp":1742434734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}