{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:38:06Z","timestamp":1762033086300},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372995"},{"type":"electronic","value":"9783642373008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_5","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T04:53:59Z","timestamp":1363150439000},"page":"82-101","source":"Crossref","is-referenced-by-count":75,"title":["ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems"],"prefix":"10.1007","author":[{"given":"Min","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Androguard (2010), http:\/\/code.google.com\/p\/androguard\/"},{"key":"5_CR2","unstructured":"Android. Android Developers - Building and Running, http:\/\/developer.android.com\/guide\/developing\/building\/index.html"},{"key":"5_CR3","unstructured":"Android. Log, http:\/\/developer.android.com\/reference\/android\/util\/Log.html"},{"key":"5_CR4","unstructured":"Android. Signing Your Applications, http:\/\/developer.android.com\/guide\/publishing\/app-signing.html"},{"key":"5_CR5","unstructured":"Android. zipalign, http:\/\/developer.android.com\/guide\/developing\/tools\/zipalign.html"},{"key":"5_CR6","unstructured":"Android Market, https:\/\/market.android.com\/"},{"key":"5_CR7","unstructured":"Anti-Malware Testing Standards Organization, http:\/\/www.amtso.org"},{"key":"5_CR8","unstructured":"Antiy, http:\/\/www.antiy.net"},{"key":"5_CR9","unstructured":"Apktool, http:\/\/code.google.com\/p\/android-apktool\/"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral Detection of Malware on Mobile Handsets. In: Proc. of ACM MobiSys (2008)","DOI":"10.1145\/1378600.1378626"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"5_CR12","unstructured":"Cesare, S., Xiang, Y.: Classification of Malware Using Structured Control Flow. In: Proc. of the Eighth Australasian Symposium on Parallel and Distributed Computing (2010)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, J., Wong, S.H., Yang, H., Lu, S.: SmartSiren: Virus Detection and Alert for Smartphones. In: Proc. of ACM MobiSys (2007)","DOI":"10.1145\/1247660.1247690"},{"key":"5_CR14","unstructured":"Christodorescu, M., Jha, S.: Static Analysis of Executables to Detect Malicious Patterns. In: Proc. of USENIX Security Symposium (2003)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S.: Testing Malware Detectors. In: Proc. of ISSTA (2004)","DOI":"10.1145\/1007512.1007518"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-Aware Malware Detection. In: IEEE Symposium on Security and Privacy (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"5_CR17","unstructured":"Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical Report 148, Dept. of Computer Science, University of Auckland, New Zealand (July 1997)"},{"key":"5_CR18","unstructured":"Contagio Mobile, http:\/\/contagiominidump.blogspot.com\/"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MPRV.2004.21","volume":"3","author":"D. Dagon","year":"2004","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming! Pervasive Computing\u00a03(4), 11\u201315 (2004)","journal-title":"Pervasive Computing"},{"key":"5_CR20","unstructured":"dex2jar, http:\/\/code.google.com\/p\/dex2jar\/"},{"key":"5_CR21","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: Proc. of NDSS (2011)"},{"key":"5_CR22","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proc. of USENIX OSDI (2010)"},{"key":"5_CR23","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Application Security. In: Proc. of USENIX Security Symposium (2011)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions Demystified. In: Proc. of ACM CCS (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. In: Proc. of ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"5_CR26","unstructured":"Guo, C., Wang, H.J., Zhu, W.: Smart-Phone Attacks and Defenses. In: ACM SIGCOMM HotNets (2004)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Harley, D.: Making Sense of Anti-Malware Comparative Testing. Information Security Tech. Report 14(1) (February 2009)","DOI":"10.1016\/j.istr.2009.03.002"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These Aren\u2019t the Droids You\u2019re Looking For: Retrofitting Android to Protect Data from Imperious Applications. In: Proc. of ACM CCS (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"5_CR29","unstructured":"Hurlbut, D.: Fuzzy Hashing for Digital Forensic Investigators (May 2011), http:\/\/accessdata.com\/downloads\/media\/Fuzzy_Hashing_for_Investigators.pdf"},{"key":"5_CR30","unstructured":"IDC. Worldwide Smartphone Market Expected to Grow 55% in 2011 and Approach Shipments of One Billion in 2015, According to IDC (June 2011), http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS22871611"},{"key":"5_CR31","unstructured":"IDM Computer Solutions, Inc. File Compare | UltraCompare Professional (2011) http:\/\/www.ultraedit.com\/products\/ultracompare.html"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Jamaluddin, J., Zotou, N., Edwards, R., Coulton, P.: Mobile Phone Vulnerabilities: A New Generation of Malware. In: Proc. of IEEE Int. Symp. on Consumer Electronics (2004)","DOI":"10.1109\/ISCE.2004.1375935"},{"key":"5_CR33","unstructured":"Java Decompiler, http:\/\/java.decompiler.free.fr\/"},{"key":"5_CR34","unstructured":"JesusFreke. smali (2011), http:\/\/code.google.com\/p\/smali\/"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-04342-0_13","volume-title":"Recent Advances in Intrusion Detection","author":"L. Liu","year":"2009","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing Your Cellphone from Spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 244\u2013264. Springer, Heidelberg (2009)"},{"key":"5_CR36","unstructured":"McAfee Labs. McAfee Threats Report: Second Quarter 2011 (2011)"},{"issue":"2","key":"5_CR37","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11416-006-0024-y","volume":"2","author":"J.A. Morales","year":"2006","unstructured":"Morales, J.A., Clarke, P.J., Deng, Y.: Testing and Evaluating Virus Detectors for Handheld Devices. Journal in Computer Virology\u00a02(2), 135\u2013147 (2006)","journal-title":"Journal in Computer Virology"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of Static Analysis for Malware Detection. In: Proc. of ACSAC (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"5_CR39","unstructured":"Muttik, I., Vignoles, J.: Rebuilding Anti-Malware Testing for the Future. In: Virus Bulletin Conference (2008)"},{"key":"5_CR40","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-Version Antivirus in the Network Cloud. In: Proc. of USENIX Security (2008)"},{"key":"5_CR41","unstructured":"Oracle. JDK Tools and Utilities (2010), http:\/\/download.oracle.com\/javase\/1.5.0\/docs\/tooldocs\/#security"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection For Smartphones. In: Proc. of ACSAC (2010)","DOI":"10.1145\/1920261.1920313"},{"key":"5_CR43","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In: Proc. of NDSS (2011)"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz, O., Y\u00fcksely, K.A., Camtepe, S.A., Albayrak, S.: Static Analysis of Executables for Collaborative Malware Detection on Android. In: Proc. of IEEE ICC (2009)","DOI":"10.1109\/ICC.2009.5199486"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C.: Smartphone Malware Evolution Revisited: Android Next Target? In: Proc. of MALWARE (2009)","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"5_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10844-010-0134-3","volume":"37","author":"A. Shabtai","year":"2011","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. Journal of Intell. Info. Syst.\u00a037, 1\u201330 (2011)","journal-title":"Journal of Intell. Info. Syst."},{"key":"5_CR47","unstructured":"Symantec. SymbOS.Cabir (June 2004), http:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2004-061419-4412-99"},{"key":"5_CR48","unstructured":"Tencent Mobile Security Lab. Disguised the explosive growth of the virus (October 2011) http:\/\/www.tastecate.com\/freepages353623"},{"key":"5_CR49","unstructured":"TGDaily. Smartphone Malware at an All-Time High (December 2010), http:\/\/www.tgdaily.com\/security-brief\/53060-smartphone-malware-at-an-all-time-high"},{"key":"5_CR50","unstructured":"Vesselin: Dexid (2011), http:\/\/dl.dropbox.com\/u\/34034939\/dexid.zip"},{"key":"5_CR51","unstructured":"VirusTotal, http:\/\/www.virustotal.com"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Xie, L., Zhang, X., Chaugule, A., Jaeger, T., Zhu, S.: Designing System-Level Defenses against Cellphone Malware. In: Proc. of IEEE SRDS (2009)","DOI":"10.1109\/SRDS.2009.21"},{"key":"5_CR53","unstructured":"Ye, S.: Android Market is Currently Blocked in China. Here are your Alternatives (September 2011), http:\/\/techrice.com\/2011\/10\/09\/android-market-is-currently-blocked-in-china-here-are-your-alternatives\/"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:12:23Z","timestamp":1562785943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}