{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:10:15Z","timestamp":1746159015970,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_18","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"284-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Introducing Probabilities in Contract-Based Approaches for Mobile Application Security"],"prefix":"10.1007","author":[{"given":"Gianluca","family":"Dini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"18_CR1","volume-title":"In: At Your Service - Service-Oriented Computing from an EU Perspective","author":"N Dragoni","year":"2008","unstructured":"Dragoni, N., Martinelli, F., Massacci, F., Mori, P., Schaefer, C., Walter, T., Vetillard, E.: Security-by-contract ($${\\text{ S } \\times \\text{ C }}$$) for software and services of mobile systems. In: At Your Service - Service-Oriented Computing from an EU Perspective. MIT Press, Cambridge (2008)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Costa, G., Dragoni, N., Lazouski, A., Martinelli, F., Massacci, F., Matteucci, I.: Extending Security-by-Contract with quantitative trust on mobile devices. In: Proceeding of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 872\u2013877. IEEE Computer Society (2010)","DOI":"10.1109\/CISIS.2010.33"},{"issue":"4","key":"18_CR3","first-page":"75","volume":"1","author":"G Costa","year":"2010","unstructured":"Costa, G., Dragoni, N., Issarny, V., Lazouski, A., Martinelli, F., Massacci, F., Matteucci, I., Saadi, R.: Security-by-Contract-with-Trust for mobile devices. JOWUA 1(4), 75\u201391 (2010)","journal-title":"JOWUA"},{"key":"18_CR4","series-title":"CCIS","first-page":"221","volume-title":"ISoLA 2008","author":"P Greci","year":"2008","unstructured":"Greci, P., Martinelli, F., Matteucci, I.: A framework for contract-policy matching based on symbolic simulations for securing mobile device application. In: Margaria, T., Steffen, B. (eds.) ISoLA 2008. CCIS, vol. 17, pp. 221\u2013236. Springer, Heidelberg (2008)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL \u201997), pp. 106\u2013119 (1997)","DOI":"10.1145\/263699.263712"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 15\u201328 (2003)","DOI":"10.1145\/1165389.945448"},{"issue":"2","key":"18_CR7","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ic.2010.11.024","volume":"209","author":"H Hermanns","year":"2011","unstructured":"Hermanns, H., Parma, A., Segala, R., Wachter, B., Zhang, L.: Probabilistic logical characterization. Inf. Comput. 209(2), 154\u2013172 (2011)","journal-title":"Inf. Comput."},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1006\/jcss.1999.1683","volume":"60","author":"C Baier","year":"2000","unstructured":"Baier, C., Engelen, B., Majster-Cederbaum, M.: Deciding bisimilarity and similarity for probabilistic processes. J. Comput. Syst. Sci. 60(1), 187\u2013231 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"18_CR9","unstructured":"Sharkey, M.I.: Probabilistic proof-carrying code. Ph.D. thesis, Carleton University (2012)"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10515-005-6207-9","volume":"12","author":"Y Tsukada","year":"2005","unstructured":"Tsukada, Y.: Interactive and probabilistic proof of mobile code safety. Autom. Software Eng. 12(2), 237\u2013257 (2005)","journal-title":"Autom. Software Eng."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Desharnais, J., Laviolette, F., Tracol, M.: Approximate analysis of probabilistic processes: logic, simulation and games. In: Proceedings of the 2008 Fifth International Conference on Quantitative Evaluation of Systems, QEST \u201908, pp. 264\u2013273. IEEE Computer Society, Washington DC (2008)","DOI":"10.1109\/QEST.2008.42"},{"key":"18_CR12","first-page":"139","volume-title":"Proceedings of the 2013 IEEE International Conference on Collaboration Technologies and Systems, SECOTS 2013","author":"A Aldini","year":"2013","unstructured":"Aldini, A., Martinelli, F., Saracino, A., Sgandurra, D.: A collaborative framework for generating probabilistic contracts. In: Smari, W.W., Fox, G.C. (eds.) Proceedings of the 2013 IEEE International Conference on Collaboration Technologies and Systems, SECOTS 2013, pp. 139\u2013143. IEEE Computer Society, San Diego (2013)"},{"key":"18_CR13","unstructured":"Juniper Networks Global Threat Center: Malicious Mobile Threats Report 2010\/2011 (2011)"},{"key":"18_CR14","series-title":"LNCS","first-page":"93","volume-title":"TRUST 2011","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol. 6740, pp. 93\u2013107. Springer, Heidelberg (2011)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. Technical report, Electrical Engineering and Computer Sciences, University of California at Berkeley (2012) http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2012\/EECS-2012-26.html","DOI":"10.1145\/2335356.2335360"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Dragoni, N., Massacci, F.: Security-by-contract for web services. In: SWS, pp. 90\u201398 (2007)","DOI":"10.1145\/1314418.1314433"},{"key":"18_CR17","series-title":"IFIP AICT","first-page":"364","volume-title":"SEC 2012","author":"O Gadyatskaya","year":"2012","unstructured":"Gadyatskaya, O., Massacci, F., Philippov, A.: Security-by-Contract for the OSGi platform. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 364\u2013375. Springer, Heidelberg (2012)"},{"key":"18_CR18","unstructured":"Easwaran, A., Kannan, S., Lee, I.: Optimal control of software ensuring safety and functionality. Technical Report MS-CIS-05-20, University of Pennsylvania (2005)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Morisset, C.: Quantitative access control with partially-observable markov decision processes. In: Proceedings of CODASPY \u201912, pp. 169\u2013180. ACM (2012)","DOI":"10.1145\/2133601.2133623"},{"key":"18_CR20","series-title":"LNCS","first-page":"73","volume-title":"ESSoS 2011","author":"N Bielova","year":"2011","unstructured":"Bielova, N., Massacci, F.: Predictability of enforcement. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 73\u201386. Springer, Heidelberg (2011)"},{"key":"18_CR21","series-title":"LNCS","first-page":"240","volume-title":"MMM-ACNS 2012","author":"G Dini","year":"2012","unstructured":"Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: a multi-level anomaly detector for android malware. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 240\u2013253. Springer, Heidelberg (2012)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Delahaye, B., Caillaud, B., Legay, A.: Probabilistic contracts: a compositional reasoning methodology for the design of stochastic systems. In: 10th International Conference on Application of Concurrency to System Design (ACSD), 2010, IEEE (2010)","DOI":"10.1109\/ACSD.2010.13"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Hoang, X.A., Hu, J.: An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. In: 12th IEEE International Conferecence on Networks, ICON 2004. vol. 2, pp. 470\u2013474. IEEE (2004)","DOI":"10.1109\/ICON.2004.1409210"},{"issue":"4","key":"18_CR24","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TDSC.2008.69","volume":"7","author":"F Maggi","year":"2010","unstructured":"Maggi, F., Matteucci, M., Zanero, S.: Detecting intrusions through system call sequence and argument analysis. IEEE Trans. Dependable Secure Comput. 7(4), 381\u2013395 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"18_CR25","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"AP Koresow","year":"1997","unstructured":"Koresow, A.P.: Intrusion detection via system call traces. Software 14(5), 35\u201342 (1997)","journal-title":"Software"},{"key":"18_CR26","series-title":"LNCS","first-page":"416","volume-title":"Euro-Par 2011, Part II","author":"J Briffaut","year":"2012","unstructured":"Briffaut, J., Lefebvre, E., Rouzaud-Cornabas, J., Toinard, C.: PIGA-Virt: an advanced distributed MAC protection of virtual systems. In: Alexander, M., et al. (eds.) Euro-Par 2011, Part II. LNCS, vol. 7156, pp. 416\u2013425. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:33Z","timestamp":1746156633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}