{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:31:41Z","timestamp":1775071901555,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s00607-021-00954-6","type":"journal-article","created":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T11:20:11Z","timestamp":1621509611000},"page":"2643-2665","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Blockchain-based public ecosystem for auditing security of software applications"],"prefix":"10.1007","volume":"103","author":[{"given":"Qinwen","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9607-376X","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,20]]},"reference":[{"key":"954_CR1","unstructured":"McGee MK (2015) FBI alerts hospital to malware incident. https:\/\/www.databreachtoday.com\/fbi-alerts-hospital-to-malware-incident-a-8710"},{"key":"954_CR2","doi-asserted-by":"crossref","unstructured":"Suryani V, Sulistyo S, Widyawan W (2017) Internet of Things (IoT) framework for granting trust among objects. J Inf Process Syst 13(6)","DOI":"10.11591\/ijece.v6i5.9678"},{"key":"954_CR3","unstructured":"Cimpanu C (2017) HummingBad Android malware found in 20 Google Play Store apps. https:\/\/www.bleepingcomputer.com\/news\/security\/hummingbad-android-malware-found-in-20-google-play-store-apps\/#:~:text=Catalin%20Cimpanu&text=HummingBad%2C%20an%20Android%20malware%20estimated,Store%2C%20passing%20Google\u2019s%20security%20checks"},{"key":"954_CR4","unstructured":"Lakeshmanan R (2019) \u2018Agent Smith\u2019 malware replaces legit android apps with fake ones on 25 million devices. https:\/\/thenextweb.com\/news\/agent-smith-malware-replaces-legit-android-apps-with-fake-ones-on-25-million-devices"},{"key":"954_CR5","unstructured":"Cimpanu C (2018) Malware found in arch linux aur package repository. https:\/\/www.bleepingcomputer.com\/news\/security\/malware-found-in-arch-linux-aur-package-repository\/#:~:text=Catalin%20Cimpanu&text=Malware%20has%20been%20discovered%20in,intervention%20of%20the%20AUR%20team"},{"key":"954_CR6","unstructured":"SophosLabs, \u201cwho\u2019s your verisign?\u201d\u2014malware faking digital signatures (2010). https:\/\/nakedsecurity.sophos.com\/2010\/06\/23\/trojbhoqp-verisign"},{"key":"954_CR7","doi-asserted-by":"publisher","first-page":"3886","DOI":"10.1109\/TIFS.2020.3003571","volume":"15","author":"D Li","year":"2020","unstructured":"Li D, Li Q (2020) Adversarial deep ensemble: evasion attacks and defenses for malware detection. IEEE Trans Inf Forensics Secur 15:3886\u20133900","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"954_CR8","doi-asserted-by":"crossref","unstructured":"Chen Y, Shan Z, Liu F, Liang G, Zhao B, Li X, Qiao M (2019) A gene-inspired malware detection approach. In: Journal of physics: conference series, vol. 1168. IOP Publishing, p 062004","DOI":"10.1088\/1742-6596\/1168\/6\/062004"},{"issue":"3","key":"954_CR9","doi-asserted-by":"publisher","first-page":"3529","DOI":"10.1007\/s11042-018-6498-z","volume":"78","author":"Q Zhou","year":"2019","unstructured":"Zhou Q, Feng F, Shen Z, Zhou R, Hsieh M-Y, Li K-C (2019) A novel approach for mobile malware classification and detection in Android systems. Multimed Tools Appl 78(3):3529\u20133552","journal-title":"Multimed Tools Appl"},{"key":"954_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2014.11.001","volume":"49","author":"KO Elish","year":"2015","unstructured":"Elish KO, Shu X, Yao DD, Ryder BG, Jiang X (2015) Profiling user-trigger dependence for Android malware detection. Comput Secur 49:255\u2013273","journal-title":"Comput Secur"},{"key":"954_CR11","doi-asserted-by":"crossref","unstructured":"Mahindru A, Singh P (2017) Dynamic permissions based Android malware detection using machine learning techniques. In: Proceedings of the 10th innovations in software engineering conference. ACM, pp 202\u2013210","DOI":"10.1145\/3021460.3021485"},{"key":"954_CR12","doi-asserted-by":"crossref","unstructured":"Isohara T, Takemori K, Kubota A (2011) Kernel-based behavior analysis for Android malware detection. In: 2011 Seventh international conference on computational intelligence and security. IEEE, pp 1011\u20131015","DOI":"10.1109\/CIS.2011.226"},{"issue":"2","key":"954_CR13","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","volume":"16","author":"G Suarez-Tangil","year":"2013","unstructured":"Suarez-Tangil G, Tapiador JE, Peris-Lopez P, Ribagorda A (2013) Evolution, detection and analysis of malware for smart devices. IEEE Commun Surv Tutor 16(2):961\u2013987","journal-title":"IEEE Commun Surv Tutor"},{"key":"954_CR14","doi-asserted-by":"crossref","unstructured":"Barrera D, Kayacik HG, Van\u00a0Oorschot PC, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM conference on Computer and communications security. ACM, pp 73\u201384","DOI":"10.1145\/1866307.1866317"},{"key":"954_CR15","doi-asserted-by":"crossref","unstructured":"Nataraj L, Karthikeyan S, Jacob G, Manjunath B (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security. ACM, p\u00a04","DOI":"10.1145\/2016904.2016908"},{"key":"954_CR16","doi-asserted-by":"crossref","unstructured":"Kalash M, Rochan M, Mohammed N, Bruce ND, Wang Y, Iqbal F (2018) Malware classification with deep convolutional neural networks. In: 2018 9th IFIP international conference on new technologies. Mobility and security (NTMS). IEEE, pp 1\u20135","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"954_CR17","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman S, Alazab M, Vinayakumar R (2019) A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl 47:377\u2013389","journal-title":"J Inf Secur Appl"},{"key":"954_CR18","doi-asserted-by":"crossref","unstructured":"Wang C, Ding J, Guo T, Cui B (2017) A malware detection method based on sandbox, binary instrumentation and multidimensional feature extraction. In: International conference on broadband and wireless computing. Springer, Communication and Applications, pp 427\u2013438","DOI":"10.1007\/978-3-319-69811-3_39"},{"key":"954_CR19","unstructured":"\u010cisar P, Joksimovi\u0107 D (2019) Heuristic scanning and sandbox approach in malware detection. Archibald Reiss Days 9(2)"},{"issue":"4","key":"954_CR20","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TDSC.2012.36","volume":"9","author":"Z Shan","year":"2012","unstructured":"Shan Z, Wang X, Chiueh T (2012) Enforcing mandatory access control in commodity os to disable malware. IEEE Trans Dependable Secure Comput 9(4):541\u2013555","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"954_CR21","doi-asserted-by":"crossref","unstructured":"Xing L, Pan X, Wang R, Yuan K, Wang X (2014) Upgrading your Android, elevating my malware: privilege escalation through mobile OS updating. In: 2014 IEEE symposium on security and privacy. IEEE, pp 393\u2013408","DOI":"10.1109\/SP.2014.32"},{"key":"954_CR22","doi-asserted-by":"crossref","unstructured":"Drew J, Moore T, Hahsler M (2016) Polymorphic malware detection using sequence classification methods. In: 2016 IEEE security and privacy workshops (SPW). IEEE, pp 81\u201387","DOI":"10.1109\/SPW.2016.30"},{"key":"954_CR23","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s13635-017-0055-6","volume":"1","author":"J Drew","year":"2017","unstructured":"Drew J, Hahsler M, Moore T (2017) Polymorphic malware detection using sequence classification methods and ensembles. EURASIP J Inf Secur 1:2","journal-title":"EURASIP J Inf Secur"},{"key":"954_CR24","doi-asserted-by":"crossref","unstructured":"Alzaylaee MK, Yerima SY, Sezer S (2017) Emulator vs real phone: Android malware detection using machine learning. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. ACM, pp 65\u201372","DOI":"10.1145\/3041008.3041010"},{"key":"954_CR25","doi-asserted-by":"crossref","unstructured":"Chin E, Felt AP, Greenwood K, Wagner D (2011) Analyzing inter-application communication in Android. In: Proceedings of the 9th international conference on mobile systems, applications, and services. ACM, pp 239\u2013252","DOI":"10.1145\/1999995.2000018"},{"issue":"2","key":"954_CR26","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s00521-017-3077-6","volume":"31","author":"D Yuxin","year":"2019","unstructured":"Yuxin D, Siyi Z (2019) Malware detection based on deep learning algorithm. Neural Comput Appl 31(2):461\u2013472","journal-title":"Neural Comput Appl"},{"key":"954_CR27","unstructured":"Demetrio L, Biggio B, Lagorio G, Roli F, Armando A, Explaining vulnerabilities of deep learning to adversarial malware binaries. arXiv:1901.03583"},{"key":"954_CR28","doi-asserted-by":"crossref","unstructured":"Srivastava V, Biswas B (2018) Mining on the basis of similarity in graph and image data. In: International conference on advanced informatics for computing research. Springer, pp 193\u2013203","DOI":"10.1007\/978-981-13-3143-5_17"},{"key":"954_CR29","doi-asserted-by":"crossref","unstructured":"Ali M, Shiaeles S, Papadaki M, Ghita BV (2018) Agent-based vs agent-less sandbox for dynamic behavioral analysis. In: 2018 Global information infrastructure and networking symposium (GIIS). IEEE, pp 1\u20135","DOI":"10.1109\/GIIS.2018.8635598"},{"key":"954_CR30","doi-asserted-by":"crossref","unstructured":"Jain S, Choudhury T, Kumar V, Kumar P (2018) Detecting malware and analysing using sandbox evasion. In: 2018 International conference on communication, computing and internet of things (IC3IoT). IEEE, pp 111\u2013116","DOI":"10.1109\/IC3IoT.2018.8668149"},{"key":"954_CR31","doi-asserted-by":"crossref","unstructured":"Darshan SS, Kumara MA, Jaidhar C (2016) Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm. In: 2016 11th international conference on industrial and information systems (ICIIS). IEEE, pp 534\u2013539","DOI":"10.1109\/ICIINFS.2016.8262998"},{"key":"954_CR32","doi-asserted-by":"crossref","unstructured":"Du Y, Liu C, Su Z (2019) Detection and suppression of malware based on consortium blockchain. In: IOP conference series: materials science and engineering, vol. 490. IOP Publishing, p 042031","DOI":"10.1088\/1757-899X\/490\/4\/042031"},{"key":"954_CR33","unstructured":"Herbert J, Litchfield A (2015) A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Proceedings of the 38th Australasian computer science conference (ACSC 2015), vol.\u00a027. p\u00a030"},{"key":"954_CR34","doi-asserted-by":"crossref","unstructured":"Homayoun S, Dehghantanha A, Parizi RM, Choo K-KR (2019) A blockchain-based framework for detecting malicious mobile applications in app stores. In: 2019 IEEE Canadian conference of electrical and computer engineering (CCECE). IEEE, pp 1\u20134","DOI":"10.1109\/CCECE.2019.8861782"},{"key":"954_CR35","unstructured":"Doffman Z (2019) Cybercrime: 25% of all malware targets financial services, credit card fraud up 200% . https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/04\/29\/new-cyber-report-25-of-all-malware-hits-financial-services-card-fraud-up-200\/#47ec59807a47"},{"key":"954_CR36","unstructured":"Ashford W (2013) Malware hits US power plants. https:\/\/www.computerweekly.com\/news\/2240176164\/Two-US-power-plants-hit-by-malware"},{"issue":"4","key":"954_CR37","doi-asserted-by":"publisher","first-page":"6835","DOI":"10.1109\/JIOT.2019.2911969","volume":"6","author":"G Kumar","year":"2019","unstructured":"Kumar G, Saha R, Rai MK, Thomas R, Kim T-H (2019) Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J 6(4):6835\u20136842","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"954_CR38","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2659897","volume":"57","author":"B Laurie","year":"2014","unstructured":"Laurie B (2014) Certificate transparency. Commun ACM 57(10):40\u201346","journal-title":"Commun ACM"},{"key":"954_CR39","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference. pp 1\u201315","DOI":"10.1145\/3190508.3190538"},{"key":"954_CR40","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jpdc.2020.03.012","volume":"141","author":"G Xiao","year":"2020","unstructured":"Xiao G, Li J, Chen Y, Li K (2020) Malfcs: an effective malware classification framework with automated feature extraction based on deep convolutional neural networks. J Parallel Distrib Comput 141:49\u201358","journal-title":"J Parallel Distrib Comput"},{"issue":"2","key":"954_CR41","first-page":"013","volume":"9","author":"P Agrawal","year":"2020","unstructured":"Agrawal P, Trivedi B (2020) Automating the process of browsing and downloading apk files as a prerequisite for the malware detection process. Int J Emerg Trends Technol Comput Sci (IJETTCS) 9(2):013\u2013017","journal-title":"Int J Emerg Trends Technol Comput Sci (IJETTCS)"},{"key":"954_CR42","unstructured":"AV-test, Av test the idndependent it-security insitute (2020). https:\/\/www.av-test.org\/en\/"},{"key":"954_CR43","unstructured":"Cunningham E (2017) Keeping you safe with google play protect. https:\/\/support.google.com\/googleplay\/answer\/2812853?hl=en"},{"key":"954_CR44","doi-asserted-by":"crossref","unstructured":"Spathoulas G, Collen A, Pandey P, Nijdam NA, Katsikas S, Kouzinopoulos CS, Moussa MB, Giannoutakis KM, Votis K, Tzovaras D (2018) Towards reliable integrity in blacklisting: facing malicious IPs in ghost smart contracts. In: 2018 innovations in intelligent systems and applications (INISTA). IEEE, pp 1\u20138","DOI":"10.1109\/INISTA.2018.8466327"},{"key":"954_CR45","unstructured":"Huang C, Wang Z, Chen H, Hu Q, Zhang Q, Wang W, Guan X Repchain: a reputation based secure, fast and high incentive blockchain system via sharding. arXiv:1901.05741"},{"key":"954_CR46","unstructured":"Pereira S, Satish S (2013) Communication-based host reputation system, US Patent 8,381,289"},{"key":"954_CR47","unstructured":"Microsoft, Microsoft malware classification challenge (big 2015) (2018). https:\/\/www.kaggle.com\/c\/malware-classification"},{"key":"954_CR48","unstructured":"Siriwardena P (2017) The mystery behind block time. https:\/\/medium.facilelogin.com\/the-mystery-behind-block-time-63351e35603a"},{"key":"954_CR49","doi-asserted-by":"publisher","first-page":"102078","DOI":"10.1016\/j.cose.2020.102078","volume":"100","author":"M Dabbagh","year":"2021","unstructured":"Dabbagh M, Choo K-KR, Beheshti A, Tahir M, Safa NS (2021) A survey of empirical performance evaluation of permissioned blockchain platforms: challenges and opportunities. Comput Secur 100:102078","journal-title":"Comput Secur"},{"key":"954_CR50","doi-asserted-by":"crossref","unstructured":"Zhang J, Gao J, Wu Z, Yan W, Wo Q, Li Q, Chen Z (2019) Performance analysis of the libra blockchain: an experimental study. In: 2019 2nd International conference on hot information-centric networking (HotICN). IEEE, pp 77\u201383","DOI":"10.1109\/HotICN48464.2019.9063213"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-00954-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-021-00954-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-00954-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T03:58:51Z","timestamp":1672199931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-021-00954-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,20]]},"references-count":50,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["954"],"URL":"https:\/\/doi.org\/10.1007\/s00607-021-00954-6","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,20]]},"assertion":[{"value":"15 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}