{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:25:40Z","timestamp":1750501540343},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T00:00:00Z","timestamp":1719532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T00:00:00Z","timestamp":1719532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00875-3","type":"journal-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T03:52:10Z","timestamp":1719546730000},"page":"3007-3027","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Gaming the system: tetromino-based covert channel and its impact on mobile security"],"prefix":"10.1007","volume":"23","author":[{"given":"Efstratios","family":"Vasilellis","sequence":"first","affiliation":[]},{"given":"Vasileios","family":"Botsos","sequence":"additional","affiliation":[]},{"given":"Argiro","family":"Anagnostopoulou","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"key":"875_CR1","unstructured":"Check Point. Mobile Security Report 2021. Check Point. (2021). https:\/\/pages.checkpoint.com\/mobile-security-report-2021.html"},{"key":"875_CR2","unstructured":"Verizon. 2023 Mobile Security Index Report. Verizon. (2023). https:\/\/www.verizon.com\/business\/resources\/reports\/mobile-security-index-report.pdf"},{"key":"875_CR3","unstructured":"Malwarebytes. Trojan Dropper. https:\/\/www.malwarebytes.com\/blog\/detections\/trojan-dropper"},{"key":"875_CR4","unstructured":"Malwarebytes. Navigating mobile malware trends: Crucial insights and predictions for MSPs. Malwarebytes. (2023). https:\/\/www.malwarebytes.com\/blog\/business\/2023\/05\/navigating-mobile-malware-trends-crucial-insightsand-predictions-for-msps"},{"key":"875_CR5","unstructured":"Malwarebytes. 2023 State of Malware report. Malwarebytes. (2023). https:\/\/try.malwarebytes.com\/2023-state-of-malwaretyp-dl\/"},{"key":"875_CR6","unstructured":"Monica Anderson. Many smartphone owners don\u2019t take steps to secure their devices. Pew Research Center. 2017. https:\/\/www.pewresearch.org\/short-reads\/2017\/03\/15\/many-smartphone-owners-dont-take-steps-to-secure-their-devices\/"},{"issue":"2","key":"875_CR7","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201\u2013214 (2010). https:\/\/doi.org\/10.1109\/TIFS.2010.2041812","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"875_CR8","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1109\/TIP.2009.2021544","volume":"18","author":"L Zhang","year":"2009","unstructured":"Zhang, L., Wang, H., Wu, R.: A high-capacity steganography scheme for JPEG2000 baseline system. IEEE Trans. Image Process. 18(8), 1797\u20131803 (2009). https:\/\/doi.org\/10.1109\/TIP.2009.2021544","journal-title":"IEEE Trans. Image Process."},{"key":"875_CR9","unstructured":"Lee, J. H., and Wu, M. Y. : A reversible data hiding method for palette-based images with capacity optimization . In: Arabnia, H. R. (ed) Proceedings of the 2008 International Conference on Image Processing, Computer Vision, & Pattern Recognition, IPCV 2008, Las Vegas Nevada, USA, 2 Volumes. CSREA Press, pp. 95\u2013100 (2008)"},{"issue":"3","key":"875_CR10","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006). https:\/\/doi.org\/10.1109\/TCSVT.2006.869964","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"875_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/LSP.2008.2008951","volume":"16","author":"Y-S Chen","year":"2009","unstructured":"Chen, Y.-S., Wang, R.-Z.: Steganalysis of reversible contrast mapping watermarking. IEEE Signal Process. Lett. 16(2), 125\u2013128 (2009). https:\/\/doi.org\/10.1109\/LSP.2008.2008951","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"875_CR12","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TIFS.2010.2041826","volume":"5","author":"G Gul","year":"2010","unstructured":"Gul, G., Kurugollu, F.: SVD-based universal spatial domain image steganalysis. IEEE Trans. Inf. Forensics Secur. 5(2), 349\u2013353 (2010). https:\/\/doi.org\/10.1109\/TIFS.2010.2041826","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"875_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/LSP.2009.2035379","volume":"17","author":"J Zhang","year":"2010","unstructured":"Zhang, J., Zhang, D.: Detection of LSB Matching Steganography in Decompressed Images. IEEE Signal Process. Lett. 17(2), 141\u2013144 (2010). https:\/\/doi.org\/10.1109\/LSP.2009.2035379","journal-title":"IEEE Signal Process. Lett."},{"key":"875_CR14","doi-asserted-by":"publisher","unstructured":"Ashwaq, A., et\u00a0al.: Permission vs. app limiters: profiling smartphone users to understand differing strategies for mobile privacy management . In: Barbosa, S. D. J. et\u00a0al. (eds) CHI \u201922: CHI Conference on Human Factors in Computing Systems, New Orleans, 29 April 2022 - 5 May 2022. ACM, 2022, 406:1- 406:18. https:\/\/doi.org\/10.1145\/3491102.3517652","DOI":"10.1145\/3491102.3517652"},{"key":"875_CR15","unstructured":"Oberheide, J., Miller, C.: Dissecting the android bouncer. In: SummerCon2012, New York 95, 110 (2012)"},{"key":"875_CR16","doi-asserted-by":"publisher","unstructured":"Priyam, P., et\u00a0al.: On the effectiveness of random testing for Android: or how i learned to stop worrying and love the monkey . In: Bai, X., Jenny Li, J., Ulrich, A. (eds) Proceedings of the 13th International Workshop on Automation of Software Test, AST@ICSE 2018, Gothenburg, Sweden, 2018. ACM, 2018, pp. 34-37. https:\/\/doi.org\/10.1145\/3194733.3194742","DOI":"10.1145\/3194733.3194742"},{"key":"875_CR17","unstructured":"Blake Montgomery. Oklahoma 13-year-old believed to be first person ever to beat Tetris. The Guardian. 2024. https:\/\/www.theguardian.com\/technology\/2024\/jan\/03\/oklahoma-teen-beat-tetris-first-personwillis-gibson"},{"key":"875_CR18","doi-asserted-by":"publisher","unstructured":"Swarup, C., et\u00a0al.: Towards a systematic study of the covert channel attacks in smartphones . In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, 2014, Revised Selected Papers, Part I. Vol. 152. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, 2014, pp. 427-435 https:\/\/doi.org\/10.1007\/978-3-319-23829-6_29","DOI":"10.1007\/978-3-319-23829-6_29"},{"key":"875_CR19","doi-asserted-by":"crossref","unstructured":"Okhravi, H., Bak, S., King, S. T.: Design, implementation and evaluation of covert channel attacks. In: IEEE International Conference on Technologies for Homeland Security (HST). IEEE. 2010, 481\u2013487 (2010)","DOI":"10.1109\/THS.2010.5654967"},{"key":"875_CR20","unstructured":"Computer Security Resource Center (CSRC). Covert channel. National Institute of Standards and Technology (NIST). (2024). https:\/\/csrc.nist.gov\/glossary\/term\/covert channel"},{"issue":"4","key":"875_CR21","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474\u2013481 (1998). https:\/\/doi.org\/10.1109\/49.668971","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"875_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring Steganography: seeing the Unseen. Computer 31(2), 26\u201334 (1998). https:\/\/doi.org\/10.1109\/MC.1998.4655281","journal-title":"Computer"},{"key":"875_CR23","doi-asserted-by":"publisher","unstructured":"Serdar, C., Brodley, C. E., Clay, S.: IP covert timing channels: design and detection. In: Atluri, V., Pfitzmann, B., McDaniel, P. D. (eds) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, 2004. ACM, 2004, pp. 178\u2013187. https:\/\/doi.org\/10.1145\/1030083.1030108","DOI":"10.1145\/1030083.1030108"},{"issue":"10","key":"875_CR24","doi-asserted-by":"publisher","first-page":"6928","DOI":"10.1002\/INT.22868","volume":"37","author":"L Yuanzhang","year":"2022","unstructured":"Yuanzhang, L., et al.: A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10), 6928\u20136950 (2022). https:\/\/doi.org\/10.1002\/INT.22868","journal-title":"Int. J. Intell. Syst."},{"key":"875_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2020.101952","volume":"97","author":"J Han","year":"2020","unstructured":"Han, J., et al.: Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97, 101952 (2020). https:\/\/doi.org\/10.1016\/J.COSE.2020.101952","journal-title":"Comput. Secur."},{"key":"875_CR26","doi-asserted-by":"publisher","unstructured":"Kevin, L., Jana, D.: Covert channels in network time security. In: Manjunath, B. S. et\u00a0al. (eds) IH &MMSec \u201922: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, 2022. ACM, 2022, pp. 69\u201379. https:\/\/doi.org\/10.1145\/3531536.3532947","DOI":"10.1145\/3531536.3532947"},{"key":"875_CR27","doi-asserted-by":"publisher","unstructured":"Jie, L., et\u00a0al.: A timestamp-based covert data transmission method in industrial control system. In: 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, 2022. IEEE, 2022, pp. 526\u2013532. https:\/\/doi.org\/10.1109\/DSC55868.2022.00079","DOI":"10.1109\/DSC55868.2022.00079"},{"key":"875_CR28","doi-asserted-by":"publisher","unstructured":"Yunjing, X., et\u00a0al.: An exploration of L2 cache covert channels in virtualized environments . In: Cachin, C., Ristenpart, T. (eds) Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, 2011. ACM, 2011, pp. 29\u201340. https:\/\/doi.org\/10.1145\/2046660.2046670","DOI":"10.1145\/2046660.2046670"},{"key":"875_CR29","doi-asserted-by":"publisher","unstructured":"Cl\u00e9mentine, M., et\u00a0al.: C5: Cross-cores cache covert channel. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, Proceedings, Vol. 9148. Lecture Notes in Computer Science. Springer, 2015, pp. 46\u201364. https:\/\/doi.org\/10.1007\/978-3-319-20550-2_3https:\/\/doi.org\/10.1007\/978-3-319-20550-2%5C_3","DOI":"10.1007\/978-3-319-20550-2_3"},{"key":"875_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2021.102228","volume":"105","author":"G Stergiopoulos","year":"2021","unstructured":"Stergiopoulos, G., et al.: Dropping malware through sound injection: a comparative analysis on Android operating systems. Comput. Secur. 105, 102228 (2021). https:\/\/doi.org\/10.1016\/J.COSE.2021.102228","journal-title":"Comput. Secur."},{"key":"875_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2020.101721","volume":"91","author":"M Guri","year":"2020","unstructured":"Guri, M., Solewicz, Y.A., Elovici, Y.: Fansmitter: acoustic data exfiltration from air-Gapped computers via fans noise. Comput. Secur. 91, 101721 (2020). https:\/\/doi.org\/10.1016\/J.COSE.2020.101721","journal-title":"Comput. Secur."},{"key":"875_CR32","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/J.JISA.2019.02.004","volume":"46","author":"M Guri","year":"2019","unstructured":"Guri, M.: Optical air-gap exfiltration attack via invisible images. J. Inf. Secur. Appl. 46, 222\u2013230 (2019). https:\/\/doi.org\/10.1016\/J.JISA.2019.02.004","journal-title":"J. Inf. Secur. Appl."},{"key":"875_CR33","doi-asserted-by":"publisher","unstructured":"Mordechai, G.: Optical covert channel from air-gapped networks via remote orchestration of router\/switch LEDs . In: Brynielsson, J. (ed) European Intelligence and Security Informatics Conference, EISIC 2018, Karlskrona, Sweden, 2018. IEEE, 2018, pp. 54\u201360. https:\/\/doi.org\/10.1109\/EISIC.2018.00016","DOI":"10.1109\/EISIC.2018.00016"},{"key":"875_CR34","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/J.FUTURE.2021.03.025","volume":"122","author":"M Guri","year":"2021","unstructured":"Guri, M.: Exfiltrating data from airgapped computers via ViBrAtIoNs. Future Gener. Comput. Syst. 122, 69\u201381 (2021). https:\/\/doi.org\/10.1016\/J.FUTURE.2021.03.025","journal-title":"Future Gener. Comput. Syst."},{"key":"875_CR35","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TIFS.2019.2938404","volume":"15","author":"M Guri","year":"2020","unstructured":"Guri, M., Zadov, B., Elovici, Y.: ODINI: escaping sensitive data from Faraday- caged, air-gapped computers via magnetic fields. IEEE Trans. Inf. Forensics Secur. 15, 1190\u20131203 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2938404","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"875_CR36","unstructured":"Mordechai, G., Andrey, D., Yuval, E.: MAGNETO: covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. In: CoRR abs\/1802.02317 (2018). arXiv: 1802.02317"},{"key":"875_CR37","unstructured":"Mordechai, G., et\u00a0al.: BitWhisper: covert signaling channel between air-gapped computers using thermal manipulations . In: CoRR abs\/1503.07919 (2015). arXiv: 1503.07919"},{"key":"875_CR38","doi-asserted-by":"publisher","unstructured":"Mordechai, G.: HOTSPOT: crossing the air- gap between isolated PCs and nearby smartphones using temperature. In: European Intelligence and Security Informatics Conference, EISIC 2019, Oulu, Finland, November 26-27, 2019. IEEE (2019), pp. 94\u2013100. https:\/\/doi.org\/10.1109\/EISIC49498.2019.9108874","DOI":"10.1109\/EISIC49498.2019.9108874"},{"issue":"3","key":"875_CR39","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1109\/TDSC.2022.3186627","volume":"20","author":"M Guri","year":"2023","unstructured":"Guri, M.: AIR-FI: leaking data from air-gapped computers using Wi-Fi frequencies. IEEE Trans. Depend. Secur. Comput. 20(3), 2547\u20132564 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3186627","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"875_CR40","doi-asserted-by":"publisher","unstructured":"Mordechai, G.: RAMBO: Leaking secrets from air-gap computers by spelling covert radio signals from Computer RAM. In: Fritsch, L., Hassan, I., Paintsil, E. (eds) Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023, Proceedings. Vol. 14324. Lecture Notes in Computer Science. Springer, 2023, pp. 144\u2013161. https:\/\/doi.org\/10.1007\/978-3-031-47748-5_9","DOI":"10.1007\/978-3-031-47748-5_9"},{"issue":"1","key":"875_CR41","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/J.COSE.2005.12.001","volume":"25","author":"J C\u00e9sar","year":"2006","unstructured":"C\u00e9sar, J., Castro, H., et al.: Steganography in games: a general methodology and its application to the game of Go. Comput. Secur. 25(1), 64\u201371 (2006). https:\/\/doi.org\/10.1016\/J.COSE.2005.12.001","journal-title":"Comput. Secur."},{"issue":"1","key":"875_CR42","doi-asserted-by":"publisher","DOI":"10.1117\/1.3073979","volume":"18","author":"E-J Farn","year":"2009","unstructured":"Farn, E.-J., Chen, C.-C.: Novel steganographic method based on jig swap puzzle images. J. Electron. Imaging 18(1), 013003 (2009). https:\/\/doi.org\/10.1117\/1.3073979","journal-title":"J. Electron. Imaging"},{"issue":"7","key":"875_CR43","doi-asserted-by":"publisher","DOI":"10.1117\/1.3159872","volume":"48","author":"E-J Farn","year":"2009","unstructured":"Farn, E.-J., Chen, C.-C.: Jigsaw puzzle images for steganography. Opt. Eng. 48(7), 077006 (2009)","journal-title":"Opt. Eng."},{"key":"875_CR44","doi-asserted-by":"publisher","unstructured":"Zhan-He, O., Chen, L.-H.: A steganographic method based on tetris games. Inf. Sci. 276, 343\u2013353 (2014). https:\/\/doi.org\/10.1016\/J.INS.2013.12.024","DOI":"10.1016\/J.INS.2013.12.024"},{"issue":"6","key":"875_CR45","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1002\/SEC.99","volume":"2","author":"A Desoky","year":"2009","unstructured":"Desoky, A., Younis, M.F.: Chestega: chess steganography methodology. Secur. Commun. Netw. 2(6), 555\u2013566 (2009). https:\/\/doi.org\/10.1002\/SEC.99","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"875_CR46","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.1016\/J.JSS.2010.07.054","volume":"83","author":"H-L Lee","year":"2010","unstructured":"Lee, H.-L., Lee, C.-F., Chen, L.-H.: A perfect maze based steganographic method. J. Syst. Softw. 83(12), 2528\u20132535 (2010). https:\/\/doi.org\/10.1016\/J.JSS.2010.07.054","journal-title":"J. Syst. Softw."},{"key":"875_CR47","doi-asserted-by":"publisher","unstructured":"Philip C., Ritchey., Vernon, R.: Covert channels in combinatorial games. In: Riley, G. F., Quaglia, F., Himmelspach, J. (eds) International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS \u201912, Sirmione- Desenzano, Italy, 2012. ICST\/ACM, 2012, pp. 234\u2013241. https:\/\/doi.org\/10.4108\/ICST.SIMUTOOLS.2012.247733","DOI":"10.4108\/ICST.SIMUTOOLS.2012.247733"},{"key":"875_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.JISA.2016.11.005","volume":"32","author":"S Mahato","year":"2017","unstructured":"Mahato, S., Kumar Yadav, D., Ali Khan, D.: A minesweeper game-based steganography scheme. J. Inf. Secur. Appl. 32, 1\u201314 (2017). https:\/\/doi.org\/10.1016\/J.JISA.2016.11.005","journal-title":"J. Inf. Secur. Appl."},{"key":"875_CR49","unstructured":"Susmita, M.: Snake-Stega: A snake gamebased steganography scheme. In: 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC). IEEE (2023), pp. 167-171"},{"key":"875_CR50","unstructured":"\u015eATIR, E., G\u00fcner, K.: A snake game steganography method based on S-boxes. D\u00fczce \u00dcniversitesi Bilim ve Teknoloji Dergisi 5(1), 193\u2013209 (2017)"},{"issue":"1","key":"875_CR51","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TMC.2017.2696945","volume":"17","author":"W Qi","year":"2018","unstructured":"Qi, W., et al.: Construction and mitigation of user-behavior-based covert channels on smartphones. IEEE Trans. Mob. Comput. 17(1), 44\u201357 (2018). https:\/\/doi.org\/10.1109\/TMC.2017.2696945","journal-title":"IEEE Trans. Mob. Comput."},{"key":"875_CR52","doi-asserted-by":"publisher","unstructured":"Efthimios, A., Constantinos, P.: Hey doc, is this normal?: exploring android permissions in the post marshmallow era. In: Ali, S. S., Danger, J. L., Eisenbarth, T. (eds) Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Proceedings. Vol. 10662. Lecture Notes in Computer Science. Springer, 2017, pp. 53\u201373. https:\/\/doi.org\/10.1007\/978-3-319-71501-8_4","DOI":"10.1007\/978-3-319-71501-8_4"},{"key":"875_CR53","doi-asserted-by":"publisher","unstructured":"Adrienne, P. F., et\u00a0al.: Android permissions: user attention, comprehension, and behavior. In: Cranor L. F. (ed) Symposium On Usable Privacy and Security, SOUPS \u201912, Washington, 2012. ACM, 2012, p. 3.https:\/\/doi.org\/10.1145\/2335356.2335360","DOI":"10.1145\/2335356.2335360"},{"key":"875_CR54","doi-asserted-by":"publisher","unstructured":"Alexios, M., et\u00a0al.: A Qualitative metrics vector for the awareness of smartphone security users . In: Furnell, S., Lambrinoudakis, C., L\u00f3pez, J. (eds) Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, 2013. Proceedings. Vol. 8058. Lecture Notes in Computer Science. Springer, 2013, pp. 173\u2013184. https:\/\/doi.org\/10.1007\/978-3-642-40343-9_15","DOI":"10.1007\/978-3-642-40343-9_15"},{"key":"875_CR55","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/J.COSE.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013). https:\/\/doi.org\/10.1016\/J.COSE.2012.11.004","journal-title":"Comput. Secur."},{"key":"875_CR56","unstructured":"Michael. How to hack android mobile device remotely using metasploit framework. https:\/\/shell-terminal.medium.com\/how-to-hackandroid-mobile-device-remotely-using-metasploit-framework-db7ba2f6a27b"},{"key":"875_CR57","unstructured":"Will, G., John, P.: Cybercrime and espionage: an analysis of subversive multi-vector threats. Newnes (2011)"},{"key":"875_CR58","doi-asserted-by":"publisher","unstructured":"Ryan., F., Xinyuan, W.: CodeXt: automatic extraction of obfuscated attack code from memory dump. In: Chow, S. S. M. et\u00a0al. (eds) Information Security - 17th International Conference, ISC 2014, Hong Kong, China, 2014. Proceedings. Vol. 8783. Lecture Notes in Computer Science. Springer, 2014, pp. 502\u2013514. https:\/\/doi.org\/10.1007\/978-3-319-132570_32","DOI":"10.1007\/978-3-319-132570_32"},{"key":"875_CR59","unstructured":"Rapid 7. Polymorphic XOR Additive Feedback Encoder. https:\/\/www.rapid7.com\/db\/modules\/encoder\/x86\/shikata_ga_nai\/"},{"key":"875_CR60","unstructured":"Donald, E. K.: The art of computer programming, sorting and searching, Volume III, 2nd Edition. Addison-Wesley (1998). isbn: 0201896850. https:\/\/www.worldcat.org\/oclc\/312994415"},{"key":"875_CR61","unstructured":"Thomas., H., Cormen, et\u00a0al.: Introduction to Algorithms. MIT Press (2022)"},{"key":"875_CR62","unstructured":"Peter, D.: Rfc1951: Deflate compressed data format specification version 1.3. Tech. rep. (1996)"},{"key":"875_CR63","unstructured":"Peter, D.: GZIP file format specification version 4.3. Tech. rep. (1996)"},{"key":"875_CR64","unstructured":"Tetris, W.: TGM randomizer. Tetris Fandom. https:\/\/tetris.fandom.com\/wiki\/TGM_randomizer%7D"},{"key":"875_CR65","doi-asserted-by":"crossref","unstructured":"Nick, T., et\u00a0al.: A taxonomy of side channel attacks on critical infrastructures and relevant systems . In: Critical Infrastructure Security and Resilience: Theories, Methods, Tools and Technologies (2019), pp. 283\u2013313","DOI":"10.1007\/978-3-030-00024-0_15"},{"key":"875_CR66","doi-asserted-by":"publisher","unstructured":"Gritzalis, D., et\u00a0al.: Exiting the risk assessment maze: a meta-survey. ACM Comput. Surv. 51(1), 11:1-11:30 (2018).https:\/\/doi.org\/10.1145\/3145905","DOI":"10.1145\/3145905"},{"key":"875_CR67","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/J.JISA.2018.07.003","volume":"42","author":"S Bhandari","year":"2018","unstructured":"Bhandari, S., et al.: SWORD: semantic aWare andrOid malwaRe detector. J. Inf. Secur. Appl. 42, 46\u201356 (2018). https:\/\/doi.org\/10.1016\/J.JISA.2018.07.003","journal-title":"J. Inf. Secur. Appl."},{"key":"875_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2020.113581","volume":"159","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., Emmanuel, S.: GSDroid: graph signal based compact feature representation for android malware detection. Expert Syst. Appl. 159, 113581 (2020). https:\/\/doi.org\/10.1016\/J.ESWA.2020.113581","journal-title":"Expert Syst. Appl."},{"key":"875_CR69","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1111\/EXSY.12611","volume":"38","author":"S Jan","year":"2021","unstructured":"Jan, S., et al.: Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst. J. Knowl. Eng. 38, 4 (2021). https:\/\/doi.org\/10.1111\/EXSY.12611","journal-title":"Expert Syst. J. Knowl. Eng."},{"key":"875_CR70","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/J.NEUCOM.2017.08.072","volume":"280","author":"H Papadopoulos","year":"2018","unstructured":"Papadopoulos, H., et al.: Android malware detection with unbiased confidence guarantees. Neurocomputing 280, 3\u201312 (2018). https:\/\/doi.org\/10.1016\/J.NEUCOM.2017.08.072","journal-title":"Neurocomputing"},{"key":"875_CR71","doi-asserted-by":"publisher","first-page":"30996","DOI":"10.1109\/ACCESS.2018.2844349","volume":"6","author":"P Feng","year":"2018","unstructured":"Feng, P., et al.: A novel dynamic android malware detection system with ensemble learning. IEEE Access 6, 30996\u201331011 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2844349","journal-title":"IEEE Access"},{"key":"875_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2020.101743","volume":"92","author":"M Jerbi","year":"2020","unstructured":"Jerbi, M., et al.: On the use of artificial malicious patterns for android malware detection. Comput. Secur. 92, 101743 (2020). https:\/\/doi.org\/10.1016\/J.COSE.2020.101743","journal-title":"Comput. Secur."},{"key":"875_CR73","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/J.NEUCOM.2020.08.095","volume":"456","author":"JG Puerta","year":"2021","unstructured":"Puerta, J.G., et al.: Detecting malicious Android applications based on the network packets generated. Neurocomputing 456, 629\u2013636 (2021). https:\/\/doi.org\/10.1016\/J.NEUCOM.2020.08.095","journal-title":"Neurocomputing"},{"key":"875_CR74","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/J.JPDC.2019.11.001","volume":"137","author":"G D\u2019Angelo","year":"2020","unstructured":"D\u2019Angelo, G., Ficco, M., Palmieri, F.: Malware detection in mobile environments based on Autoencoders and API-images. J. Parallel Distrib. Comput. 137, 26\u201333 (2020). https:\/\/doi.org\/10.1016\/J.JPDC.2019.11.001","journal-title":"J. Parallel Distrib. Comput."},{"key":"875_CR75","doi-asserted-by":"publisher","unstructured":"Abada. A., et\u00a0al.: Android Malware detection based on system calls analysis and CNN classification. In: 2019 IEEE Wireless Communications and Networking Conference Workshop, WCNC Workshops 2019, Marrakech, Morocco, April 15\u201318, 2019. IEEE, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/WCNCW.2019.8902627. url: https:\/\/doi.org\/10.1109\/WCNCW.2019.8902627","DOI":"10.1109\/WCNCW.2019.8902627"},{"key":"875_CR76","unstructured":"James, T., Thomas, B., David, B.: Practical lossless compression with latent variables using bits back coding. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans (2019). OpenReview.net, 2019. https:\/\/openreview.net\/forum?id=ryE98iR5tm"},{"key":"875_CR77","unstructured":"James, T., Thomas, B., David, B.: Practical lossless compression with latent variables using bits back coding . In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans (2019). OpenReview.net (2019). https:\/\/openreview.net\/forum?id=ryE98iR5tm"},{"key":"875_CR78","doi-asserted-by":"crossref","unstructured":"Jarek, D.: Asymmetric numeral systems. In: CoRR abs\/0902.0271 (2009). arXiv: 0902.0271","DOI":"10.1055\/s-0029-1217479"},{"key":"875_CR79","unstructured":"Kaspersky.: Kaspersky discloses iPhone hardware feature vital in Operation Triangulation case. Kaspersky. https:\/\/www.kaspersky.com\/about\/press-releases\/2023_kasperskydiscloses- iphone-hardware-feature-vitalin- operation-triangulation-case%7D"},{"key":"875_CR80","unstructured":"Zack, W.: Russian malware controls hiding in plain sight -on Britney Spears\u2019 Instagram page. ZDNET. https:\/\/www.zdnet.com\/article\/russian-malware-controls-hiding-in-plain-sight-on-britney-spears-instagram-account\/%7D"},{"key":"875_CR81","unstructured":"Catalin, C.: Russian state hackers use britney spears instagram posts to control Malware. BleepingComputer. https:\/\/www.bleepingcomputer.com\/news\/security\/russian-state-hackers-use-britney-spears-instagram-posts-to-control-malware\/%7D"},{"key":"875_CR82","unstructured":"Android. Cloud-based protections. Google. url: https:\/\/developers.google.com\/android\/play-protect\/cloud-based-protections%7D"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00875-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00875-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00875-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:21:22Z","timestamp":1721013682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00875-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,28]]},"references-count":82,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["875"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00875-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,28]]},"assertion":[{"value":"28 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the authors have received a speaker honorarium from any company. All authors declare that none of them has any Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}