{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:40:04Z","timestamp":1750502404539,"version":"3.41.0"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":10,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Athens University of Economics & Business"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The increasing complexity of Android malware has increased the need for efficient detection methods. Researchers have introduced new frameworks for analyzing Android malware in response to the growing threat of malicious applications. Traditional static analysis methods, which are widely used, are susceptible to obfuscation and can be bypassed easily. However, although dynamic analysis is more resilient, it is computationally intensive and costly to implement. In this paper, we introduce MalWave, a novel approach that uses audio signal processing to detect Android malware by converting Dalvik Executable (DEX) file sequences into audio signals. The extracted audio fingerprints are used as features for classification, addressing (i) malware detection, (ii) family classification, and (iii) packed malware detection. Evaluated on the AMD and AndroZoo datasets, MalWave achieves an F1+ score of 82.6% for malware detection and 68.7% for family classification, particularly in mostly represented categories. Despite challenges in detecting packed malware, MalWave demonstrates high computational efficiency, with feature extraction taking just 0.3 seconds on average per sample, making it a suitable tool for real-time detection in resource-constrained environments.<\/jats:p>","DOI":"10.1007\/s10207-025-01073-5","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T10:11:45Z","timestamp":1749636705000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The sound of malware: an audio fingerprinting malware detection method"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7759-4810","authenticated-orcid":false,"given":"Efstratios","family":"Vasilellis","sequence":"first","affiliation":[]},{"given":"Thanos","family":"Katsiolis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7793-6128","authenticated-orcid":false,"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5336-6765","authenticated-orcid":false,"given":"George","family":"Stergiopoulos","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Sotiriou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"1073_CR1","unstructured":"Statista. Number of smartphone users worldwide from 2014 to 2029. https:\/\/www.statista.com\/forecasts\/1143723\/smartphone-users-in-the-world. Accessed: 2024-03-04. (2024)"},{"key":"1073_CR2","unstructured":"CheckPoint. What Are The Top Mobile Security Trends For 2022? https:\/\/www.checkpoint.com\/cyber-hub\/threat-prevention\/what-is-mobile-security\/mobile-security-trends-in-2022\/. Accessed: 2024-03-04. (2023)"},{"key":"1073_CR3","doi-asserted-by":"publisher","unstructured":"Lella, I., et al.: ENISA Threat Landscape 2023. Tech. rep., European Union Agency for Cybersecurity (ENISA), Attiki (2023). https:\/\/doi.org\/10.2824\/782573","DOI":"10.2824\/782573"},{"key":"1073_CR4","unstructured":"Lecigne, C., Resell, C.: Protecting Android users from 0-Day attacks. https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\/. Accessed: 2024-03-05. (2022)"},{"key":"1073_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2021.102228","volume":"105","author":"G Stergiopoulos","year":"2021","unstructured":"Stergiopoulos, G., et al.: Dropping malware through sound injection: A comparative analysis on Android operating systems. Comput. Secur. 105, 102228 (2021). https:\/\/doi.org\/10.1016\/J.COSE.2021.102228","journal-title":"Comput. Secur."},{"issue":"4","key":"1073_CR6","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1007\/S10207-024-00875-3","volume":"23","author":"E Vasilellis","year":"2024","unstructured":"Vasilellis, E., et al.: Gaming the system: tetromino-based covert channel and its impact on mobile security. Int. J. Inf. Sec. 23(4), 3007\u20133027 (2024). https:\/\/doi.org\/10.1007\/S10207-024-00875-3","journal-title":"Int. J. Inf. Sec."},{"issue":"5","key":"1073_CR7","doi-asserted-by":"publisher","first-page":"3369","DOI":"10.1007\/S10207-024-00893-1","volume":"23","author":"E Vasilellis","year":"2024","unstructured":"Vasilellis, E., Gkionis, G., Gritzalis, D.: Press play, install malware: a study of rhythm game-based malware dropping. Int. J. Inf. Sec. 23(5), 3369\u20133391 (2024). https:\/\/doi.org\/10.1007\/S10207-024-00893-1","journal-title":"Int. J. Inf. Sec."},{"key":"1073_CR8","unstructured":"Statista. Global market share held by mobile operating systems from 2009 to 2023, by quarter. https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/. Accessed: 2024-03-04. 2024"},{"key":"1073_CR9","unstructured":"Statista. Annual number of app downloads from the Google Play Store worldwide from 2016 to 2022. https:\/\/www.statista.com\/statistics\/734332\/google-play-app-installs-per-year\/. Accessed: 2024-03-04. (2023)"},{"key":"1073_CR10","unstructured":"Statista. Number of apps available in leading app stores as of 3rd quarter 2022. https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/. Accessed: 2024-03-04. (2023)"},{"key":"1073_CR11","unstructured":"Android. Cloud-based Protections. https:\/\/developers.google.com\/android\/play-protect\/cloud-based-protections. Accessed: 2024-07-19. Google"},{"key":"1073_CR12","unstructured":"Mayachitra. MalSee: Using vision to detect malware. https:\/\/malsee.mayachitra.com\/myapp\/. Accessed: 2024-03-04. (2023)"},{"key":"1073_CR13","unstructured":"Sullivan, K.: MalSee: Using vision, hearing, and other features to detect malware, Navy SBIR FY2015.1. https:\/\/www.navysbir.com\/15_1\/100.htm. Accessed: 2024-03-04. (2015)"},{"key":"1073_CR14","unstructured":"Spadafora, A.: US government is working on mysterious malware detection project. https:\/\/www.techradar.com\/news\/us-government-is-working-on-mysterious-malware-detection-project. Accessed: 2024-03-04. (2019)"},{"issue":"17","key":"1073_CR15","doi-asserted-by":"publisher","first-page":"5465","DOI":"10.3390\/s24175465","volume":"24","author":"A Allen","year":"2024","unstructured":"Allen, A., et al.: Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices. Sensors 24(17), 5465 (2024). https:\/\/doi.org\/10.3390\/s24175465","journal-title":"Sensors"},{"key":"1073_CR16","unstructured":"Raff, E., et al.: \u201cMalware Detection by Eating a Whole EXE\u201d. In: The Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, Louisiana, USA, February 2-7, 2018. Vol.\u00a0WS-18. AAAI Technical Report. AAAI Press, 268\u2013276. (2018). https:\/\/aaai.org\/ocs\/index.php\/WS\/AAAIW18\/paper\/view\/16422"},{"key":"1073_CR17","unstructured":"van den Oord, A. et al.: \u201cWaveNet: A Generative Model for Raw Audio\u201d. In: The 9th ISCA Speech Synthesis Workshop, SSW 2016, Sunnyvale, CA, USA, September 13-15, 2016. Ed. by Alan W. Black. ISCA, 125. (2016). https:\/\/www.isca-archive.org\/ssw%5C_2016\/vandenoord16%5C_ssw.html"},{"key":"1073_CR18","doi-asserted-by":"crossref","unstructured":"D. Gritzalis, K.R. Choo, C. Patsakis, eds. Malware: Handbook of Prevention and Detection. Advanced in Information Security. Cham: Springer International Publishing, (2024)","DOI":"10.1007\/978-3-031-66245-4"},{"key":"1073_CR19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2017.04.007","volume":"74","author":"K Pipyros","year":"2018","unstructured":"Pipyros, K., et al.: A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. Comput. Secur. 74, 371\u2013383 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.04.007","journal-title":"Comput. Secur."},{"key":"1073_CR20","doi-asserted-by":"publisher","unstructured":"Xu, Z., et al.: \u201cCDGDroid: Android Malware Detection Based on Deep Learning Using CFG and DFG\u201d. In: Formal Methods and Software Engineering - 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Ed. by Jing Sun and Meng Sun. Vol.\u00a011232. Lecture Notes in Computer Science. Springer, (2018), pp.\u00a0177\u2013193. https:\/\/doi.org\/10.1007\/978-3-030-02450-5_11","DOI":"10.1007\/978-3-030-02450-5_11"},{"issue":"22","key":"1073_CR21","doi-asserted-by":"publisher","first-page":"7975","DOI":"10.3390\/app10227975","volume":"10","author":"G Iadarola","year":"2020","unstructured":"Iadarola, G., et al.: Call graph and model checking for fine-grained android malicious behaviour detection. Appl. Sci. 10(22), 7975 (2020)","journal-title":"Appl. Sci."},{"key":"1073_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102995","volume":"63","author":"D\u00d6 Sahin","year":"2021","unstructured":"Sahin, D.\u00d6., et al.: Permission-based Android malware analysis by using dimension reduction with PCA and LDA. J. Inf. Secur. Appl. 63, 102995 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102995","journal-title":"J. Inf. Secur. Appl."},{"key":"1073_CR23","doi-asserted-by":"publisher","first-page":"69246","DOI":"10.1109\/ACCESS.2019.2919796","volume":"7","author":"Hanqing Zhang","year":"2019","unstructured":"Zhang, Hanqing, et al.: An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis. IEEE Access 7, 69246\u201369256 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2919796","journal-title":"IEEE Access"},{"issue":"4","key":"1073_CR24","doi-asserted-by":"publisher","first-page":"6668","DOI":"10.1109\/JIOT.2019.2909745","volume":"6","author":"Tao Lei","year":"2019","unstructured":"Lei, Tao, et al.: EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4), 6668\u20136680 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2909745","journal-title":"IEEE Internet Things J."},{"key":"1073_CR25","doi-asserted-by":"publisher","first-page":"30996","DOI":"10.1109\/ACCESS.2018.2844349","volume":"6","author":"Pengbin Feng","year":"2018","unstructured":"Feng, Pengbin, et al.: A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access 6, 30996\u201331011 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2844349","journal-title":"IEEE Access"},{"key":"1073_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101743","volume":"92","author":"Manel Jerbi","year":"2020","unstructured":"Jerbi, Manel, et al.: On the use of artificial malicious patterns for android malware detection. Comput. Secur. 92, 101743 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101743","journal-title":"Comput. Secur."},{"key":"1073_CR27","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jisa.2018.07.003","volume":"42","author":"Shweta Bhandari","year":"2018","unstructured":"Bhandari, Shweta, et al.: SWORD: Semantic aWare andrOid malwaRe Detector. J. Inf. Secur. Appl. 42, 46\u201356 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.07.003","journal-title":"J. Inf. Secur. Appl."},{"key":"1073_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113581","volume":"159","author":"Roopak Surendran","year":"2020","unstructured":"Surendran, Roopak, Thomas, Tony, Emmanuel, Sabu: GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection. Expert Syst. Appl. 159, 113581 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2020.113581","journal-title":"Expert Syst. Appl."},{"key":"1073_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.neucom.2017.08.072","volume":"280","author":"Harris Papadopoulos","year":"2018","unstructured":"Papadopoulos, Harris, et al.: Android malware detection with unbiased confidence guarantees. Neurocomputing 280, 3\u201312 (2018). https:\/\/doi.org\/10.1016\/j.neucom.2017.08.072","journal-title":"Neurocomputing"},{"key":"1073_CR30","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","volume":"77","author":"Sang Ni","year":"2018","unstructured":"Ni, Sang, Qian, Quan, Zhang, Rui: Malware identification using visualization images and deep learning. Comput. Secur. 77, 871\u2013885 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.04.005","journal-title":"Comput. Secur."},{"issue":"1","key":"1073_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-014-0242-0","volume":"14","author":"Kyoung-Soo Han","year":"2015","unstructured":"Han, Kyoung-Soo., et al.: Malware analysis using visualized images and entropy graphs. Int. J. Inf. Sec. 14(1), 1\u201314 (2015). https:\/\/doi.org\/10.1007\/s10207-014-0242-0","journal-title":"Int. J. Inf. Sec."},{"issue":"18","key":"1073_CR32","doi-asserted-by":"publisher","first-page":"11499","DOI":"10.1007\/s00521-021-05816-y","volume":"33","author":"K Bakour","year":"2021","unstructured":"Bakour, K., Murat \u00dcnver, H.: DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques. Neural Comput. Appl. 33(18), 11499\u201311516 (2021). https:\/\/doi.org\/10.1007\/s00521-021-05816-y","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"1073_CR33","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11416-019-00346-7","volume":"16","author":"F Mercaldo","year":"2020","unstructured":"Mercaldo, F., Santone, A.: Deep learning for image-based mobile malware detection. J. Comput. Virol. Hacking Tech. 16(2), 157\u2013171 (2020). https:\/\/doi.org\/10.1007\/s11416-019-00346-7","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1073_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102247","volume":"105","author":"Anson Pinhero","year":"2021","unstructured":"Pinhero, Anson, et al.: Malware detection employed by visualization and deep neural network. Comput. Secur. 105, 102247 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102247","journal-title":"Comput. Secur."},{"key":"1073_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102622","volume":"115","author":"P Yadav","year":"2022","unstructured":"Yadav, P., et al.: EfficientNet convolutional neural networks-based Android malware detection. Comput. Secur. 115, 102622 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102622","journal-title":"Comput. Secur."},{"key":"1073_CR36","doi-asserted-by":"crossref","unstructured":"Liu, P., et al.: \u201cImageDroid: Using deep learning to efficiently detect Android malware and automatically mark malicious features\u201d. Security and Communication Networks 2023 (2023)","DOI":"10.1155\/2023\/5393890"},{"key":"1073_CR37","doi-asserted-by":"publisher","unstructured":"Rahali, A., et al.: \u201cDIDroid: Android Malware Classification and Characterization Using Deep Image Learning\u201d. In: ICCNS 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020. ACM, 70\u201382. (2020) https:\/\/doi.org\/10.1145\/3442520.3442522","DOI":"10.1145\/3442520.3442522"},{"key":"1073_CR38","unstructured":"Ciaramella, G., et al.: \u201cExplainable Ransomware Detection with Deep Learning Techniques\u201d. In: Journal of Computer Virology and Hacking Techniques, 1\u201314 (2023)"},{"issue":"2","key":"1073_CR39","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11416-020-00376-6","volume":"17","author":"F Mercaldo","year":"2021","unstructured":"Mercaldo, F., Santone, A.: Audio signal processing for Android malware detection and family identification. J. Comput. Virol. Hacking Tech. 17(2), 139\u2013152 (2021). https:\/\/doi.org\/10.1007\/s11416-020-00376-6","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1073_CR40","doi-asserted-by":"publisher","unstructured":"Casolare, R. et al.: \u201cAndroid Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques\u201d. In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, Virtual Event \/ Szczecin, Poland, 8-10 September 2021. Ed. by Jaroslaw Watr\u00f3bski et al. Vol.\u00a0192. Procedia Computer Science. Elsevier, (2021), pp.\u00a02340\u20132346. https:\/\/doi.org\/10.1016\/j.procs.2021.08.224","DOI":"10.1016\/j.procs.2021.08.224"},{"key":"1073_CR41","doi-asserted-by":"publisher","unstructured":"Casolare, R., et al.: \u201cMobile Family Detection through Audio Signals Classification\u201d. In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021. Ed. by Sabrina De Capitani di Vimercati and Pierangela Samarati. SCITEPRESS, pp.\u00a0479\u2013486. (2021) https:\/\/doi.org\/10.5220\/0010543504790486","DOI":"10.5220\/0010543504790486"},{"key":"1073_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103282","volume":"131","author":"Paul Tarwireyi","year":"2023","unstructured":"Tarwireyi, Paul, Terzoli, Alfredo, Adigun, Matthew O.: Using multi-audio feature fusion for android malware detection. Comput. Secur. 131, 103282 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103282","journal-title":"Comput. Secur."},{"key":"1073_CR43","doi-asserted-by":"publisher","first-page":"27527","DOI":"10.1109\/ACCESS.2023.3258377","volume":"11","author":"Oguz Emre Kural","year":"2023","unstructured":"Kural, Oguz Emre, Kili\u00e7, Erdal, Aksa\u00e7, Ceyda: Apk2Audio4AndMal: Audio Based Malware Family Detection Framework. IEEE Access 11, 27527\u201327535 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3258377","journal-title":"IEEE Access"},{"issue":"11","key":"1073_CR44","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.3390\/e23111489","volume":"23","author":"Hu Guangwu","year":"2021","unstructured":"Guangwu, Hu., et al.: SAMLDroid: A Static Taint Analysis and Machine Learning Combined High-Accuracy Method for Identifying Android Apps with Location Privacy Leakage Risks. Entropy 23(11), 1489 (2021). https:\/\/doi.org\/10.3390\/e23111489","journal-title":"Entropy"},{"issue":"1","key":"1073_CR45","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1049\/ise2.12082","volume":"17","author":"Wu Yafei","year":"2023","unstructured":"Yafei, Wu., et al.: DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. IET Inf. Secur. 17(1), 118\u2013130 (2023). https:\/\/doi.org\/10.1049\/ise2.12082","journal-title":"IET Inf. Secur."},{"issue":"1","key":"1073_CR46","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10922-021-09634-4","volume":"30","author":"S Mahdavifar","year":"2022","unstructured":"Mahdavifar, S., Alhadidi, D., Ghorbani, A.A.: Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder. J. Netw. Syst. Manag. 30(1), 22 (2022). https:\/\/doi.org\/10.1007\/s10922-021-09634-4","journal-title":"J. Netw. Syst. Manag."},{"key":"1073_CR47","doi-asserted-by":"publisher","unstructured":"Norouzian, M.R., et al.: \u201cHybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic\u201d. In: Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Ed. by Joseph K. Liu et al. Vol.\u00a013118. Lecture Notes in Computer Science. Springer, 259\u2013278. (2021) https:\/\/doi.org\/10.1007\/978-3-030-91356-4_14","DOI":"10.1007\/978-3-030-91356-4_14"},{"key":"1073_CR48","doi-asserted-by":"publisher","first-page":"10614","DOI":"10.1109\/ACCESS.2020.2965646","volume":"8","author":"Yong Fang","year":"2020","unstructured":"Fang, Yong, et al.: Android Malware Familial Classification Based on DEX File Section Features. IEEE Access 8, 10614\u201310627 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965646","journal-title":"IEEE Access"},{"key":"1073_CR49","doi-asserted-by":"publisher","unstructured":"Nataraj, L.: \u201cOMD: Orthogonal Malware Detection using Audio, Image, and Static Features\u201d. In, et al.: IEEE Military Communications Conference, MILCOM 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021. IEEE 2021, 703\u2013708 (2021). https:\/\/doi.org\/10.1109\/MILCOM52596.2021.9653136","DOI":"10.1109\/MILCOM52596.2021.9653136"},{"issue":"2","key":"1073_CR50","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11416-018-0321-2","volume":"15","author":"Mehrdad Farrokhmanesh","year":"2019","unstructured":"Farrokhmanesh, Mehrdad, Hamzeh, Ali: Music classification as a new approach for malware detection. J. Comput. Virol. Hacking Tech. 15(2), 77\u201396 (2019). https:\/\/doi.org\/10.1007\/s11416-018-0321-2","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1073_CR51","doi-asserted-by":"publisher","unstructured":"Backes, M.: ARTist: The Android Runtime Instrumentation and Security Toolkit. In, et al.: IEEE European Symposium on Security and Privacy, EuroS &P 2017, Paris, France, April 26\u201328, 2017. IEEE 2017, 481\u2013495 (2017). https:\/\/doi.org\/10.1109\/EuroSP.2017.43","DOI":"10.1109\/EuroSP.2017.43"},{"key":"1073_CR52","doi-asserted-by":"publisher","unstructured":"Sun, T.: et al.: \u201cAndroid Malware Detection: Looking beyond Dalvik Bytecode\u201d. In: 36th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2021 - Workshops, Melbourne, Australia, November 15-19, 2021. IEEE, 34\u201339. (2021). https:\/\/doi.org\/10.1109\/ASEW52652.2021.00019","DOI":"10.1109\/ASEW52652.2021.00019"},{"key":"1073_CR53","unstructured":"Steve, K.: Enhanced Google Play Protect real-time scanning for app installs. https:\/\/security.googleblog.com\/2023\/10\/enhanced-google-play-protect-real-time.html. Accessed: 2024-06-04. (2023)"},{"key":"1073_CR54","doi-asserted-by":"publisher","unstructured":"Qu, Z. et al.: \u201cDyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications\u201d. In: 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017. IEEE Computer Society, 415\u2013426. (2017) https:\/\/doi.org\/10.1109\/DSN.2017.14","DOI":"10.1109\/DSN.2017.14"},{"key":"1073_CR55","unstructured":"Wang, A.: \u201cAn Industrial Strength Audio Search Algorithm\u201d. In: ISMIR 2003, 4th International Conference on Music Information Retrieval, Baltimore, Maryland, USA, October 27-30, 2003, Proceedings. (2003)"},{"key":"1073_CR56","doi-asserted-by":"publisher","unstructured":"Scaletti, C.: \u201cSonification $$\\ne $$ Music\u201d. In: Oxford Handbook of Algorithmic Composition. Ed. by Roger T. Dean and Alex McLean. Oxford University Press, 363\u2013385. (2018) https:\/\/doi.org\/10.1093\/oxfordhb\/9780190226992.013.9","DOI":"10.1093\/oxfordhb\/9780190226992.013.9"},{"key":"1073_CR57","unstructured":"Hermann, T., Hunt, A., Neuhoff, J.G.: eds. The Sonification Handbook. Berlin: Logos Publishing House, (2011). isbn: 9783832528195"},{"key":"1073_CR58","unstructured":"O\u2019Brien, T.: Learning to understand music from Shazam. https:\/\/medium.com\/@tsob\/learning-to-understand-music-from-shazam-56a60788b62f. Accessed: 2023-03-04. (2017)"},{"key":"1073_CR59","doi-asserted-by":"publisher","unstructured":"Wei, F., et al.: \u201cDeep Ground Truth Analysis of Current Android Malware\u201d. In: Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings. Ed. by Michalis Polychronakis and Michael Meier. Vol.\u00a010327. Lecture Notes in Computer Science. Springer, 252\u2013276. (2017) https:\/\/doi.org\/10.1007\/978-3-319-60876-1_12","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"1073_CR60","doi-asserted-by":"publisher","unstructured":"Allix, K., et al.: \u201cAndroZoo: collecting millions of Android apps for the research community\u201d. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, Austin, TX, USA, May 14-22, 2016. Ed. by Miryung Kim, Romain Robbes, and Christian Bird. ACM, 468\u2013471. (2016). https:\/\/doi.org\/10.1145\/2901739.2903508","DOI":"10.1145\/2901739.2903508"},{"issue":"2","key":"1073_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3605775","volume":"56","author":"Fatemeh Deldar","year":"2024","unstructured":"Deldar, Fatemeh, Abadi, Mahdi: Deep Learning for Zero-day Malware Detection and Classification: A Survey. ACM Comput. Surv. 56(2), 1\u201337 (2024). https:\/\/doi.org\/10.1145\/3605775","journal-title":"ACM Comput. Surv."},{"key":"1073_CR62","unstructured":"Hermann, T.: \u201cTaxonomy and definitions for sonification and auditory display\u201d. In: Proceedings of the 14th International Conference on Auditory Display (ICAD). Paris, France, (2008). https:\/\/www.icad.org\/Proceedings\/2008\/Hermann2008.pdf"},{"key":"1073_CR63","unstructured":"Kramer, G.: ed. Auditory Display: Sonification, Audification, and Auditory Interfaces. Reading, MA: Addison-Wesley, (1994). isbn: 9780201626032"},{"key":"1073_CR64","unstructured":"Oppenheim, A.V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice-Hall, Inc., (1999)"},{"key":"1073_CR65","unstructured":"Cohen, L.: Time-Frequency Analysis. Prentice Hall PTR, (1995)"},{"key":"1073_CR66","unstructured":"Kay. S.M.: Modern Spectral Estimation: Theory and Application. Prentice Hall, (1988)"},{"key":"1073_CR67","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. 4th. New York, NY, USA: Pearson, 2018. isbn: 978-0-13-335672-4"},{"issue":"4","key":"1073_CR68","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s10851-022-01138-3","volume":"65","author":"M Kahra","year":"2023","unstructured":"Kahra, M., Breu\u00df, M.: Properties of Morphological Dilation in Max-Plus and Plus-Prod Algebra in Connection with the Fourier Transformation. J. Math. Imaging Vis. 65(4), 577\u2013591 (2023). https:\/\/doi.org\/10.1007\/s10851-022-01138-3","journal-title":"J. Math. Imaging Vis."},{"key":"1073_CR69","doi-asserted-by":"publisher","unstructured":"Ahmed, T.S.: \u201cMathematical Morphology and the Heart Signals\u201d. In: Biosignal Processing. Ed. by Vahid Asadpour and Selcan Karaku\u015f. Rijeka: IntechOpen, Chap.\u00a02. (2022) https:\/\/doi.org\/10.5772\/intechopen.104113","DOI":"10.5772\/intechopen.104113"},{"key":"1073_CR70","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: Machine Learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"1073_CR71","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"Sepp Hochreiter","year":"1997","unstructured":"Hochreiter, Sepp, Schmidhuber, J\u00fcrgen.: Long Short-Term Memory. Neural Comput. 9, 1735\u20131780 (1997). (https:\/\/api.semanticscholar.org\/CorpusID:1915014)","journal-title":"Neural Comput."},{"key":"1073_CR72","unstructured":"Harang, R.E., Rudd, E.M.: \u201cSOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection\u201d. CoRR abs\/2012.07634 (2020). arXiv: arXiv:2012.07634"},{"key":"1073_CR73","unstructured":"Lenovo. ThinkCentre M910 Tower \u2014 Power Your Business \u2014 Lenovo Australia. Accessed: 2024-09-19. 2018. https:\/\/www3.lenovo.com\/au\/en\/desktops-and-all-in-ones\/thinkcentre\/"},{"key":"1073_CR74","unstructured":"Android. Enable multidex for apps with over 64K methods. https:\/\/developer.android.com\/build\/multidex. Accessed: 2024-03-04. 2024"},{"issue":"1","key":"1073_CR75","doi-asserted-by":"publisher","first-page":"19534","DOI":"10.1038\/s41598-022-23766-w","volume":"12","author":"Husnain Rafiq","year":"2022","unstructured":"Rafiq, Husnain, et al.: AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems. Sci. Rep. 12(1), 19534 (2022)","journal-title":"Sci. Rep."},{"key":"1073_CR76","doi-asserted-by":"crossref","unstructured":"Gibert, D. et al.: \u201cAssessing the impact of packing on static machine learning-based malware detection and classification systems\u201d. Computers & Security, 104495 (2025)","DOI":"10.1016\/j.cose.2025.104495"},{"key":"1073_CR77","doi-asserted-by":"crossref","unstructured":"Aghakhani, H. et al.: \u201cWhen Malware is Packin\u2019 Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features\u201d. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society, (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/when-malware-is-packin-heat-limits-of-machine-learning-classifiers-based-on-static-analysis-features\/","DOI":"10.14722\/ndss.2020.24310"},{"key":"1073_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103536","volume":"136","author":"Charles-Henry Bertrand Van Ouytsel","year":"2024","unstructured":"Ouytsel, Charles-Henry Bertrand Van., Dam, Khanh-Huu-The., Legay, Axel: Analysis of machine learning approaches to packing detection. Comput. Secur. 136, 103536 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103536","journal-title":"Comput. Secur."},{"key":"1073_CR79","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jss.2018.02.040","volume":"140","author":"Bodong Li","year":"2018","unstructured":"Li, Bodong, et al.: AppSpear: Automating the hidden-code extraction and reassembling of packed android malware. J. Syst. Softw. 140, 3\u201316 (2018). https:\/\/doi.org\/10.1016\/j.jss.2018.02.040","journal-title":"J. Syst. Softw."},{"key":"1073_CR80","unstructured":"Chung, J. et al.: \u201cA Recurrent Latent Variable Model for Sequential Data\u201d. In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada. Ed. by Corinna Cortes et al. 2980\u20132988. (2015) https:\/\/proceedings.neurips.cc\/paper\/2015\/hash\/b618c3210e934362ac261db280128c22-Abstract.html"},{"key":"1073_CR81","unstructured":"Kingma, D.P., Welling, M.: \u201cAuto-Encoding Variational Bayes\u201d. In: 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings. Ed. by Yoshua Bengio and Yann LeCun. (2014) http:\/\/arxiv.org\/abs\/1312.6114"},{"key":"1073_CR82","doi-asserted-by":"publisher","unstructured":"Noureddine, L. et al.: \u201cSE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution\u201d. In: CODASPY \u201921: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021. Ed. by Anupam Joshi, Barbara Carminati, and Rakesh M. Verma. ACM, 281\u2013292. (2021) https:\/\/doi.org\/10.1145\/3422337.3447848","DOI":"10.1145\/3422337.3447848"},{"key":"1073_CR83","unstructured":"Van der Maaten, L., Hinton, G.: \u201cVisualizing data using t-SNE.\u201d In: Journal of machine learning research 9(11) (2008)"},{"key":"1073_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102483","volume":"54","author":"R Surendran","year":"2020","unstructured":"Surendran, R., Thomas, T., Emmanuel, S.: A TAN based hybrid model for android malware detection. J. Inf. Secur. Appl. 54, 102483 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102483","journal-title":"J. Inf. Secur. Appl."},{"key":"1073_CR85","doi-asserted-by":"publisher","unstructured":"Pektas, A., Acarman, T.: Deep learning for effective Android malware detection using API call graph embeddings. Soft. Comput. 24(2), 1027\u20131043 (2020). https:\/\/doi.org\/10.1007\/s00500-019-03940-5","DOI":"10.1007\/s00500-019-03940-5"},{"issue":"7","key":"1073_CR86","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1007\/s00521-021-05875-1","volume":"35","author":"D\u00d6 Sahin","year":"2023","unstructured":"Sahin, D.\u00d6., et al.: A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput. Appl. 35(7), 4903\u20134918 (2023). https:\/\/doi.org\/10.1007\/s00521-021-05875-1","journal-title":"Neural Comput. Appl."},{"key":"1073_CR87","doi-asserted-by":"publisher","unstructured":"Cai, L., Li, Y., Xiong, Z.: JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. Comput. Secur. 100, 102086 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102086","DOI":"10.1016\/j.cose.2020.102086"},{"key":"1073_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102718","volume":"58","author":"S Millar","year":"2021","unstructured":"Millar, S., et al.: Multi-view deep learning for zero-day Android malware detection. J. Inf. Secur. Appl. 58, 102718 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2020.102718","journal-title":"J. Inf. Secur. Appl."},{"key":"1073_CR89","doi-asserted-by":"publisher","unstructured":"Kumar, P., Suman, S.S.: An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost. Multim. Tools Appl. 83(24), 64767\u201364794 (2024). https:\/\/doi.org\/10.1007\/s11042-023-18066-y","DOI":"10.1007\/s11042-023-18066-y"},{"key":"1073_CR90","doi-asserted-by":"publisher","unstructured":"Zegzhda, P.D. et al.: \u201cApplying deep learning techniques for Android malware detection\u201d. In: Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018. Ed. by Philipp Reinecke, Naghmeh Moradpoor, and George Theodorakopoulos. ACM, 1\u20138. (2018) https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"issue":"7","key":"1073_CR91","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s42452-020-3132-2","volume":"2","author":"H Murat \u00dcnver","year":"2020","unstructured":"Murat \u00dcnver, H., Bakour, K.: Android malware detection based on image-based features and machine learning techniques. SN Applied Sciences 2(7), 1299 (2020)","journal-title":"SN Applied Sciences"},{"issue":"2","key":"1073_CR92","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313391","volume":"22","author":"L Onwuzurike","year":"2019","unstructured":"Onwuzurike, L., et al.: MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secur. 22(2), 1\u201334 (2019). https:\/\/doi.org\/10.1145\/3313391","journal-title":"ACM Trans. Priv. Secur."},{"key":"1073_CR93","doi-asserted-by":"crossref","unstructured":"Smmarwar, S.K., Gupta, G.P., Kumar, S.: \u201cXAI-AMD-DL: An explainable AI approach for android malware detection system using deep learning\u201d. In: 2023 IEEE World Conference on Applied Intelligence and Computing (AIC). IEEE. 423\u2013428 (2023)","DOI":"10.1109\/AIC57670.2023.10263974"},{"key":"1073_CR94","doi-asserted-by":"crossref","unstructured":"Waheed, M., Qadir, S.: \u201cEffective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset.\u201d Security and Communication Networks 1, 7382302 (2024)","DOI":"10.1155\/2024\/7382302"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01073-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01073-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01073-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:12:11Z","timestamp":1750500731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01073-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":94,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1073"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01073-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"11 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the authors received a speaker honorarium from any company. All the authors declare that none of them have any conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"155"}}