{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:20:08Z","timestamp":1760660408633,"version":"build-2065373602"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["SRG\/2021\/001898"],"award-info":[{"award-number":["SRG\/2021\/001898"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01087-z","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T17:26:20Z","timestamp":1759166780000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CADDroid: an efficient android app collusion dataset to instigate the development of modern malware detection methodologies"],"prefix":"10.1007","volume":"24","author":[{"given":"V.","family":"Dhivya","sequence":"first","affiliation":[]},{"given":"R. Bala","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"1087_CR1","unstructured":"\u201cDefine a custom app permission | Android Developers.\u201d Accessed: Jun. 08, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/permissions\/defining"},{"key":"1087_CR2","doi-asserted-by":"publisher","unstructured":"Xu, M., Ma, Y., Liu, X., Lin, F. X. and Liu, Y.: AppHolmes: detecting and characterizing app collusion among third-party android markets. 26th Int. World Wide Web Conf. WWW 2017, pp. 143\u2013152 (2017). https:\/\/doi.org\/10.1145\/3038912.3052645","DOI":"10.1145\/3038912.3052645"},{"key":"1087_CR3","unstructured":"\u201cAndroid Malware 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB.\u201d Accessed: Mar. 05, 2025. [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/andmal2017.html"},{"key":"1087_CR4","doi-asserted-by":"publisher","first-page":"109750","DOI":"10.1016\/J.DIB.2023.109750","volume":"51","author":"H Bragan\u00e7a","year":"2023","unstructured":"Bragan\u00e7a, H., Rocha, V., Barcellos, L., Souto, E., Kreutz, D., Feitosa, E.: Android malware detection with MH-100K: An innovative dataset for advanced research. Data Brief 51, 109750 (2023). https:\/\/doi.org\/10.1016\/J.DIB.2023.109750","journal-title":"Data Brief"},{"key":"1087_CR5","doi-asserted-by":"publisher","unstructured":"Zhao, X., Fang, J. and Wang, X.: Android malware detection based on permissions. IET Conf. Publ. vol. 2014, no. 650 CP (2014). https:\/\/doi.org\/10.1049\/CP.2014.0605.","DOI":"10.1049\/CP.2014.0605"},{"key":"1087_CR6","doi-asserted-by":"publisher","unstructured":"Mahindru, A. and Singh, P.: Dynamic permissions based android malware detection using machine learning techniques. ACM Int. Conf. Proceeding Ser., pp. 202\u2013210 (2017). https:\/\/doi.org\/10.1145\/3021460.3021485.","DOI":"10.1145\/3021460.3021485"},{"key":"1087_CR7","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1016\/J.FUTURE.2018.05.047","volume":"109","author":"S Bhandari","year":"2020","unstructured":"Bhandari, S., Herbreteau, F., Laxmi, V., Zemmari, A., Gaur, M.S., Roop, P.S.: SneakLeak+: Large-scale klepto apps analysis. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 109, 593\u2013603 (2020). https:\/\/doi.org\/10.1016\/J.FUTURE.2018.05.047","journal-title":"Futur. Gener. Comput. Syst.. Gener. Comput. Syst."},{"key":"1087_CR8","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1109\/TIFS.2023.3267666","volume":"18","author":"B Wang","year":"2023","unstructured":"Wang, B., Yang, C., Ma, J.: IAFDroid: demystifying collusion attacks in android ecosystem via precise inter-app analysis. IEEE Trans. Inf. Forensics Secur.Secur. 18, 2883\u20132898 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3267666","journal-title":"IEEE Trans. Inf. Forensics Secur.Secur."},{"key":"1087_CR9","doi-asserted-by":"publisher","unstructured":"Marforio, C., Ritzdorf, H., Francillon, A. and Capkun, S.: Analysis of the communication between colluding applications on modern Smartphones. ACM Int. Conf. Proceeding Ser. pp. 51\u201360 (2012). https:\/\/doi.org\/10.1145\/2420950.2420958.","DOI":"10.1145\/2420950.2420958"},{"key":"1087_CR10","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A. and Wang, X.: Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. Netw. Distrib. Syst. Secur. Symp. (2011)."},{"issue":"1","key":"1087_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TMC.2018.2889495","volume":"19","author":"KO Elish","year":"2020","unstructured":"Elish, K.O., Cai, H., Barton, D., Yao, D., Ryder, B.G.: Identifying mobile inter-app communication risks. IEEE Trans. Mob. Comput.Comput. 19(1), 90\u2013102 (2020). https:\/\/doi.org\/10.1109\/TMC.2018.2889495","journal-title":"IEEE Trans. Mob. Comput.Comput."},{"key":"1087_CR12","unstructured":"\u201cVirus Bulletin\u202f: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach.\u201d Accessed: Feb. 06, 2023. [Online]. Available: https:\/\/www.virusbulletin.com\/virusbulletin\/2018\/03\/distinguishing-between-malicious-app-collusion-and-benign-app-collaboration-machine-learning-approach\/"},{"issue":"2","key":"1087_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11416-023-00510-0","volume":"20","author":"R Casolare","year":"2024","unstructured":"Casolare, R., Fagnano, S., Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Picker Blinder: a framework for automatic injection of malicious inter-app communication. J. Comput. Virol. Hacking Tech. 20(2), 331\u2013346 (2024). https:\/\/doi.org\/10.1007\/s11416-023-00510-0","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1087_CR14","unstructured":"\u201cContent providers | Android Developers.\u201d Accessed: Jun. 19, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/providers\/content-providers"},{"key":"1087_CR15","unstructured":"\u201cWebView | Android Developers.\u201d Accessed: Jan. 21, 2025. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/webkit\/WebView"},{"key":"1087_CR16","doi-asserted-by":"publisher","first-page":"106089","DOI":"10.1016\/J.ASOC.2020.106089","volume":"89","author":"S Sharmeen","year":"2020","unstructured":"Sharmeen, S., Huda, S., Abawajy, J., Hassan, M.M.: An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput.Comput. 89, 106089 (2020). https:\/\/doi.org\/10.1016\/J.ASOC.2020.106089","journal-title":"Appl. Soft Comput.Comput."},{"key":"1087_CR17","doi-asserted-by":"publisher","unstructured":"Chin, E., Felt, A. P., Greenwood, K. and Wagner, D.: Analyzing inter-application communication in Android. MobiSys\u201911 - Compil. Proc. 9th Int. Conf. Mob. Syst. Appl. Serv. Co-located Work. pp. 239\u2013252 (2011). https:\/\/doi.org\/10.1145\/1999995.2000018.","DOI":"10.1145\/1999995.2000018"},{"key":"1087_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/J.JISA.2019.03.014","volume":"46","author":"Y He","year":"2019","unstructured":"He, Y., Yang, X., Hu, B., Wang, W.: Dynamic privacy leakage analysis of Android third-party libraries. J. Inf. Secur. Appl. 46, 259\u2013270 (2019). https:\/\/doi.org\/10.1016\/J.JISA.2019.03.014","journal-title":"J. Inf. Secur. Appl."},{"key":"1087_CR19","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/ICSE.2015.48","volume":"1","author":"L Li","year":"2015","unstructured":"Li, L., et al.: IccTA: detecting inter-component privacy leaks in android apps. Proc. - Int. Conf. Softw. Eng. 1, 280\u2013291 (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.48","journal-title":"Proc. - Int. Conf. Softw. Eng."},{"issue":"9","key":"1087_CR20","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/TSE.2015.2419611","volume":"41","author":"H Bagheri","year":"2015","unstructured":"Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: COVERT: compositional analysis of android inter-app permission leakage. IEEE Trans. Softw. Eng.Softw. Eng. 41(9), 866\u2013886 (2015). https:\/\/doi.org\/10.1109\/TSE.2015.2419611","journal-title":"IEEE Trans. Softw. Eng.Softw. Eng."},{"key":"1087_CR21","doi-asserted-by":"publisher","first-page":"2782","DOI":"10.1109\/TIFS.2020.2976556","volume":"15","author":"M Alhanahnah","year":"2020","unstructured":"Alhanahnah, M., et al.: DINA: detecting hidden android inter-app communication in dynamic loaded code. IEEE Trans. Inf. Forensics Secur.Secur. 15, 2782\u20132797 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2976556","journal-title":"IEEE Trans. Inf. Forensics Secur.Secur."},{"issue":"5","key":"1087_CR22","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.1007\/s10664-018-9673-y","volume":"24","author":"P Gadient","year":"2019","unstructured":"Gadient, P., Ghafari, M., Frischknecht, P., Nierstrasz, O.: Security code smells in Android ICC. Emp. Softw. Eng. 24(5), 3046\u20133076 (2019). https:\/\/doi.org\/10.1007\/s10664-018-9673-y","journal-title":"Emp. Softw. Eng."},{"key":"1087_CR23","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470077","author":"R Casolare","year":"2021","unstructured":"Casolare, R., Ciaramella, G., Martinelli, F., Mercaldo, F., Santone, A.: Ste\u00e6lErgon: a framework for injecting colluding malicious payload in android applications. ACM Int. Conf. Proceed Ser. (2021). https:\/\/doi.org\/10.1145\/3465481.3470077","journal-title":"ACM Int. Conf. Proceed Ser."},{"key":"1087_CR24","unstructured":"\u201cVirusTotal-Home.\u201d Accessed: Feb. 16, 2023. [Online]. Available: https:\/\/www.virustotal.com\/gui\/home\/upload"},{"issue":"6","key":"1087_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices. 49(6), 259\u2013269 (2014). https:\/\/doi.org\/10.1145\/2666356","journal-title":"ACM Sigplan Notices."},{"key":"1087_CR26","unstructured":"\u201ct1mlange\/FlowDroid: FlowDroid Static Data Flow Tracker.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/github.com\/t1mlange\/FlowDroid\/tree\/develop"},{"key":"1087_CR27","unstructured":"\u201cActivityManager | Android Developers.\u201d Accessed: Mar. 07, 2023. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/app\/ActivityManager"},{"key":"1087_CR28","unstructured":"\u201cServices overview | Background work | Android Developers.\u201d Accessed: Jan. 26, 2025. [Online]. Available: https:\/\/developer.android.com\/develop\/background-work\/services"},{"key":"1087_CR29","unstructured":"\u201cBroadcasts overview | Android Developers.\u201d Accessed: Jun. 26, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/components\/broadcasts"},{"key":"1087_CR30","unstructured":"\u201cBinder | Android Developers.\u201d Accessed: Dec. 28, 2024. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/os\/Binder"},{"key":"1087_CR31","unstructured":"\u201cAndroid Interface Definition Language (AIDL) | Android Developers.\u201d Accessed: Aug. 04, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/components\/aidl"},{"key":"1087_CR32","unstructured":"\u201cAndroid Interface Definition Language (AIDL) | Background work | Android Developers.\u201d Accessed: Dec. 28, 2024. [Online]. Available: https:\/\/developer.android.com\/develop\/background-work\/services\/aidl"},{"key":"1087_CR33","unstructured":"\u201cIntents and intent filters | Android Developers.\u201d Accessed: Jun. 19, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/components\/intents-filters"},{"key":"1087_CR34","unstructured":"\u201cLocalSocket | Android Developers.\u201d Accessed: Jun. 19, 2023. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/net\/LocalSocket"},{"key":"1087_CR35","unstructured":"\u201cUnleashing WebSocket in Android?. What is WebSocket? | by Duggu | Medium.\u201d Accessed: Dec. 28, 2024. [Online]. Available: https:\/\/medium.com\/@dugguRK\/unleashing-websocket-in-android-b82c887b0a27#id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6ImFiODYxNGZmNjI4OTNiYWRjZTVhYTc5YTc3MDNiNTk2NjY1ZDI0NzgiLCJ0eXAiOiJKV1QifQ.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.EkQmukcGtUnl7wk5b6VLZbf7HiTkIFjKfih8AVVs9hDFRfnVU4fbzW3yHzHyWTQ8ydDd_Ri8CId9zVmPC1eF6nNnt4h7JF6jMkOwqm1F-JuWBTmXdeAnz6dKHnqtWvwN1uSYn81xJ6Jjn_0Cxys_tSQrp_lA99X6Nvt0lLz3Z23NXllXsO5_7LcSqkR-gdf5ezFHmTLtkJKam6odLKg5zqblYXlv6rfzN090G-3thcXx-UXTbJbEhwYAAgebeTG_Nj9NKyMncu5-HiF8tinKKnDJWW-Dq_NW0tiGWEfONa1Tb7fKJXNNVMLaB77n84vmje6bwn-Ot2m6LTbrrmbhOw"},{"key":"1087_CR36","unstructured":"\u201cBroadcastReceiver | Android Developers.\u201d Accessed: Jun. 19, 2023. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/content\/BroadcastReceiver"},{"key":"1087_CR37","unstructured":"\u201cContent provider basics | Android Developers.\u201d Accessed: Mar. 13, 2023. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/providers\/content-provider-basics"},{"key":"1087_CR38","unstructured":"\u201cStorage | Android Open Source Project.\u201d Accessed: Jan. 24, 2025. [Online]. Available: https:\/\/source.android.com\/docs\/core\/storage"},{"key":"1087_CR39","unstructured":"Li, L. et al.: I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. Apr. 2014, Accessed: Mar. 03, 2025. [Online]. Available: https:\/\/www.researchgate.net\/publication\/261988905_I_know_what_leaked_in_your_pocket_uncovering_privacy_leaks_on_Android_Apps_with_Static_Taint_Analysis"},{"key":"1087_CR40","unstructured":"\u201cGitHub-secure-software-engineering\/DroidBench: a micro-benchmark suite to assess the stability of taint-analysis tools for Android.\u201d Accessed: Feb. 16, 2023. [Online]. Available: https:\/\/github.com\/secure-software-engineering\/DroidBench"},{"issue":"2","key":"1087_CR41","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/S11416-017-0296-4\/TABLES\/2","volume":"14","author":"J Blasco","year":"2018","unstructured":"Blasco, J., Chen, T.M.: Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2), 127\u2013138 (2018). https:\/\/doi.org\/10.1007\/S11416-017-0296-4\/TABLES\/2","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1087_CR42","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/J.JNCA.2017.12.008","volume":"105","author":"J Blasco","year":"2018","unstructured":"Blasco, J., Chen, T.M., Muttik, I., Roggenbach, M.: Detection of app collusion potential using logic programming. J. Netw. Comput. Appl.Netw. Comput. Appl. 105, 88\u2013104 (2018). https:\/\/doi.org\/10.1016\/J.JNCA.2017.12.008","journal-title":"J. Netw. Comput. Appl.Netw. Comput. Appl."},{"key":"1087_CR43","unstructured":"\u201cGitHub-secure-software-engineering\/DroidBench at develop.\u201d Accessed: Mar. 13, 2023. [Online]. Available: https:\/\/github.com\/secure-software-engineering\/DroidBench\/tree\/develop"},{"issue":"14","key":"1087_CR44","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3183575","volume":"21","author":"F Wei","year":"2018","unstructured":"Wei, F.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. ACM Trans. Priv. Secur. 21(14), 14 (2018). https:\/\/doi.org\/10.1145\/3183575","journal-title":"ACM Trans. Priv. Secur."},{"key":"1087_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207638","author":"R Casolare","year":"2020","unstructured":"Casolare, R., Martinelli, F., Mercaldo, F., Santone, A.: Malicious collusion detection in mobile environment by means of model checking. Proc. Int. Jt. Conf. Neural Netw (2020). https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207638","journal-title":"Proc. Int. Jt. Conf. Neural Netw"},{"issue":"1","key":"1087_CR46","doi-asserted-by":"publisher","first-page":"10680","DOI":"10.1038\/S41598-025-86568-W","volume":"15","author":"RY Mawoh","year":"2025","unstructured":"Mawoh, R.Y., Wacka, J.B., Tchakounte, F., Fachkha, C., Kolyang: An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence. Sci. Rep. 15(1), 10680 (2025). https:\/\/doi.org\/10.1038\/S41598-025-86568-W","journal-title":"Sci. Rep."},{"key":"1087_CR47","doi-asserted-by":"publisher","unstructured":"Guan, Q., Du, S., Wang, K., Yang, C. and Luo, X.: A Framework for detecting hidden partners in app collusion. 2024 IEEE 23rd Int. Conf. Trust. Secur. Priv. Comput. Commun. pp. 516\u2013523 (2024) https:\/\/doi.org\/10.1109\/TRUSTCOM63139.2024.00087.","DOI":"10.1109\/TRUSTCOM63139.2024.00087"},{"key":"1087_CR48","unstructured":"\u201cAsyncTask | Android Developers.\u201d Accessed: Jan. 26, 2025. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/os\/AsyncTask"},{"key":"1087_CR49","unstructured":"\u201cHandler | Android Developers.\u201d Accessed: Jan. 26, 2025. [Online]. Available: https:\/\/developer.android.com\/reference\/android\/os\/Handler"},{"key":"1087_CR50","unstructured":"\u201cWebView: Usage Scenarios and Challenges.\u201d Accessed: Jan. 24, 2025. [Online]. Available: https:\/\/webview-cg.github.io\/usage-and-challenges\/"},{"key":"1087_CR51","doi-asserted-by":"publisher","first-page":"107024","DOI":"10.1016\/j.comnet.2019.107024","volume":"168","author":"W Wang","year":"2020","unstructured":"Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R., Ma, R.: MSYM: a multichannel communication system for android devices. Comput. Netw.. Netw. 168, 107024 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.107024","journal-title":"Comput. Netw.. Netw."},{"key":"1087_CR52","doi-asserted-by":"publisher","unstructured":"Qiu, L., Wang, Y. and Rubin, J.: Analyzing the analyzers: FlowDroid\/IccTA, AmanDroid, and DroidSafe. ISSTA 2018 - Proc. 27th ACM SIGSOFT Int. Symp. Softw. Test. Anal. pp. 176\u2013186 (2018), https:\/\/doi.org\/10.1145\/3213846.3213873.","DOI":"10.1145\/3213846.3213873"},{"key":"1087_CR53","unstructured":"\u201cMIT-PAC\/droidsafe-src: DroidSafe Android Static Analysis Source Repository.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/github.com\/MIT-PAC\/droidsafe-src"},{"key":"1087_CR54","unstructured":"\u201cInformation-Flow Analysis of Android Applications in DroidSafe - NDSS Symposium.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/www.ndss-symposium.org\/ndss2015\/ndss-2015-programme\/information-flow-analysis-android-applications-droidsafe\/"},{"key":"1087_CR55","unstructured":"\u201cmonkeyrunner | Android Developers.\u201d Accessed: Mar. 13, 2023. [Online]. Available: https:\/\/developer.android.com\/studio\/test\/monkeyrunner"},{"key":"1087_CR56","unstructured":"\u201cMobile & Tablet Android Version Market Share Worldwide | Statcounter Global Stats.\u201d Accessed: Jan. 20, 2025. [Online]. Available: https:\/\/gs.statcounter.com\/os-version-market-share\/android\/mobile-tablet\/worldwide#monthly-202401-202501-bar"},{"key":"1087_CR57","unstructured":"\u201cThreat Reports.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/www.quickheal.co.in\/threat-reports?year=2022"},{"key":"1087_CR58","unstructured":"\u201cAndroid banking Trojan targets more than 232 apps including apps offered by Indian banks.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/blogs.quickheal.com\/android-banking-trojan-targets-232-apps-including-indian-banks\/"},{"key":"1087_CR59","unstructured":"\u201cFlowDroid\/soot-infoflow-android at develop \u00b7 secure-software-engineering\/FlowDroid.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/github.com\/secure-software-engineering\/FlowDroid\/tree\/develop\/soot-infoflow-android"},{"key":"1087_CR60","unstructured":"\u201cAppcompat | Jetpack | Android Developers.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/developer.android.com\/jetpack\/androidx\/releases\/appcompat"},{"key":"1087_CR61","unstructured":"\u201cthe processing time is very long \u00b7 Issue #14 \u00b7 arguslab\/Argus-SAF.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/github.com\/arguslab\/Argus-SAF\/issues\/14"},{"key":"1087_CR62","unstructured":"\u201cAndroid Webview deprecation \u00b7 Issue #94 \u00b7 thebergamo\/react-native-fbsdk-next.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/github.com\/thebergamo\/react-native-fbsdk-next\/issues\/94"},{"key":"1087_CR63","unstructured":"\u201cDeprecations | Android Developers.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/developer.android.com\/about\/versions\/15\/deprecations"},{"key":"1087_CR64","unstructured":"\u201cDeprecations | Android Developers.\u201d Accessed: May 10, 2025. [Online]. Available: https:\/\/developer.android.com\/about\/versions\/12\/deprecations"},{"issue":"1","key":"1087_CR65","doi-asserted-by":"publisher","first-page":"334","DOI":"10.54254\/2754-1169\/18\/20230094","volume":"18","author":"M Fang","year":"2023","unstructured":"Fang, M.: Analysis of the marketing strategy of ubisoft\u2013take the assassin\u2019s creed trilogy as a case study. Adv. Econ. Manag. Polit. Sci. 18(1), 334\u2013343 (2023). https:\/\/doi.org\/10.54254\/2754-1169\/18\/20230094","journal-title":"Adv. Econ. Manag. Polit. Sci."},{"issue":"10","key":"1087_CR66","doi-asserted-by":"publisher","first-page":"e31324","DOI":"10.1016\/j.heliyon.2024.e31324","volume":"10","author":"X Zhao","year":"2024","unstructured":"Zhao, X., Sam, T., Zhang, X., Liu, Y.: The influencing factors of game brand loyalty. Heliyon 10(10), e31324 (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e31324","journal-title":"Heliyon"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01087-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01087-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01087-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:00Z","timestamp":1760614680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01087-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":66,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1087"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01087-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"13 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This paper does not perform any research that involves human and\/or animal participation.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The malware samples which we have developed as a part of this study are created and distributed with good will and not to aid any unethical\/unprofessional practices. The sample code snippets that have the potential to attack the real-world devices have been provided\/explained in this paper exclusively for research purpose.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Consent was obtained from all the individual authors who were involved in this work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}],"article-number":"218"}}