{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:30:53Z","timestamp":1774931453750,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017336","name":"Dipartimenti di Eccellenza","doi-asserted-by":"publisher","award":["MIUR 2018-2022"],"award-info":[{"award-number":["MIUR 2018-2022"]}],"id":[{"id":"10.13039\/100017336","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017336","name":"Dipartimenti di Eccellenza","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/100017336","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017336","name":"Dipartimenti di Eccellenza","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/100017336","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10664-023-10375-y","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T02:01:37Z","timestamp":1695693697000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Experimental comparison of features, analyses, and classifiers for Android malware detection"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5130-0407","authenticated-orcid":false,"given":"Lwin Khin","family":"Shar","sequence":"first","affiliation":[]},{"given":"Biniam Fisseha","family":"Demissie","sequence":"additional","affiliation":[]},{"given":"Mariano","family":"Ceccato","sequence":"additional","affiliation":[]},{"given":"Yan Naing","family":"Tun","sequence":"additional","affiliation":[]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Lingxiao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Bienert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"10375_CR1","doi-asserted-by":"crossref","unstructured":"Aafer Y, Du W, Yin H (2013) Droidapiminer: Mining api-level features for robust malware detection in android. In: International conference on security and privacy in communication systems, pp. 86\u2013103. Springer","DOI":"10.1007\/978-3-319-04283-1_6"},{"issue":"1","key":"10375_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11416-014-0226-7","volume":"11","author":"VM Afonso","year":"2015","unstructured":"Afonso VM, de Amorim MF, Gr\u00e9gio ARA, Junquera GB, de Geus PL (2015) Identifying android malware using dynamically obtained features. Journal of Computer Virology and Hacking Techniques 11(1):9\u201317","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"10375_CR3","doi-asserted-by":"crossref","unstructured":"Akiba T, Sano S, Yanase T, Ohta T, Koyama M (2019) Optuna: A next-generation hyperparameter optimization framework. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp. 2623\u20132631","DOI":"10.1145\/3292500.3330701"},{"issue":"1","key":"10375_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10664-014-9352-6","volume":"21","author":"K Allix","year":"2016","unstructured":"Allix K, Bissyand\u00e9 TF, J\u00e9rome Q, Klein J, Le Traon Y et al (2016) Empirical assessment of machine learning-based malware detectors for android. Empirical Software Engineering 21(1):183\u2013211","journal-title":"Empirical Software Engineering"},{"key":"10375_CR5","doi-asserted-by":"crossref","unstructured":"Allix K, Bissyand\u00e9 TF, Klein J, Le Traon Y (2015) Are your training datasets yet relevant? In: International Symposium on Engineering Secure Software and Systems, pp. 51\u201367. Springer","DOI":"10.1007\/978-3-319-15618-7_5"},{"key":"10375_CR6","doi-asserted-by":"crossref","unstructured":"Allix K, Bissyand\u00e9 TF, Klein J, Le Traon Y (2016) Androzoo: Collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, pp. 468\u2013471. ACM","DOI":"10.1145\/2901739.2903508"},{"key":"10375_CR7","doi-asserted-by":"crossref","unstructured":"Alshahrani H, Mansourt H, Thorn S, Alshehri A, Alzahrani A, Fu H (2019) Ddefender: Android application threat detection using static and dynamic analysis. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICCE.2018.8326293"},{"key":"10375_CR8","unstructured":"Android (2019) UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey"},{"key":"10375_CR9","first-page":"23","volume":"14","author":"D Arp","year":"2014","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: Effective and explainable detection of android malware in your pocket. Ndss 14:23\u201326","journal-title":"Ndss"},{"key":"10375_CR10","doi-asserted-by":"publisher","unstructured":"Arzt S, Rasthofer S, Fritz C, Bodden E, Bartel A, Klein J, Le Traon Y, Octeau D, McDaniel P (2014) Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-awaretaint analysis for Android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI\u201914, pp. 259-269. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2594291.2594299","DOI":"10.1145\/2594291.2594299"},{"key":"10375_CR11","doi-asserted-by":"crossref","unstructured":"Au KWY, Zhou YF, Huang Z, Lie D (2012) Pscout: analyzing the Android permission specification. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 217\u2013228. ACM","DOI":"10.1145\/2382196.2382222"},{"key":"10375_CR12","doi-asserted-by":"crossref","unstructured":"Bai Y, Xing Z, Li X, Feng Z, Ma D (2020) Unsuccessful story about few shot malware family classification and siamese network to the rescue. In: 2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE), pp. 1560\u20131571. IEEE","DOI":"10.1145\/3377811.3380354"},{"issue":"8","key":"10375_CR13","first-page":"1","volume":"20","author":"I Barandiaran","year":"1998","unstructured":"Barandiaran I (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):1\u201322","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10375_CR14","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing T, Batyuk L, Schmidt AD, Camtepe SA, Albayrak S (2010) An android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software, pp. 55\u201362. IEEE","DOI":"10.1109\/MALWARE.2010.5665792"},{"issue":"2","key":"10375_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3371924","volume":"29","author":"H Cai","year":"2020","unstructured":"Cai H (2020) Assessing and improving malware detection sustainability through app evolution studies. ACM Transactions on Software Engineering and Methodology (TOSEM) 29(2):1\u201328","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"10375_CR16","doi-asserted-by":"crossref","unstructured":"Chan PP, Song WK (2014) Static detection of android malware by using permissions and api calls. In: 2014 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 82\u201387. IEEE","DOI":"10.1109\/ICMLC.2014.7009096"},{"key":"10375_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research 16:321\u2013357","journal-title":"Journal of artificial intelligence research"},{"key":"10375_CR18","doi-asserted-by":"crossref","unstructured":"Chen S, Xue M, Tang Z, Xu L, Zhu H (2016) Stormdroid: A streaminglized machine learning-based system for detecting android malware. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 377\u2013388","DOI":"10.1145\/2897845.2897860"},{"key":"10375_CR19","doi-asserted-by":"crossref","unstructured":"Choudhary SR, Gorla A, Orso A (2015) Automated test input generation for android: Are we there yet?(e). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 429\u2013440. IEEE","DOI":"10.1109\/ASE.2015.89"},{"key":"10375_CR20","doi-asserted-by":"crossref","unstructured":"Demissie BF, Ceccato M, Shar LK (2018) Anflo: Detecting anomalous sensitive informa41 tion flows in android apps. In: 2018 IEEE\/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp. 24\u201334. IEEE","DOI":"10.1145\/3197231.3197238"},{"issue":"6","key":"10375_CR21","doi-asserted-by":"publisher","first-page":"5084","DOI":"10.1007\/s10664-020-09879-8","volume":"25","author":"BF Demissie","year":"2020","unstructured":"Demissie BF, Ceccato M, Shar LK (2020) Security analysis of permission re-delegation vulnerabilities in android apps. Empir Softw Eng 25(6):5084\u20135136","journal-title":"Empir Softw Eng"},{"key":"10375_CR22","doi-asserted-by":"crossref","unstructured":"Deng L, Yu D et al (2014) Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing 7(3\u20134):197\u2013387","DOI":"10.1561\/2000000039"},{"key":"10375_CR23","doi-asserted-by":"crossref","unstructured":"Dini G, Martinelli F, Saracino A, Sgandurra D (2012) Madam: a multi-level anomaly detec tor for android malware. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 240\u2013253. Springer","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"10375_CR24","doi-asserted-by":"crossref","unstructured":"Enck W, Ongtang M, McDaniel P (2009) On lightweight mobile phone application certifi51 cation. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 235\u2013245. ACM","DOI":"10.1145\/1653662.1653691"},{"issue":"3","key":"10375_CR25","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvlc.2012.02.002","volume":"23","author":"M Eskandari","year":"2012","unstructured":"Eskandari M, Hashemi S (2012) A graph mining approach for detecting unknown malwares. J Vis Lang & Comput 23(3):154\u2013162","journal-title":"J Vis Lang & Comput"},{"key":"10375_CR26","doi-asserted-by":"crossref","unstructured":"Fan M, Liu J, Luo X, Chen K, Chen T, Tian Z, Zhang X, Zheng Q, Liu T (2016) Frequent subgraph based familial classification of android malware. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 24\u201335. IEEE","DOI":"10.1109\/ISSRE.2016.14"},{"key":"10375_CR27","doi-asserted-by":"crossref","unstructured":"Fu X, Cai H (2019) On the deterioration of learning-based malware detectors for android. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), pp. 272\u2013273. IEEE","DOI":"10.1109\/ICSE-Companion.2019.00110"},{"issue":"3","key":"10375_CR28","first-page":"11","volume":"26","author":"J Garcia","year":"2018","unstructured":"Garcia J, Hammad M, Malek S (2018) Lightweight, obfuscation-resilient detection and family identification of android malware. ACM Transactions on Software Engineering and Methodology (TOSEM) 26(3):11","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"10375_CR29","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"10375_CR30","doi-asserted-by":"crossref","unstructured":"Huang CY, Tsai YT, Hsu CH (2013) Performance evaluation on permission-based detection for android malware. In: Advances in Intelligent Systems and Applications-Volume 2, pp.111\u2013120. Springer","DOI":"10.1007\/978-3-642-35473-1_12"},{"key":"10375_CR31","doi-asserted-by":"crossref","unstructured":"Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar JD (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp. 43\u201358","DOI":"10.1145\/2046684.2046692"},{"key":"10375_CR32","doi-asserted-by":"crossref","unstructured":"Ikram M, Beaume P, Kaafar MA (2019) Dadidroid: An obfuscation resilient tool for detecting android malware via weighted directed call graph modelling. arXiv:1905.09136","DOI":"10.5220\/0007834602110219"},{"key":"10375_CR33","doi-asserted-by":"publisher","first-page":"S48","DOI":"10.1016\/j.diin.2018.01.007","volume":"24","author":"EB Karbab","year":"2018","unstructured":"Karbab EB, Debbabi M, Derhab A, Mouheb D (2018) Maldozer: Automatic framework for android malware detection using deep learning. Digital Investigation 24:S48\u2013S59","journal-title":"Digital Investigation"},{"issue":"3","key":"10375_CR34","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2018","unstructured":"Kim T, Kang B, Rho M, Sezer S, Im EG (2018) A multimodal deep learning method for android malware detection using various features. IEEE Transactions on Information Forensics and Security 14(3):773\u2013788","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10375_CR35","doi-asserted-by":"crossref","unstructured":"Lindorfer M, Neugschwandtner M, Platzer C (2015) Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis. In: 2015 IEEE 39th annual computer software and applications conference, vol. 2, pp. 422\u2013433. IEEE","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"10375_CR36","doi-asserted-by":"crossref","unstructured":"Lindorfer M, Neugschwandtner M, Weichselbaum L, Fratantonio Y, Van Der Veen V, Platzer C (2014) Andrubis-1,000,000 apps later: A view on current android malware behaviors. In: 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS), pp. 3\u201317. IEEE","DOI":"10.1109\/BADGERS.2014.7"},{"key":"10375_CR37","doi-asserted-by":"crossref","unstructured":"Liu X, Liu J (2014) A two-layered permission-based android malware detection scheme. In: 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 142\u2013148. IEEE","DOI":"10.1109\/MobileCloud.2014.22"},{"key":"10375_CR38","doi-asserted-by":"crossref","unstructured":"Liu Y, Tantithamthavorn C, Li L, Liu Y (2022) Deep learning for android malware defenses: a systematic literature review. ACM Journal of the ACM (JACM)","DOI":"10.1145\/3544968"},{"key":"10375_CR39","doi-asserted-by":"crossref","unstructured":"Liu Z, Xia X, Hassan AE, Lo D, Xing Z, Wang X (2018) Neural-machine-translation based commit message generation: how far are we? In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 373\u2013384","DOI":"10.1145\/3238147.3238190"},{"key":"10375_CR40","doi-asserted-by":"publisher","first-page":"21235","DOI":"10.1109\/ACCESS.2019.2896003","volume":"7","author":"Z Ma","year":"2019","unstructured":"Ma Z, Ge H, Liu Y, Zhao M, Ma J (2019) A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE access 7:21235\u201321245","journal-title":"IEEE access"},{"key":"10375_CR41","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doup\u00e9 A et al (2017) Deep android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp.301\u2013308. ACM","DOI":"10.1145\/3029806.3029823"},{"key":"10375_CR42","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems 26"},{"key":"10375_CR43","unstructured":"Narayanan A, Chandramohan M, Venkatesan R, Chen L, Liu Y, Jaiswal S (2017) graph2vec: Learning distributed representations of graphs. arXiv:1707.05005"},{"key":"10375_CR44","doi-asserted-by":"crossref","unstructured":"Narayanan A, Soh C, Chen L, Liu Y, Wang L (2018) apk2vec: Semi-supervised multi-view representation learning for profiling android applications. In: 2018 IEEE International Conference on Data Mining (ICDM), pp. 357\u2013366. IEEE","DOI":"10.1109\/ICDM.2018.00051"},{"issue":"1","key":"10375_CR45","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Computing 20(1):343\u2013357","journal-title":"Soft Computing"},{"key":"10375_CR46","unstructured":"Naway A, Li Y (2018) A review on the use of deep learning in android malware detection. arXiv preprint arXiv:1812.10360"},{"issue":"2","key":"10375_CR47","first-page":"14","volume":"22","author":"L Onwuzurike","year":"2019","unstructured":"Onwuzurike L, Mariconti E, Andriotis P, Cristofaro ED, Ross G, Stringhini G (2019) Mamadroid: Detecting android malware by building markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security (TOPS) 22(2):14","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"10375_CR48","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12:2825\u20132830","journal-title":"Journal of Machine Learning Research"},{"key":"10375_CR49","unstructured":"Pendlebury F, Pierazzi F, Jordaney R, Kinder J, Cavallaro L et al (2019) Tesseract: Eliminating experimental bias in malware classification across space and time. In: Proceedings of the 28th USENIX Security Symposium, pp. 729\u2013746. USENIX Association"},{"key":"10375_CR50","doi-asserted-by":"crossref","unstructured":"Rastogi V, Chen Y, Jiang X (2013) Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 329\u2013334","DOI":"10.1145\/2484313.2484355"},{"key":"10375_CR51","doi-asserted-by":"crossref","unstructured":"Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, \u00c1lvarez G (2013) Puma:Permission usage to detect malware in android. In: International Joint Conference CISIS\u201912-ICEUTE 12-SOCO 12 Special Sessions, pp. 289\u2013298. Springer","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"10375_CR52","doi-asserted-by":"crossref","unstructured":"Shahpasand M, Hamey L, Vatsalan D, Xue M (2019) Adversarial attacks on mobile malware detection. In: 2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile (AI4Mobile), pp. 17\u201320. IEEE","DOI":"10.1109\/AI4Mobile.2019.8672711"},{"key":"10375_CR53","doi-asserted-by":"crossref","unstructured":"Shar LK, Demissie BF, Ceccato M, Minn W (2020) Experimental comparison of features and classifiers for android malware detection. In: Proceedings of the IEEE\/ACM 7th International Conference on Mobile Software Engineering and Systems, pp. 50\u201360. IEEE\/ACM","DOI":"10.1145\/3387905.3388596"},{"key":"10375_CR54","doi-asserted-by":"crossref","unstructured":"Sharma A, Dash SK (2014) Mining api calls and permissions for android malware detection. In: International Conference on Cryptology and Network Security, pp. 191\u2013205. Springer","DOI":"10.1007\/978-3-319-12280-9_13"},{"issue":"6","key":"10375_CR55","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1109\/TMC.2018.2861405","volume":"18","author":"F Shen","year":"2018","unstructured":"Shen F, Del Vecchio J, Mohaisen A, Ko SY, Ziarek L (2018) Android malware detection using complex-flows. IEEE Transactions on Mobile Computing 18(6):1231\u20131245","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10375_CR56","doi-asserted-by":"crossref","unstructured":"Shi L, Ming J, Fu J, Peng G, Xu D, Gao K, Pan X (2020) Vahunt: Warding off new repackaged android malware in app-virtualization\u2019s clothing. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 535\u2013549","DOI":"10.1145\/3372297.3423341"},{"key":"10375_CR57","unstructured":"Soot (2018) Soot - a java optimization framework, https:\/\/github.com\/sable\/soot"},{"key":"10375_CR58","doi-asserted-by":"crossref","unstructured":"Spreitzenbarth M, Freiling F, Echtler F, Schreck T, Hoffmann J (2013) Mobile-sandbox: having a deeper look into android applications. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1808\u20131815","DOI":"10.1145\/2480362.2480701"},{"key":"10375_CR59","doi-asserted-by":"crossref","unstructured":"Suarez-Tangil G, Dash SK, Ahmadi M, Kinder J, Giacinto G, Cavallaro L (2017) Droidsieve: Fast and accurate classification of obfuscated android malware. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp.309\u2013320","DOI":"10.1145\/3029806.3029825"},{"key":"10375_CR60","unstructured":"Symantec (2019) Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf"},{"key":"10375_CR61","doi-asserted-by":"crossref","unstructured":"Thom\u00e9 J, Shar LK, Bianculli D, Briand L (2017) Search-driven string constraint solving for vulnerability detection. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 198\u2013208. IEEE","DOI":"10.1109\/ICSE.2017.26"},{"key":"10375_CR62","doi-asserted-by":"crossref","unstructured":"Tobiyama S, Yamaguchi Y, Shimada H, Ikuse T, Yagi T (2016) Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577\u2013582. IEEE","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"10375_CR63","doi-asserted-by":"crossref","unstructured":"Tobiyama S, Yamaguchi Y, Shimada H, Ikuse T, Yagi T (2016) Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577\u2013582. IEEE","DOI":"10.1109\/COMPSAC.2016.151"},{"issue":"2","key":"10375_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3423096","volume":"30","author":"B Wu","year":"2021","unstructured":"Wu B, Chen S, Gao C, Fan L, Liu Y, Wen W, Lyu MR (2021) Why an android app is classified as malware: Toward malware classification interpretation. ACM Transactions on Software Engineering and Methodology (TOSEM) 30(2):1\u201329","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"10375_CR65","doi-asserted-by":"crossref","unstructured":"Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) Droidmat: Android malware detection through manifest and api calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security, pp. 62\u201369. IEEE","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"10375_CR66","doi-asserted-by":"crossref","unstructured":"Xu B, Shirani A, Lo D, Alipour MA (2018) Prediction of relatedness in stack overflow: deep learning vs. svm: a reproducibility study. In: Proceedings of the 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1\u201310","DOI":"10.1145\/3239235.3240503"},{"key":"10375_CR67","doi-asserted-by":"publisher","unstructured":"Xu K, Li Y, Deng R, Chen K, Xu J (2019) Droidevolver: Self-evolving android malware detection system. In: 2019 IEEE European Symposium on Security and Privacy (EuroSP), pp. 47\u201362. https:\/\/doi.org\/10.1109\/EuroSP.2019.00014","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"10375_CR68","doi-asserted-by":"crossref","unstructured":"Xu K, Li Y, Deng RH, Chen K (2018) Deeprefiner: Multi-layer android malware detection system applying deep neural networks. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 473\u2013487. IEEE","DOI":"10.1109\/EuroSP.2018.00040"},{"key":"10375_CR69","doi-asserted-by":"crossref","unstructured":"Yang W, Prasad M, Xie T (2018) Enmobile: Entity-based characterization and analysis of mobile malware. In: 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE), pp. 384\u2013394. IEEE","DOI":"10.1145\/3180155.3180223"},{"key":"10375_CR70","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.infsof.2017.04.007","volume":"90","author":"X Yang","year":"2017","unstructured":"Yang X, Lo D, Li L, Xia X, Bissyand\u00e9 TF, Klein J (2017) Characterizing malicious android apps by mining topic-specific data flow signatures. Information and Software Technology 90:27\u201339","journal-title":"Information and Software Technology"},{"issue":"6","key":"10375_CR71","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1049\/iet-ifs.2014.0099","volume":"9","author":"SY Yerima","year":"2015","unstructured":"Yerima SY, Sezer S, Muttik I (2015) High accuracy android malware detection using ensemble learning. IET Information Security 9(6):313\u2013320","journal-title":"IET Information Security"},{"key":"10375_CR72","doi-asserted-by":"crossref","unstructured":"Yuan Z, Lu Y,Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. In: ACMSIGCOMMComputer Communication Review, vol. 44, pp. 371\u2013372. ACM","DOI":"10.1145\/2740070.2631434"},{"key":"10375_CR73","doi-asserted-by":"crossref","unstructured":"Zhang M, Duan Y, Yin H, Zhao Z (2014) Semantics-aware android malware classification using weighted contextual api dependency graphs. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp. 1105\u20131116","DOI":"10.1145\/2660267.2660359"},{"key":"10375_CR74","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhang Y, Zhong M, Ding D, Cao Y, Zhang Y, Zhang M, Yang M (2020) Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 757\u2013770","DOI":"10.1145\/3372297.3417291"},{"issue":"3","key":"10375_CR75","first-page":"1","volume":"30","author":"Y Zhao","year":"2021","unstructured":"Zhao Y, Li L, Wang H, Cai H, Bissyand\u00e9 TF, Klein J, Grundy J (2021) On the impact of sample duplication in machine-learning-based android malware detection. ACM Transactions on Software Engineering and Methodology (TOSEM) 30(3):1\u201338","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"10375_CR76","doi-asserted-by":"crossref","unstructured":"Zou D, Wu Y, Yang S, Chauhan A, Yang W, Zhong J, Dou S, Jin H (2021) Intdroid: Android malware detection based on api intimacy analysis. ACM Transactions on Software Engineering and Methodology (TOSEM) 30(3):1\u201332","DOI":"10.1145\/3442588"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10375-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10375-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10375-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T12:08:21Z","timestamp":1701259701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10375-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":76,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["10375"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10375-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"24 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}],"article-number":"130"}}