{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:24:43Z","timestamp":1767903883729,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2012,4,26]],"date-time":"2012-04-26T00:00:00Z","timestamp":1335398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s11416-012-0162-3","type":"journal-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T11:21:49Z","timestamp":1335352909000},"page":"61-71","source":"Crossref","is-referenced-by-count":40,"title":["Reducing the window of opportunity for Android malware Gotta catch \u2019em all"],"prefix":"10.1007","volume":"8","author":[{"given":"Axelle","family":"Apvrille","sequence":"first","affiliation":[]},{"given":"Tim","family":"Strazzere","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,26]]},"reference":[{"key":"162_CR1","unstructured":"Anderson, C., Wolff, M.: The web is dead. Long live the internet. (2010). http:\/\/www.wired.com\/magazine\/2010\/08\/ff_webrip\/all\/1"},{"key":"162_CR2","unstructured":"Apvrille, A., Zhang, J.: Four malware and a funeral. In: 5th Conf. on Network architectures and information systems security (SAR-SSI) (2010)"},{"key":"162_CR3","unstructured":"Armstrong, T., Maslennikov, D.: Android malware is on the rise. In: Virus bulletin conference (2011)"},{"key":"162_CR4","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing, T., Schmidt, A.-D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 5th international conference on malicious and unwanted software (MALWARE\u20192010). Nancy, France (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"162_CR5","unstructured":"Cannon, T.: No-permission Android App Gives Remote Shell. (2011). http:\/\/viaforensics.com\/security\/nopermission-android-app-remote-shell.html"},{"key":"162_CR6","unstructured":"Ikinci, A., Holz, T., Freiling, F.C.: Monkey-spider: detecting malicious websites with low-interaction honeyclients. In: Sicherheit, pp. 407\u2013421 (2008)"},{"key":"162_CR7","unstructured":"Logan, R., Desnos, A., Smith, R.: The Android marketplace Crawler (2011). http:\/\/www.honeynet.org\/gsoc\/ideas"},{"key":"162_CR8","unstructured":"Lookout mobile security: lookout mobile threat report (2011)"},{"key":"162_CR9","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th acm sigkdd international conference on knowledge discovery and data mining, pp. 1245\u20131254. ACM, New York (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"162_CR10","unstructured":"McAffee Labs.: Mc Affee threats report: third quarter 2011 (2011). http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q3-2011.pdf"},{"key":"162_CR11","unstructured":"Pi\u0161ljar, P.: Reversing Android market protocol (2010). http:\/\/peter.pisljar.si\/"},{"key":"162_CR12","unstructured":"de Pontev\u00e8s, K.: Android Malware Surges in 2011 \u00a0(2011). https:\/\/blog.fortinet.com\/android-malware-surges-in-2011"},{"key":"162_CR13","unstructured":"Protocol Buffers.: (n.d.). http:\/\/code.google.com\/p\/protobuf\/"},{"key":"162_CR14","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S.: Smartphone malware evolution revisited: Android next target? In: 4th international conference on malicious and unwanted software (malware), IEEE, pp. 1\u20137 (2009)","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"162_CR15","unstructured":"Smali.: (n.d.). https:\/\/code.google.com\/p\/smali"},{"key":"162_CR16","unstructured":"Strazzere, T.: Downloading market applications without the Vending app. (2009). http:\/\/strazzere.com\/blog\/?p=293"},{"key":"162_CR17","doi-asserted-by":"crossref","unstructured":"Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., et\u00a0al.: Android market analysis with activation patterns. In: Proceedings of the international ICST conference on security and privacy in mobile information and communication (MobiSec) (2011)","DOI":"10.1007\/978-3-642-30244-2_1"},{"key":"162_CR18","unstructured":"Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., et\u00a0al.: Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities. In: Proceedings of the network and distributed system security symposium, NDSS 2006, San Diego, California, USA. The Internet Society (2006)"},{"key":"162_CR19","unstructured":"Wikipedia: Android Market (2011). https:\/\/en.wikipedia.org\/wiki\/Android_Market"},{"key":"162_CR20","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th network and distributed system security symposium (NDSS 2012), San Diego, CA (2012)"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0162-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-012-0162-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0162-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T22:44:56Z","timestamp":1561675496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-012-0162-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,26]]},"references-count":20,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["162"],"URL":"https:\/\/doi.org\/10.1007\/s11416-012-0162-3","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,26]]}}}