{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:26:43Z","timestamp":1705019203006},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11416-015-0245-z","type":"journal-article","created":{"date-parts":[[2015,6,30]],"date-time":"2015-06-30T03:56:22Z","timestamp":1435636582000},"page":"235-245","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SherlockDroid: a research assistant to spot unknown malware in Android marketplaces"],"prefix":"10.1007","volume":"11","author":[{"given":"Axelle","family":"Apvrille","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,1]]},"reference":[{"key":"245_CR1","unstructured":"Harley, D., Lee, A.: Heuristic analysis\u2014detecting unknown viruses. http:\/\/www.eset.com\/us\/resources\/white-papers\/Heuristic_Analysis.pdf (2007)"},{"key":"245_CR2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses\u2014theory and experiments. Comput. Secur. 6, 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"245_CR3","unstructured":"Mills, E.: Users upset after CA anti-virus detects Windows system file as virus (2009). http:\/\/www.cnet.com\/news\/users-upset-after-ca-anti-virus-detects-windows-system-file-as-virus\/"},{"key":"245_CR4","unstructured":"Popa, B.: AVG anti-virus breaks down Windows XP due to false positive. http:\/\/news.softpedia.com\/news\/AVG-Anti-Virus-Breaks-Down-Windows-XP-Due-to-False-Positive-337395.shtml (2013)"},{"key":"245_CR5","unstructured":"Seltzer, L.: Lessons of the McAfee false positive Fiasco. http:\/\/securitywatch.pcmag.com\/malware\/283982-lessons-of-the-mcafee-false-positive-fiasco (2010)"},{"key":"245_CR6","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. SPSM \u201911, pp. 15\u201326. ACM, New York, NY, USA (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"245_CR7","doi-asserted-by":"crossref","unstructured":"Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: Madam: a multi-level anomaly detector for android malware. Computer Network Security. In: 6th International Conference on Mathematical Methods. Models and Architectures for Computer Network Security, MMM-ACNS, Lecture Notes in Computer Science, vol. 7531, pp. 240\u2013253. Springer, St. Petersburg, Russia (2012)","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"245_CR8","doi-asserted-by":"crossref","unstructured":"Xie, L., Zhang, X., Seifert, J.P., Zhu, S.: pBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the third ACM conference on Wireless network security. WiSec \u201910, pp. 37\u201348. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1741866.1741874"},{"key":"245_CR9","doi-asserted-by":"crossref","unstructured":"Lindorder, M., et al.: Andrubis\u20141,000,000 apps later: a view on current android malware behaviors. In: Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"245_CR10","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201910, pp. 1\u20136. USENIX Association, Berkeley, CA, USA (2010). URL http:\/\/dl.acm.org\/citation.cfm?id=1924943.1924971"},{"key":"245_CR11","doi-asserted-by":"crossref","unstructured":"Lindorfer, M.e.a.: AndRadar: fast discovery of android applications in alternative markets. In: Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (2014)","DOI":"10.1007\/978-3-319-08509-8_4"},{"key":"245_CR12","doi-asserted-by":"crossref","unstructured":"Viennot, N., Garcia, E., Nieh, J.: A measurement study of google play. In: The 2014 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS \u201914, pp. 221\u2013233. ACM, New York, NY, USA (2014)","DOI":"10.1145\/2591971.2592003"},{"key":"245_CR13","unstructured":"Aung, Z., Zaw, W.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2 (2013)"},{"key":"245_CR14","unstructured":"Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: USENIX Security Symposium, pp. 569\u2013584 (2012)"},{"key":"245_CR15","doi-asserted-by":"crossref","unstructured":"Bl\u00e4sing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An Android application Sandbox System for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software (MALWARE\u20192010). Nancy, France (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"issue":"1","key":"245_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161\u2013190 (2012). doi: 10.1007\/s10844-010-0148-x","journal-title":"J. Intell. Inf. Syst."},{"key":"245_CR17","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Habner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of Android malware in your pocket. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"245_CR18","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. CODASPY \u201913, pp. 209\u2013220. ACM, New York, NY, USA (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"245_CR19","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012). San Diego, CA, USA (2012)"},{"key":"245_CR20","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: Proceedings of the 6th European Workshop on System Security (EUROSEC 2013). Prague, Czech Republic (2013)"},{"key":"245_CR21","doi-asserted-by":"crossref","unstructured":"Apvrille, A., Strazzere, T.: Reducing the window of opportunity for Android malware. Gotta catch\u2019em all. J. Comput. Virol. 8, 61\u201371 (2012)","DOI":"10.1007\/s11416-012-0162-3"},{"key":"245_CR22","unstructured":"Demiroz, A.: Google play crawler java api. https:\/\/github.com\/Akdeniz\/google-play-crawler"},{"key":"245_CR23","unstructured":"INTERPOL, Kaspersky Lab: 60\u00a0% of android attacks use financial malware. http:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/sixty-per-cent-of-Android-attacks-use-financial-malware"},{"key":"245_CR24","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: MAST: triage for market-scale mobile malware analysis. In: Proceedings of 6th WiSec (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"245_CR25","doi-asserted-by":"crossref","unstructured":"Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., Maranon, G.A.: Puma: Permission usage to detect malware in android. In: A. Herrero, V., Snasel, A., Abraham, I., Zelinka, B., Baruque, H., Quintian-Pardo, J.L., Calvo-Rolle, J., Sedano, E., Corchado (eds.) CISIS\/ICEUTE\/SOCO Special Sessions, Advances in Intelligent Systems and Computing, vol. 189, pp. 289\u2013298. Springer. URL http:\/\/dblp.uni-trier.de\/db\/conf\/softcomp\/soco2012s.html#SanzSLUBA12 (2012)","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"245_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, M., Zhang, T., Ge, F., Yuan, Z.: Robotdroid: a lightweight malware detection framework on smartphones. J. Netw. 7(4) (2012). URL http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/jnw0704715722","DOI":"10.4304\/jnw.7.4.715-722"},{"key":"245_CR27","unstructured":"Schulz, Patrick.: Dalvik Bytecode Obfuscation on Android (2012). http:\/\/www.dexlabs.org\/blog\/bytecode-obfuscation"},{"key":"245_CR28","doi-asserted-by":"publisher","unstructured":"Lindorfer, M., Kolbitsch, C., Milani Comparetti, P.: Detecting environment-sensitive malware. In: Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, RAID\u201911, pp. 338\u2013357. Springer-Verlag, Berlin, Heidelberg (2011). doi: 10.1007\/978-3-642-23644-0_18","DOI":"10.1007\/978-3-642-23644-0_18"},{"key":"245_CR29","unstructured":"Book, T., Pridgen, A., Wallach, D.S.: Longitudinal analysis of android ad library permissions. CoRR abs\/1303.0857 (2013)"},{"key":"245_CR30","unstructured":"de Pontev\u00e8s, K., Apvrille, A.: Analysis of android in-app advertisement kits. In: The 23rd Virus Bulletin International Conference, pp. 157\u2013162 (2013)"},{"key":"245_CR31","unstructured":"Fortiguard Center: Android\/RuSMS.AO (2013). Fortiguard Encyclopedia, http:\/\/www.fortiguard.com\/encyclopedia\/virus\/#id=5897642"},{"key":"245_CR32","unstructured":"Apvrille, L.: Alligator: anaLyzing malware wIth partitioning and probability-based algorithms. http:\/\/alligator.telecom-paristech.fr\/ (2014)"},{"key":"245_CR33","unstructured":"Apvrille, L., Apvrille, A.: Pre-filtering mobile malware with Heuristic techniques. In: GreHack, pp. 43\u201359. Grenoble, France (2013)"},{"key":"245_CR34","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1\u201327:27 (2011). Software available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"245_CR35","doi-asserted-by":"crossref","unstructured":"Schapire, R.E., Singer, Y.: Improved boosting algorithms using confidence-rated predictions. In: Machine learning, pp. 80\u201391 (1999)","DOI":"10.1145\/279943.279960"},{"key":"245_CR36","doi-asserted-by":"crossref","unstructured":"Kose, N., Apvrille, L., Dugelay, J.L.: Facial makeup detection technique based on texture and shape analysis. In: 11th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2015) (2015)","DOI":"10.1109\/FG.2015.7163104"},{"key":"245_CR37","unstructured":"Soergel, D.: Efficient training of support vector machines in java. https:\/\/github.com\/davidsoergel\/jlibsvm (2014)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0245-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-015-0245-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-015-0245-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T17:03:41Z","timestamp":1566925421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-015-0245-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s11416-015-0245-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}