{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:53:34Z","timestamp":1768550014313,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","award":["675320"],"award-info":[{"award-number":["675320"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11416-019-00335-w","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T02:04:18Z","timestamp":1560996258000},"page":"249-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3149-0957","authenticated-orcid":false,"given":"Duy-Phuc","family":"Pham","sequence":"first","affiliation":[]},{"given":"Duc-Ly","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"key":"335_CR1","unstructured":"Beek, C., Frosst, D., Greve, P., Gund, Y., Moreno, F., Peterson, E. Schmugar, C., Simon, R., Sommer, D., Sun, B., Tiwari, R., Weafer, V.: Mcafee labs threats report. \nhttps:\/\/goo.gl\/bKfcW3\n\n (2017). Accessed 19 July 2017"},{"key":"335_CR2","unstructured":"Walkup, E.: Mac-sandbox:an os x extension for the open-source cuckoo sandbox for malware analysis. \nhttps:\/\/github.com\/ewalkup\/cuckoomac\n\n (2014). Accessed 20 July 2017"},{"key":"335_CR3","unstructured":"Guarnieri, C., Tanasi, A., Bremer, J., Schloesser, M.: Automated malware analysis\u2014cuckoo sandbox. \nhttp:\/\/www.cuckoosandbox.org\n\n (2012). Accessed 30 Aug 2017"},{"key":"335_CR4","unstructured":"Hsieh, S., Wu, P., Liu, H.: Automatic classifying of mac os x samples, VB2016. \nhttps:\/\/www.virusbulletin.com\/conference\/vb2016\/abstracts\/automatic-classifying-mac-os-x-samples\n\n (2016). Accessed 20 July 2017"},{"key":"335_CR5","unstructured":"Loukas, K.: Mac efi rootkits, BlackHat. \nhttp:\/\/ho.ax\/De_Mysteriis_Dom_Jobsivs_Black_Hat_Paper.pdf\n\n (2012). Accessed 19 July 2017"},{"key":"335_CR6","doi-asserted-by":"crossref","unstructured":"Hudson, T., Kovah, X., Kallenberg, C.: Thunderstrike 2: Sith strike. Black Hat USA Briefings (2015)","DOI":"10.1145\/2757667.2757673"},{"key":"335_CR7","unstructured":"Apple: Mac os x security configuration for mac os x version 10.6 snow leopard. \nhttps:\/\/ssl.apple.com\/support\/security\/guides\/docs\/$SnowLeopard_Security_Config_v10$.6.pdf\n\n (2010). Accessed 19 July 2017"},{"key":"335_CR8","unstructured":"Blazakis, D.: The apple sandbox. BlackHat DC (2011)"},{"key":"335_CR9","unstructured":"Wardle, P.: Methods of malware persistence on mac os x. In: Proceedings of the Virus Bulletin Conference (2014)"},{"issue":"3","key":"335_CR10","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11416-017-0307-5","volume":"14","author":"HH Pajouh","year":"2018","unstructured":"Pajouh, H.H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3), 213\u2013223 (2018)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"335_CR11","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Miller, B., Neugschwandtner, M., Platzer, C.: Take a bite-finding the worm in the apple. In: 2013 9th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/ICICS.2013.6782846"},{"key":"335_CR12","unstructured":"Wardle, P.: Dylib hijacking on os x, CanSecWest 2015. \nhttps:\/\/www.virusbulletin.com\/virusbulletin\/2015\/03\/dylib-hijacking-os-x\n\n (2015). Accessed 20 July 2017"},{"key":"335_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.diin.2015.05.005","volume":"14","author":"A Case","year":"2015","unstructured":"Case, A., Richard, G.G.: Advancing mac os x rootkit detection. Digit. Investig. 14, 25\u201333 (2015)","journal-title":"Digit. Investig."},{"key":"335_CR14","unstructured":"Rentzsch, J.W.: Dynamically overriding mac os x. \nhttp:\/\/rentzsch.com\/papers\/overridingMacOSX\n\n; \nhttps:\/\/papers.put.as\/papers\/macosx\/2003\/overridingMacOSX.pdf\n\n (2003). Accessed 30 July 2017"},{"key":"335_CR15","first-page":"338","volume-title":"Lecture Notes in Computer Science","author":"Martina Lindorfer","year":"2011","unstructured":"Lindorfer, M., Kolbitsch, C., Milani\u00a0Comparetti, P.: Detecting environment-sensitive malware. In: Recent Advances in Intrusion Detection, pp. 338\u2013357. Springer, Berlin (2011)"},{"key":"335_CR16","unstructured":"Balzarotti, D., Cova, M., Karlberger, C., Kirda, E., Kruegel, C., Vigna, G.: Efficient detection of split personalities in malware. In: NDSS (2010)"},{"key":"335_CR17","unstructured":"Yonts, J.: Mac osx startup, Malicious Streams (2011)"},{"key":"335_CR18","unstructured":"Phuc, P.D.: What is safefinder\/operatormac campaign?. \nhttps:\/\/wp.me\/p72HMd-b5\n\n (2017). Accessed 30 Aug 2017"},{"key":"335_CR19","unstructured":"Phuc, P.D., Massacci, F.: Mac-a-mal: an automated framework for mac malware hunting. BlackHat Asia (2018)"},{"key":"335_CR20","unstructured":"Ming-chieh Pan, S.-t.T.: A mac os x rootkit uses the tricks you haven\u2019t known yet. BlackHat Asia (2014)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-019-00335-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-019-00335-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-019-00335-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T13:54:54Z","timestamp":1596117294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-019-00335-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,20]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["335"],"URL":"https:\/\/doi.org\/10.1007\/s11416-019-00335-w","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,20]]},"assertion":[{"value":"4 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}