{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:18Z","timestamp":1776681318116,"version":"3.51.2"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100010187","name":"Universiti Sains Islam Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/ICT04\/USIM\/02\/3"],"award-info":[{"award-number":["FRGS\/1\/2019\/ICT04\/USIM\/02\/3"]}],"id":[{"id":"10.13039\/501100010187","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00477-y","type":"journal-article","created":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T12:02:14Z","timestamp":1684411334000},"page":"533-562","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["iOS mobile malware analysis: a state-of-the-art"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9120-1702","authenticated-orcid":false,"given":"Madihah","family":"Mohd Saudi","sequence":"first","affiliation":[]},{"given":"Muhammad Afif","family":"Husainiamer","sequence":"additional","affiliation":[]},{"given":"Azuan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Mohd Yamani Idna","family":"Idris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,18]]},"reference":[{"key":"477_CR1","doi-asserted-by":"crossref","unstructured":"Garg, S., Baliyan, N.: Comparative analysis of Android and iOS from security viewpoint. Comput. Sci. Rev. 40,(2021)","DOI":"10.1016\/j.cosrev.2021.100372"},{"key":"477_CR2","first-page":"448","volume":"26","author":"T Shishkova","year":"2021","unstructured":"Shishkova, T.: IT threat evolution in Q3 2021. Mobile Statistics. Securelist 26, 448 (2021)","journal-title":"Securelist"},{"key":"477_CR3","unstructured":"McAfee: Labs Threats Report\u00a0(2021)"},{"key":"477_CR4","unstructured":"McAfee: Labs COVID-19 Threats Report (2020)"},{"key":"477_CR5","unstructured":"Vulnerabilities and threats in mobile applications. \u00a0https:\/\/www.ptsecurity.com\/upload\/corporate\/ww-en\/analytics\/Mobile-Application-Vulnerabilities-and-Threats-2019-eng.pdf (2019). Accessed 26 Dec\u00a02021"},{"key":"477_CR6","unstructured":"Mobile Cyberattacks Impact Every Businesss. https:\/\/blog.checkpoint.com\/wp-content\/uploads\/2017\/04\/Dimensional_Enterprise-Mobile-Security-Survey.pdf (2017). Accessed 26 Aug\u00a02020"},{"key":"477_CR7","unstructured":"Williams, S.: Mobile malware and exploitation amongst biggest cyber threats for 2020.\u00a0Security Brief Asia. https:\/\/securitybrief.asia\/story\/mobile-malware-and-exploitation-amongst-biggest-cyber-threats-for-2020 (2020). Accessed 26 Aug\u00a02020"},{"key":"477_CR8","unstructured":"Khandelwal, S.: Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar.\u00a0https:\/\/thehackernews.com\/2019\/07\/finspy-spyware-android-ios.html (2019). Accessed 13 Aug\u00a02020"},{"key":"477_CR9","unstructured":"Khandelwal, S.: \u2018Exodus\u2019 Surveillance Malware Found Targeting Apple iOS Users. The Hacker News. https:\/\/thehackernews.com\/2019\/04\/exodus-ios-malware.html (2019). Accessed 13 Aug\u00a02020"},{"key":"477_CR10","unstructured":"Facebook disrupts hackers who used iOS exploits, malware to spy on Uyghurs | AppleInsider. Apple Insider. https:\/\/appleinsider.com\/articles\/21\/03\/24\/facebook-disrupts-hackers-who-used-ios-exploits-malware-to-spy-on-uyghurs (2021).\u00a0Accessed 20 Oct\u00a02021"},{"key":"477_CR11","unstructured":"Increased Use of Mobile Banking Apps Could Lead to Exploitation: Internet Crime Complaint Center (IC3). https:\/\/www.ic3.gov\/Media\/Y2020\/PSA200610 (2021)"},{"key":"477_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11416-019-00346-7","volume":"16","author":"M Francesco","year":"2020","unstructured":"Francesco, M., Santone, A.: Deep learning for image-based mobile malware detection. J. Comput. Virol. Hacking Tech. 16, 157\u2013171 (2020)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"4","key":"477_CR13","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1088\/1742-6596\/1187\/4\/042045","volume":"1187","author":"G Zhou","year":"2019","unstructured":"Zhou, G., Duan, M., Xi, Q., Wu, H.: ChanDet: detection model for potential channel of iOS applications. J. Phys. Conf. Ser. 1187(4), 214 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1187\/4\/042045","journal-title":"J. Phys. Conf. Ser."},{"key":"477_CR14","first-page":"120","volume":"21","author":"A Nisioti","year":"2017","unstructured":"Nisioti, A., Heydari, M., Mylonas, A., Katos, V., Tafreshi, V.H.F.: TRAWL: protection against rogue sites for the masses. Proc. Int. Conf. Res. Challenges Inf. Sci. 21, 120\u2013127 (2017)","journal-title":"Proc. Int. Conf. Res. Challenges Inf. Sci."},{"key":"477_CR15","doi-asserted-by":"publisher","unstructured":"Bojjagani, S., Sastry, V.N., (2017) VAPTAi: A threat model for vulnerability assessment and penetration testing of android and IoS mobile banking apps, Proc.: IEEE 3rd Int. Conf. Collab. Internet Comput. CIC. (2017). https:\/\/doi.org\/10.1109\/CIC.2017.00022","DOI":"10.1109\/CIC.2017.00022"},{"key":"477_CR16","doi-asserted-by":"publisher","first-page":"487","DOI":"10.5220\/0006217304870492","volume":"2017","author":"A Cimitile","year":"2017","unstructured":"Cimitile, A., Martinelli, F., Mercaldo, F.: Machine learning meets IoS malware: identifying malicious applications on apple environment, ICISSP 2017 Proc. 3rd Int. Conf. Inf. Syst. Secur. Priv. 2017, 487\u2013492 (2017). https:\/\/doi.org\/10.5220\/0006217304870492","journal-title":"Conf. Inf. Syst. Secur. Priv."},{"key":"477_CR17","doi-asserted-by":"crossref","unstructured":"Denis, G.A.D.A., Manuel, M., Carson, W., Eltoweissy, M., Cheng, L.: Biologically inspired safety and security for smart built environments: position paper.\u00a0In: IEEE Symposium on Security and Privacy Workshops, 2018, pp.\u00a0293\u2013298 (2018).\u00a0https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=8424663 Accessed 26 Aug\u00a02020","DOI":"10.1109\/SPW.2018.00047"},{"key":"477_CR18","doi-asserted-by":"publisher","first-page":"17519","DOI":"10.1007\/s11042-017-4586-0","volume":"77","author":"A Firdaus","year":"2018","unstructured":"Firdaus, A., Anuar, N.B., Razak, M.F.A., Sangaiah, A.K.: Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics. Multimed. Tools Appl. 77, 17519\u201317555 (2018). https:\/\/doi.org\/10.1007\/s11042-017-4586-0","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"477_CR19","first-page":"45","volume":"6","author":"K Demertzis","year":"2016","unstructured":"Demertzis, K., Iliadis, L.: Ladon: a cyber-threat bio-inspired intelligence management system. J. Appl. Math. Bioinform. 6(3), 45\u201364 (2016)","journal-title":"J. Appl. Math. Bioinform."},{"key":"477_CR20","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-27478-2_20","volume":"416","author":"K Demertzis","year":"2016","unstructured":"Demertzis, K., Iliadis, L.: Bio-inspired hybrid intelligent method for detecting android malware. Adv. Intell. Syst. Comput. 416, 289\u2013304 (2016)","journal-title":"Adv. Intell. Syst. Comput"},{"issue":"1","key":"477_CR21","doi-asserted-by":"publisher","first-page":"3661","DOI":"10.35940\/ijeat.A2710.109119","volume":"9","author":"MM Saudi","year":"2019","unstructured":"Saudi, M.M., Sukardi, S., Syafiq, A.S.M., Ahmad, A., Afif, M., Husainiamer: Mobile malware classification based on phylogenetics. Int. J. Eng. Adv. Technol 9(1), 3661\u20133665 (2019)","journal-title":"Int. J. Eng. Adv. Technol"},{"issue":"2","key":"477_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11416-020-00376-6","volume":"17","author":"F Mercaldo","year":"2021","unstructured":"Mercaldo, F., Santone, A.: Audio signal processing for Android malware detection and family identification. J. Comput. Virol. Hacking Tech. 17(2), 139\u2013152 (2021)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"477_CR23","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.future.2020.10.008","volume":"115","author":"SI Imtiaz","year":"2021","unstructured":"Imtiaz, S.I., Ur Rehman, S., Javed, A.R., Jalil, Z., Liu, X., Alnumay, W.S.: Deep AMD: detection and identification of android malware using high-efficient deep artificial neural network. Fut. Gener. Comput. Syst. 115, 844\u2013856 (2021)","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"10","key":"477_CR24","doi-asserted-by":"publisher","first-page":"5183","DOI":"10.1007\/s00521-020-05309-4","volume":"33","author":"A Mahindru","year":"2021","unstructured":"Mahindru, A., Sangal, A.L.: MLDroid-framework for Android malware detection using machine learning techniques. Neural Comput. Appl. 33(10), 5183\u20135240 (2021)","journal-title":"Neural Comput. Appl."},{"key":"477_CR25","doi-asserted-by":"publisher","first-page":"102386","DOI":"10.1016\/j.cose.2021.102386","volume":"109","author":"T Frenklach","year":"2021","unstructured":"Frenklach, T., Cohen, D., Shabtai, A., Puzis, R.: Android malware detection via an app similarity graph. Comput. Secur. 109, 102386 (2021)","journal-title":"Comput. Secur."},{"key":"477_CR26","doi-asserted-by":"crossref","unstructured":"Cai, L., Li, Y., Xiong, Z.: JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. Comput. Secur. 100, (2021)","DOI":"10.1016\/j.cose.2020.102086"},{"key":"477_CR27","doi-asserted-by":"publisher","unstructured":"Saudi, M.M., Ahmad, A., Kassim, S.R.M., Husainiamer, M.L., Kassim, A.Z., Zaizi, N.J.: Mobile malware classification for social media application,: Mobile malware classification for social media application. Int. Conf. Cybersecurity, ICoCSec 2019, 70\u201375 (2019). https:\/\/doi.org\/10.1109\/ICOCSEC47621.2019.8970800","DOI":"10.1109\/ICOCSEC47621.2019.8970800"},{"key":"477_CR28","doi-asserted-by":"crossref","unstructured":"Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Formal methods for android banking malware analysis and detection. In:\u00a02019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS Oct. 2019, pp.\u00a0331\u2013336 (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939172"},{"issue":"1","key":"477_CR29","doi-asserted-by":"publisher","first-page":"90","DOI":"10.24908\/ss.v18i1.13118","volume":"18","author":"TN Cooke","year":"2020","unstructured":"Cooke, T.N.: Metadata, jailbreaking, and the cybernetic governmentality of ios: or, the need to distinguish digital privacy from digital privacy. Surveill. Soc. 18(1), 90\u2013103 (2020)","journal-title":"Surveill. Soc."},{"issue":"2","key":"477_CR30","doi-asserted-by":"publisher","first-page":"205","DOI":"10.21108\/indojc.2019.4.2.349","volume":"4","author":"A Aenurahman Ali","year":"2019","unstructured":"Aenurahman Ali, A., Dwi Wahyu, N., Cahyani, Musthofa Jadied, E.: Digital forensic analysis on iDevice: Jailbreak iOS 12.1.1 as a case study. Indones J. Comput. 4(2), 205\u2013218 (2019). https:\/\/doi.org\/10.21108\/indojc.2019.4.2.349","journal-title":"Indones J. Comput."},{"key":"477_CR31","first-page":"479","volume":"5","author":"X Gui","year":"2016","unstructured":"Gui, X., Liu, J., Chi, M., Li, C., Lei, Z.: Analysis of malware application based on massive network traffic. Science 5, 479 (2016)","journal-title":"Science"},{"key":"477_CR32","doi-asserted-by":"publisher","first-page":"41178","DOI":"10.1117\/12.2203437","volume":"9794","author":"B Gao","year":"2015","unstructured":"Gao, B., Wang, Y., Chen, Z., Tang, J.: Data threats analysis and prevention on iOS platform. Sixth Int. Conf. Electron. Inf. Eng. 9794, 41178 (2015). https:\/\/doi.org\/10.1117\/12.2203437","journal-title":"Sixth Int. Conf. Electron. Inf. Eng."},{"issue":"4","key":"477_CR33","doi-asserted-by":"publisher","first-page":"146","DOI":"10.9781\/ijimai.2021.09.005","volume":"7","author":"M Deore","year":"2022","unstructured":"Deore, M., Kulkarni, U.: Malware detection using faster region proposals convolution neural network. Int. J. Interact. Multimed Artif. Intell 7(4), 146\u2013162 (2022). https:\/\/doi.org\/10.9781\/ijimai.2021.09.005","journal-title":"Int. J. Interact. Multimed Artif. Intell"},{"key":"477_CR34","first-page":"174","volume":"6","author":"M Dhalaria","year":"2021","unstructured":"Dhalaria, M., Gandotra, E.: A hybrid approach for android malware detection and family classification. Int. J. Interact. Multimed Artif. Intell. 6, 174\u2013188 (2021)","journal-title":"Int. J. Interact. Multimed Artif. Intell"},{"key":"477_CR35","doi-asserted-by":"publisher","first-page":"101691","DOI":"10.1016\/j.cose.2019.101691","volume":"90","author":"MGCA Cimino","year":"2020","unstructured":"Cimino, M.G.C.A., De Francesco, N., Mercaldo, F., Santone, A., Vaglini, G.: Model checking for malicious family detection and phylogenetic analysis in mobile environment. Comput. Secur. 90, 101691 (2020)","journal-title":"Comput. Secur"},{"issue":"3","key":"477_CR36","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-018-0415-3","volume":"18","author":"ML Bernardi","year":"2019","unstructured":"Bernardi, M.L., Cimitile, M., Distante, D., Martinelli, F., Mercaldo, F.: Dynamic malware detection and phylogeny analysis using process mining. Int. J. Inf. Secur. 18(3), 257\u2013284 (2019)","journal-title":"Int. J. Inf. Secur"},{"key":"477_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/FUZZ-IEEE.2018.8491625","volume":"2018","author":"G Acampora","year":"2018","unstructured":"Acampora, G., Bernardi, M.L., Cimitile, M., Tortora, G., Vitiello, A.: A fuzzy clustering-based approach to study malware phylogeny. IEEE Int. Conf. Fuzzy Syst. 2018, 1\u20138 (2018). https:\/\/doi.org\/10.1109\/FUZZ-IEEE.2018.8491625","journal-title":"IEEE Int. Conf. Fuzzy Syst."},{"issue":"4","key":"477_CR38","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1587\/transinf.2017EDL8172","volume":"E10D","author":"J Liu","year":"2018","unstructured":"Liu, J., Xie, P.D., Liu, M.Z., Wang, Y.J.: Having an insight into malware phylogeny: Building persistent phylogeny tree of families. IEICE Trans. Inf. Syst. E10D(4), 1199\u20131202 (2018). https:\/\/doi.org\/10.1587\/transinf.2017EDL8172","journal-title":"IEICE Trans. Inf. Syst."},{"key":"477_CR39","unstructured":"Ghosh, K., Mills, J., Dorr, J.: Phylogenetic-inspired probabilistic model abstraction in detection of malware families. In: AAAI Fall Symposium Technical Report, vol.\u00a0FS-17-01-, pp.\u00a0200\u2013205 (2017)"},{"key":"477_CR40","unstructured":"Oyen, D., Anderson, B., Anderson-Cook, C.: Bayesian networks with prior knowledge for malware phylogenetics. In: AAAI Working Technical Report, vol.\u00a0WS-16-01-, pp.\u00a0185\u2013192 (2016)"},{"key":"477_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-12571-8","volume":"8819","author":"B Anderson","year":"2014","unstructured":"Anderson, B., Lane, T., Hash, C.: Malware phylogenetics based on the multiview graphical lasso. Comput. Sci. 8819, 1\u201312 (2014). https:\/\/doi.org\/10.1007\/978-3-319-12571-8","journal-title":"Comput. Sci."},{"issue":"10","key":"477_CR42","first-page":"2972","volume":"12","author":"AF Lama","year":"2021","unstructured":"Lama, A.F., Alserhani, H.M.: Social media and cybercrimes. Turkish J. Comput. Math. Educ. 12(10), 2972\u20132981 (2021)","journal-title":"Turkish J. Comput. Math. Educ."},{"issue":"1","key":"477_CR43","first-page":"4158","volume":"21","author":"S Almalki","year":"2021","unstructured":"Almalki, S., Alghamdi, R., Sami, G., Alhakami, W.: Social media security and attacks. IJCSNS Int. J. Comput. Sci. Netw. Secur. 21(1), 4158 (2021)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"issue":"5","key":"477_CR44","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1007\/S40747-021-00409-7","volume":"7","author":"AK Jain","year":"2021","unstructured":"Jain, A.K., Sahoo, S.R., Kaubiyal, J.: Online social networks security and privacy: comprehensive review and analysis. Complex Intell. Syst. 7(5), 2157\u20132177 (2021). https:\/\/doi.org\/10.1007\/S40747-021-00409-7","journal-title":"Complex Intell. Syst."},{"key":"477_CR45","unstructured":"Jones, T.: Social Media and the Effects on the Everyday User, Utica College (2020)"},{"key":"477_CR46","doi-asserted-by":"crossref","unstructured":"Grammatikakis, K.P., Koufos, I., Kolokotronis, N., Vassilakis, C., Shiaeles, S.: Understanding and mitigating banking trojans: from Zeus to Emotet (2021)","DOI":"10.1109\/CSR51186.2021.9527960"},{"issue":"16","key":"477_CR47","first-page":"5899","volume":"99","author":"C Jaride","year":"2021","unstructured":"Jaride, C., Taqi, A.: Mobile banking adoption: a systematic review, and direction for further research. J. Theor. Appl. Inf. Technol. 99(16), 5899 (2021)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"477_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S40747-021-00502-X","volume":"1","author":"PK Roy","year":"2021","unstructured":"Roy, P.K., Shaw, K.: An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS. Complex Intell. Syst. 1, 1\u201322 (2021). https:\/\/doi.org\/10.1007\/S40747-021-00502-X","journal-title":"Complex Intell. Syst."},{"issue":"2","key":"477_CR49","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCE.2018.2881291","volume":"8","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Zeadally, S., Das, A.K.: Mobile banking: evolution and threats: malware threats and security solutions. IEEE Consum. Electron. Mag. 8(2), 56\u201360 (2019). https:\/\/doi.org\/10.1109\/MCE.2018.2881291","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"2","key":"477_CR50","first-page":"2020","volume":"6","author":"M Priyanka","year":"2013","unstructured":"Priyanka, M., Kanoi, V.: Internal structure of iOS and Building tools for iOS apps. Int. J. Comput. Sci. Appl. 6(2), 2020 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"477_CR51","first-page":"635","volume":"25","author":"TM Gronli","year":"2014","unstructured":"Gronli, T.M., Hansen, J., Ghinea, G., Younas, M.: Mobile application platform heterogeneity: android vs windows phone vs iOS vs Firefox OS. Proc. Int. Conf. Adv. Inf. Netw. Appl. AINA 25, 635\u2013641 (2014)","journal-title":"Proc. Int. Conf. Adv. Inf. Netw. Appl. AINA"},{"key":"477_CR52","unstructured":"Chen, K., et al.: pp.\u00a0357\u2013376 (2016)"},{"issue":"2","key":"477_CR53","first-page":"19","volume":"26","author":"YT Chang","year":"2015","unstructured":"Chang, Y.T., Teng, K.C., Tso, Y.C., Wang, S.J.: Jailbroken iPhone forensics for the investigations and controversy to digital evidence. J. Comput 26(2), 19\u201333 (2015)","journal-title":"J. Comput"},{"key":"477_CR54","doi-asserted-by":"crossref","unstructured":"AI-qershi, F., AI-Qurishi, M., AI-Amri, A.: Android vs iOS: The Security Battle (2014). https:\/\/ieeexplore.ieee.org\/document\/691","DOI":"10.1109\/WCCAIS.2014.6916629"},{"key":"477_CR55","unstructured":"Saudi, M.M., Tamil, E.M., Md Siti, A.N., Mohd, Y.I.I., Seman, K.: EDOWA Worm Classification. https:\/\/www.researchgate.net\/publication\/44262015_EDOWA_Worm_Classification#fullTextFileContent (2008). Accessed 27 Aug\u00a02020"},{"issue":"2","key":"477_CR56","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/J.EJOR.2020.10.036","volume":"292","author":"S Doroudi","year":"2021","unstructured":"Doroudi, S., Avgerinos, T., Harchol-Balter, M.: To clean or not to clean: malware removal strategies for servers under load. Eur. J. Oper. Res. 292(2), 596\u2013609 (2021). https:\/\/doi.org\/10.1016\/J.EJOR.2020.10.036","journal-title":"Eur. J. Oper. Res."},{"key":"477_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TC.2021.3082002","volume":"9340","author":"M Ficco","year":"2020","unstructured":"Ficco, M.: Malware analysis by combining multiple detectors and observation windows. IEEE Trans. Comput. 9340, 1\u201314 (2020). https:\/\/doi.org\/10.1109\/TC.2021.3082002","journal-title":"IEEE Trans. Comput."},{"key":"477_CR58","unstructured":"Payload-Definition |Trend Micro, U.S.A. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/payload (2020).\u00a0Accessed 26 Aug\u00a02020"},{"key":"477_CR59","unstructured":"Solanki, N., Sharma, N.: Malware analysis: types and tools[Online]. http:\/\/ijesc.org\/ (2019) Accessed 26 Aug\u00a02020"},{"key":"477_CR60","unstructured":"Lord, N.: What is polymorphic malware? A definition and best practices for defending against polymorphic malware | digital guardian, Digital Guardian.\u00a0https:\/\/digitalguardian.com\/blog\/what-polymorphic-malware-definition-and-best-practices-defending-against-polymorphic-malware (2020).\u00a0Accessed 29 Oct\u00a02021"},{"key":"477_CR61","doi-asserted-by":"publisher","first-page":"90102","DOI":"10.1109\/ACCESS.2021.3090998","volume":"9","author":"J Singh","year":"2021","unstructured":"Singh, J., Thakur, D., Gera, T., Shah, B., Abuhmed, T., Ali, F.: Classification and analysis of android malware images using feature fusion technique. IEEE Access 9, 90102\u201390117 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3090998","journal-title":"IEEE Access"},{"key":"477_CR62","unstructured":"TSR, Hope, C.:\u00a0https:\/\/www.computerhope.com\/jargon\/t\/tsr.htm (2020). Accessed 29 Oct\u00a02021"},{"key":"477_CR63","first-page":"373","volume":"2","author":"S Bhunia","year":"2019","unstructured":"Bhunia, S., Tehranipoor, M.: Hardware obfuscation. Hardw. Secur. 2, 373\u2013396 (2019)","journal-title":"Hardw. Secur."},{"key":"477_CR64","unstructured":"Update your iPhone:\u00a0https:\/\/support.apple.com\/en-us\/HT204204 (2021).\u00a0Accessed 13 Jun\u00a02021"},{"key":"477_CR65","unstructured":"Apple patches iOS zero-day vulnerability exploited by Pegasus spyware|AppleInsider.\u00a0https:\/\/appleinsider.com\/articles\/21\/09\/23\/apple-patches-ios-zero-day-vulnerability-exploited-by-pegasus-spyware (2021). Accessed 19 Oct\u00a02021"},{"key":"477_CR66","unstructured":"Apple Iphone Os:\u00a0https:\/\/www.cvedetails.com\/product\/15556\/Apple-Iphone-Os.html?vendor_id=49 (2021).\u00a0Accessed 19 Oct\u00a02021"},{"issue":"4","key":"477_CR67","doi-asserted-by":"publisher","first-page":"30","DOI":"10.14419\/ijet.v7i4.15.21366","volume":"7","author":"S Azam","year":"2018","unstructured":"Azam, S., Sumra, R.S., Shanmugam, B., Yeo, K.C., Jonokman, M., Samy, G.N.: Security source code analysis of applications in Android OS. Int. J. Eng. Technol. 7(4), 30\u201334 (2018)","journal-title":"Int. J. Eng. Technol."},{"issue":"5","key":"477_CR68","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.18517\/ijaseit.10.5.7191","volume":"10","author":"MM Saudi","year":"2021","unstructured":"Saudi, M.M., Adli, A., Ismail, C., Ahmad, A., Afif, H.M.: CallDetect: detection of call log exploitation inspired by apoptosis. Int. J. Adv. Sci. Eng. Inf. Technol. 10(5), 1792\u20131797 (2021)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"issue":"3","key":"477_CR69","first-page":"1785","volume":"12","author":"R Istambul","year":"2021","unstructured":"Istambul, R., Saudi, M.M., Nugraha, U., Yusof, M.: Security exploitation for online meeting applications: proof of concept. Turkish J. Comput. Math. Educ. 12(3), 1785\u20131792 (2021)","journal-title":"Turkish J. Comput. Math. Educ."},{"issue":"6","key":"477_CR70","first-page":"277","volume":"8","author":"MM Saudi","year":"2017","unstructured":"Saudi, M.M., Husainiamer, A.: Mobile malware classification via system calls and permission for GPS exploitation. Int. J. Adv. Comput. Sci. Appl. 8(6), 277\u2013283 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"477_CR71","doi-asserted-by":"crossref","unstructured":"Yusof, M., Saudi, M.M., Ridzuan, F.: A new mobile botnet classification based on permission and API calls. In: Proceedings\u20132017 7th International Conference on Emerging Security Technologies, EST 2017, Oct. pp.\u00a0122\u2013127, (2017)","DOI":"10.1109\/EST.2017.8090410"},{"key":"477_CR72","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/J.FUTURE.2019.11.034","volume":"105","author":"R Taheri","year":"2020","unstructured":"Taheri, R., Ghahramani, M., Javidan, R., Shojafar, M., Pooranian, Z., Conti, M.: Similarity-based android malware detection using hamming distance of static binary features. Fut. Gener. Comput. Syst. 105, 230\u2013247 (2020). https:\/\/doi.org\/10.1016\/J.FUTURE.2019.11.034","journal-title":"Fut. Gener. Comput. Syst."},{"key":"477_CR73","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/J.COSE.2016.11.011","volume":"65","author":"S Alam","year":"2017","unstructured":"Alam, S., Qu, Z., Riley, R., Chen, Y., Rastogi, V.: DroidNative: automating and optimizing detection of Android native code malware variants. Comput. Secur. 65, 230\u2013246 (2017). https:\/\/doi.org\/10.1016\/J.COSE.2016.11.011","journal-title":"Comput. Secur."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00477-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00477-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00477-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T01:01:55Z","timestamp":1744160515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00477-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,18]]},"references-count":73,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["477"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00477-y","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,18]]},"assertion":[{"value":"14 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}