{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:13Z","timestamp":1759133473454,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,12]],"date-time":"2017-12-12T00:00:00Z","timestamp":1513036800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007063","name":"University of Delhi","doi-asserted-by":"publisher","award":["RC\/2015\/9677"],"award-info":[{"award-number":["RC\/2015\/9677"]}],"id":[{"id":"10.13039\/501100007063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s13198-017-0692-7","type":"journal-article","created":{"date-parts":[[2017,12,12]],"date-time":"2017-12-12T03:31:02Z","timestamp":1513049462000},"page":"482-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Evading android anti-malware by hiding malicious application inside images"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8535-1808","authenticated-orcid":false,"given":"Shikha","family":"Badhani","sequence":"first","affiliation":[]},{"given":"Sunil K.","family":"Muttoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,12]]},"reference":[{"key":"692_CR1","doi-asserted-by":"crossref","unstructured":"Aafer Y, Du W, Yin H (2013) DroidAPIMiner: Mining API-level features for robust malware detection in android. In: Security privacy in communication networks. Springer, Berlin, pp 86\u2013103","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"692_CR2","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/j.procs.2015.03.170","volume":"45","author":"SB Almin","year":"2015","unstructured":"Almin SB, Chatterjee M (2015) A novel approach to detect android malware. Procedia Comput Sci 45:407\u2013417","journal-title":"Procedia Comput Sci"},{"key":"692_CR3","unstructured":"Android Studio (2013) Android developers. http:\/\/developer.android.com\/tools\/studio\/index.html . Accessed Oct 2017"},{"key":"692_CR4","unstructured":"AndroMalShare (2013) AndroMalShare. http:\/\/andromalshare.androidmalware.net:8080\/#home . Accessed Feb 2016"},{"key":"692_CR5","unstructured":"Apvrille A, Albertini A (2014) Hide android applications in images. In: Paper presented at the BlackHat Europe"},{"key":"692_CR6","unstructured":"Apvrille A, Nigam R (2014) Virus bulletin: obfuscation in android malware, and how to fight back. https:\/\/www.virusbulletin.com\/virusbulletin\/2014\/07\/obfuscation-android-malware-and-how-fight-back . Accessed Jan 2016"},{"key":"692_CR13","unstructured":"Bloisi D, Iocchi, L (2007) Image based steganography and cryptography. In: 2nd International conference on computer vision theory and application\u2014VISAPP \u201807, 2007. pp 127\u2013134"},{"key":"692_CR7","unstructured":"Boehm B (2014) StegExpose-A Tool for Detecting LSB Steganography arXiv preprint arXiv:14106656"},{"key":"692_CR8","doi-asserted-by":"crossref","unstructured":"Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings on 1st ACM work. Security privacy in smartphones mobiel devices\u2014SPSM\u201911, 2011. ACM, New York, pp 15\u201326","DOI":"10.1145\/2046614.2046619"},{"key":"692_CR9","unstructured":"ClassLoader (2008) ClassLoader | Android Developers. http:\/\/developer.android.com\/reference\/java\/lang\/ClassLoader.html . Accessed Jan 2016"},{"key":"692_CR10","unstructured":"Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Technical Report 148 Department of Computer Science, The University of Auckland"},{"key":"692_CR11","unstructured":"DexClassLoader (2009) DexClassLoader | Android Developers. http:\/\/developer.android.com\/reference\/dalvik\/system\/DexClassLoader.html . Accessed Jan 2016"},{"key":"692_CR12","doi-asserted-by":"crossref","unstructured":"Dini G, Martinelli F, Saracino A, Sgandurra D (2012) MADAM: a multi-level anomaly detector for android malware. In: Lecture Notes Computer Science (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). 7531 LNCS, 2012. Springer, Berlin, pp 240\u2013253","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"692_CR14","doi-asserted-by":"crossref","unstructured":"Enck W et al. (2014) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones ACM Transactions on Computer Systems (TOCS) 32:5","DOI":"10.1145\/2619091"},{"key":"692_CR16","doi-asserted-by":"crossref","unstructured":"Enck W, Ongtang M, McDaniel P (2009) On lightweight mobile phone application certification. In: Proceedings on 16th ACM Conf. Computer Communication Security\u2014CCS\u201909, 2009. ACM, New York, pp 235\u2013245","DOI":"10.1145\/1653662.1653691"},{"key":"692_CR17","unstructured":"FakeRegSMS.B (2012) F-Secure Mobile Threat Report Q1 2012. https:\/\/www.f-secure.com\/documents\/996508\/1030743\/Mobile+Threat+Report+Q1+2012.pdf"},{"key":"692_CR18","unstructured":"Falsina L (2015) Grab\u2019n run: practical and safe dynamic code loading in Android. http:\/\/hdl.handle.net\/10589\/106725"},{"key":"692_CR19","unstructured":"Google Play Store (2012). https:\/\/play.google.com\/store?hl=en"},{"key":"692_CR20","unstructured":"IDC (2015) Smartphone OS Market Share, 2015 Q2 http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp . Accessed Jan 2016"},{"key":"692_CR21","unstructured":"java.lang.reflect (2008) java.lang.reflect | Android Developers. http:\/\/developer.android.com\/reference\/java\/lang\/reflect\/package-summary.html . Accessed Jan 2016"},{"key":"692_CR22","unstructured":"javax.crypto (2008) javax.crypto | Android Developers. http:\/\/developer.android.com\/reference\/javax\/crypto\/package-summary.html . Accessed Jan 2016"},{"key":"692_CR23","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. IEEE Comput 31:26\u201334","journal-title":"IEEE Comput"},{"key":"692_CR24","unstructured":"Kroustek J (2015) Banking Trojan Vawtrak: Harvesting Passwords Worldwide. AVG. http:\/\/now.avg.com\/banking-trojan-vawtrak-harvesting-passwords-worldwide\/ . Accessed Feb 2016"},{"key":"692_CR25","unstructured":"Lockheimer H (2012) Android and Security. http:\/\/googlemobile.blogspot.in\/2012\/02\/android-and-security.html . Accessed Feb 2016"},{"key":"692_CR26","first-page":"421","volume":"2007","author":"A Moser","year":"2007","unstructured":"Moser A, Kruegel C, Kirda E (2007) Limits of static analysis for malware detection. Annu Comput Secur Appl Conf ACSAC 2007:421\u2013430","journal-title":"Annu Comput Secur Appl Conf ACSAC"},{"key":"692_CR27","unstructured":"OpFake (2012) F-Secure Mobile Threat Report Q1 2012. https:\/\/www.f-secure.com\/documents\/996508\/1030743\/Mobile+Threat+Report+Q1+2012.pdf . Accessed Jan 2016"},{"key":"692_CR15","unstructured":"Ortega. A, Breslin. S (1997) Jpeg decoder"},{"key":"692_CR28","unstructured":"ProGuard (2011) Shrink Your Code and Resources | Android Developers. http:\/\/developer.android.com\/tools\/help\/proguard.html . Accessed Jan 2016"},{"key":"692_CR29","first-page":"323","volume":"2001","author":"N Provos","year":"2001","unstructured":"Provos N (2001) Defending against statistical steganalysis. Usenix Sec Symp 2001:323\u2013336","journal-title":"Usenix Sec Symp"},{"key":"692_CR30","unstructured":"Provos N, Honeyman P (2001) Detecting steganographic content on the internet. Center for information technology integration"},{"key":"692_CR31","unstructured":"Quick Heal Quaterly Threat Report Q1 (2015). http:\/\/dlupdate.quickheal.com\/documents\/others\/quick_heal_quarterly_threat_report_Q1_2015.pdf"},{"key":"692_CR32","doi-asserted-by":"crossref","unstructured":"Rastogi V, Chen Y, Jiang X (2013) Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, 2013. ACM, New York, pp 329\u2013334","DOI":"10.1145\/2484313.2484355"},{"key":"692_CR33","first-page":"289","volume":"189","author":"B Sanz","year":"2013","unstructured":"Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, \u00c1lvarez G (2013) Puma: permission usage to detect malware in android. Adv Intell Syst Comput AISC 189:289\u2013298","journal-title":"Adv Intell Syst Comput AISC"},{"key":"692_CR34","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10844-010-0148-x","volume":"38","author":"A Shabtai","year":"2012","unstructured":"Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) \u201cAndromaly\u201d: a behavioral malware detection framework for android devices. J Intell Inf Syst 38:161\u2013190","journal-title":"J Intell Inf Syst"},{"key":"692_CR35","unstructured":"Suarez-Tangil G, Tapiador JE, Peris-Lopez P (2014) Stegomalware: Playing hide and seek with malicious components in smartphone apps. In: Proceedings on 10th international conference on information security cryptology, 2014. Springer, Berlin, pp 496\u2013515"},{"key":"692_CR36","unstructured":"Weeks JR (1998) Jpeg encoder. Independent JPEG Group"},{"key":"692_CR37","doi-asserted-by":"crossref","unstructured":"Wu D-J, Mao C-H, Wei T-E, Lee H-M, Wu K-P (2012) Droidmat: android malware detection through manifest and api calls tracing. In: Proceedings on 7th Asia joint conference on information security Asia JCIS 2012. IEEE, pp 62\u201369","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"692_CR38","unstructured":"Wyatt T (2012) Security Alert: New Variants of Legacy Native (LeNa) Identified. https:\/\/blog.lookout.com\/blog\/2012\/04\/03\/security-alert-new-variants-of-legacy-native-lena-identified\/ . Accessed Jan 2016"},{"key":"692_CR39","doi-asserted-by":"crossref","unstructured":"Zhauniarovich Y, Ahmad M, Gadyatskaya O, Crispo B, Massacci F (2015) StaDynA: addressing the problem of dynamic code updates in the security analysis of android applications. In: Proceedings on 5th ACM Conference on Data Application Security Privacy\u2014CODASPY \u201815, 2015. ACM, New York, pp 37\u201348","DOI":"10.1145\/2699026.2699105"},{"key":"692_CR40","unstructured":"Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings on 19th annual network distribution system security symposium (NDSS), 2012. pp 1\u201313"},{"key":"692_CR41","doi-asserted-by":"crossref","unstructured":"Zhou W, Wang Z, Zhou Y, Jiang X (2014) Divilar: diversifying intermediate language for anti-repackaging on android platform. In: Proceedings on 4th ACM conference on data application security privacy\u2014CODASPY \u201814 2014. ACM, New York, pp 199\u2013210","DOI":"10.1145\/2557547.2557558"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-017-0692-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-017-0692-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-017-0692-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T17:59:05Z","timestamp":1570471145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-017-0692-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,12]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["692"],"URL":"https:\/\/doi.org\/10.1007\/s13198-017-0692-7","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2017,12,12]]}}}