{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:16Z","timestamp":1742912116519,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031096396"},{"type":"electronic","value":"9783031096402"}],"license":[{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-09640-2_12","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:29:41Z","timestamp":1668760181000},"page":"251-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Android Application Quality Through Extendable, Automated Security Testing"],"prefix":"10.1007","author":[{"given":"Nuno","family":"Realista","sequence":"first","affiliation":[]},{"given":"Francisco","family":"Palma","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Serr\u00e3o","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Nunes","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Almeida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"12_CR1","unstructured":"J. Clement, Mobile app usage \u2013 statistics & facts. Statista (2019). https:\/\/www.statista.com\/topics\/1002\/mobile-app-usage\/"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"17711","DOI":"10.1109\/ACCESS.2018.2818724","volume":"6","author":"A Ahmad","year":"2018","unstructured":"A. Ahmad, K. Li, C. Feng, S.M. Asim, A. Yousif, S. Ge, An empirical study of investigating mobile applications development challenges. IEEE Access 6, 17711\u201317728 (2018)","journal-title":"IEEE Access"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.procs.2015.07.223","volume":"56","author":"J Khan","year":"2015","unstructured":"J. Khan, H. Abbas, J. Al-Muhtadi, Survey on mobile user\u2019s data privacy threats and defense mechanisms. Procedia Comput. Sci. 56, 376\u2013383 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"12_CR4","first-page":"66","volume":"22","author":"P Faruki","year":"2015","unstructured":"P. Faruki, V. Laxmi, A. Bharmal, M.S. Gaur, V. Ganmoor, AndroSimilar: Robust signature for detecting variants of android malware. J. Inf. Secur. Appl. 22, 66\u201380 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"I. Mohamed D. Patel, Android vs iOS security: A comparative study, in 2015 12th International Conference on Information Technology-New Generations (2015), pp. 725\u2013730","DOI":"10.1109\/ITNG.2015.123"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos, T. Karagiannis, Rise of the planet of the apps: A systematic study of the mobile app ecosystem, in Proceedings of the 2013 conference on Internet measurement conference (2013), pp. 277\u2013290","DOI":"10.1145\/2504730.2504749"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"F. Palma, N. Realista, C. Serr\u00e3o, L. Nunes, J. Oliveira, A. Almeida, Automated security testing of android applications for secure mobile development, in 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (2020), pp. 222\u2013231","DOI":"10.1109\/ICSTW50294.2020.00046"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"R. Mahmood, N. Esfahani, T. Kacem, N. Mirzaei, S. Malek, A. Stavrou, A whitebox approach for automated security testing of android applications on the cloud, in 2012 7th International Workshop on Automation of Software Test (AST) (2012), pp. 22\u201328","DOI":"10.1109\/IWAST.2012.6228986"},{"key":"12_CR9","unstructured":"OWASP, OWASP Mobile Security Project. https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Project. Accessed 11 Dec 2019"},{"key":"12_CR10","unstructured":"OWASP, OWASP Mobile Mobile Top 10 (2016). https:\/\/www.owasp.org\/index.php\/Mobile_Top_10_2016-Top_10. Accessed 11 Dec 2019"},{"key":"12_CR11","unstructured":"ENISA, Privacy and Data Protection in Mobile Applications (2018)"},{"key":"12_CR12","unstructured":"ENISA, Smartphone Secure Development Guidelines (2017)"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"S. Quirolgico, J. Voas, T. Karygiannis, C. Michael, K. Scarfone, Vetting the Security of Mobile Applications (2015).. https:\/\/doi.org\/10.6028\/NIST.SP.800-163","DOI":"10.6028\/NIST.SP.800-163"},{"key":"12_CR14","unstructured":"M. Howard, S. Lipner, The Security Development Lifecycle. O\u2019Reilly Media, Incorporated (2009)"},{"issue":"6","key":"12_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MSP.2004.95","volume":"2","author":"M Howard","year":"2004","unstructured":"M. Howard, Building more secure software with improved development processes. IEEE Secur. Priv. 2(6), 63\u201365 (2004). https:\/\/doi.org\/10.1109\/MSP.2004.95","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"12_CR16","first-page":"7","volume":"30","author":"G McGraw","year":"2015","unstructured":"G. McGraw, Software security and the building security in maturity model (BSIMM). J. Comput. Sci. Coll. 30(3), 7\u20138 (2015)","journal-title":"J. Comput. Sci. Coll."},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MSP.2011.40","volume":"9","author":"B Chess","year":"2011","unstructured":"B. Chess, B. Arkin, Software security in practice. IEEE Secur. Priv. 9(2), 89\u201392 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"6","key":"12_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MS.2002.1049391","volume":"19","author":"G McGraw","year":"2002","unstructured":"G. McGraw, Building secure software: Better than protecting bad software. IEEE Softw. 19(6), 57\u201358 (2002). https:\/\/doi.org\/10.1109\/MS.2002.1049391","journal-title":"IEEE Softw."},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TR.2018.2865733","volume":"68","author":"P Kong","year":"2018","unstructured":"P. Kong, L. Li, J. Gao, K. Liu, T.F. Bissyand\u00e9, J. Klein, Automated testing of android apps: A systematic literature review. IEEE Trans. Reliab. 68(1), 45\u201366 (2018)","journal-title":"IEEE Trans. Reliab."},{"issue":"10","key":"12_CR20","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"A. Amin, A. Eldessouki, M.T. Magdy, N. Abdeen, H. Hindy, I. Hegazy, Androshield: Automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information 10(10), 326 (2019)","journal-title":"Information"},{"key":"12_CR21","unstructured":"Androbugs, AndroBugs Framework (2015), [Online]. Available: https:\/\/github.com\/AndroBugs\/AndroBugs_Framework"},{"key":"12_CR22","unstructured":"N. Drong, J. Van Thuijl, Upgrading and Extending the AndroBugs Framework (2020)"},{"key":"12_CR23","unstructured":"C. Andr\u00e9, DroidstatX (2019), [Online]. Available: https:\/\/github.com\/clviper\/droidstatx"},{"key":"12_CR24","unstructured":"D. Thomas, AndroWarn (2019), [Online]. Available: https:\/\/github.com\/maaaaz\/androwarn"},{"key":"12_CR25","unstructured":"I. Revivo, O. Caspi, Cuckoo-Droid (2017), [Online]. Available: https:\/\/github.com\/idanr1986\/cuckoo-droid"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"G. Suciu, C.-I. Istrate, R. I. Ruaducanu, M.-C. Dictu, O. Fratu, A. Vulpe, Mobile devices forensic platform for malware detection, in 6th International Symposium for ICS \\& SCADA Cyber Security Research 2019 6 (2019), pp. 59\u201366","DOI":"10.14236\/ewic\/icscsr19.8"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"M. N. Seghir, D. Aspinall, Evicheck: Digital evidence for android, in International Symposium on Automated Technology for Verification and Analysis (2015), pp. 221\u2013227","DOI":"10.1007\/978-3-319-24953-7_17"},{"key":"12_CR28","unstructured":"Linkedin, Quick Android Review Kit (2017), [Online]. Available: https:\/\/github.com\/linkedin\/qark\/"},{"key":"12_CR29","unstructured":"MobSF, Mobile Security Framework \u2013 MobSF (2019), [Online]. Available: https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF"}],"container-title":["Emerging Trends in Cybersecurity Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09640-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T08:18:02Z","timestamp":1689668282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09640-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,19]]},"ISBN":["9783031096396","9783031096402"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09640-2_12","relation":{},"subject":[],"published":{"date-parts":[[2022,11,19]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}