{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:35:07Z","timestamp":1761129307350,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413692","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:26:08Z","timestamp":1456485968000},"page":"119-127","source":"Crossref","is-referenced-by-count":23,"title":["GroddDroid: a gorilla for triggering malicious behaviors"],"prefix":"10.1109","author":[{"given":"A.","family":"Abraham","sequence":"first","affiliation":[]},{"given":"R.","family":"Andriatsimandefitra","sequence":"additional","affiliation":[]},{"given":"A.","family":"Brunelat","sequence":"additional","affiliation":[]},{"given":"J.-F.","family":"Lalande","sequence":"additional","affiliation":[]},{"given":"V.","family":"Viet Triem Tong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"ref11","first-page":"393","article-title":"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smart-phones","author":"enck","year":"2010","journal-title":"9th Usenix Symposium on Operating Systems Design and Implementation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref13","article-title":"PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications","author":"gianazza","year":"2014","journal-title":"arXiv 1402 4826"},{"journal-title":"Ui\/application Exerciser Monkey","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref16","article-title":"ANDRUBIS-1, 000,000 Apps Later: A View on Current Android Malware Behaviors","author":"lindorfer","year":"2014","journal-title":"3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"ref18","article-title":"Enter Sandbox: Android Sandbox Comparison","author":"neuner","year":"2014","journal-title":"3rd IEEE Mobile Security Technologies Workshop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70524-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2594291.2594299","article-title":"Flow-Droid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps","volume":"49","author":"arzt","year":"2014","journal-title":"ACM SIGPLAN conference on Programming Language design and Implementation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_26"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.61"},{"journal-title":"Half Year Security Report","year":"2014","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-319-04283-1_6","article-title":"DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android","volume":"127","author":"aafer","year":"2013","journal-title":"Security and Privacy in Communication Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413692.pdf?arnumber=7413692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T06:43:55Z","timestamp":1654411435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413692","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}