{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:42:05Z","timestamp":1765827725780},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/pst.2018.8514191","type":"proceedings-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T20:50:46Z","timestamp":1542660646000},"page":"1-10","source":"Crossref","is-referenced-by-count":31,"title":["A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis"],"prefix":"10.1109","author":[{"given":"Lucky","family":"Onwuzurike","sequence":"first","affiliation":[]},{"given":"Mario","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Mariconti","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/IWCMC.2014.6906344"},{"key":"ref38","article-title":"IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware","author":"wong","year":"2016","journal-title":"NDSS"},{"year":"2016","article-title":"Statista. Global mobile OS market share in sales to end users from 1st quarter 2009 to 1st quarter","key":"ref33"},{"key":"ref32","article-title":"Puma: Permission usage to detect malware in android","author":"sanz","year":"2013","journal-title":"Cisis"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2996358"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TIFS.2013.2290431"},{"year":"2016","article-title":"The Register. Google AdSense abused to distribute Android spyware","key":"ref37"},{"year":"2017","article-title":"The Independent. Chrysaor: Android Spyware Designed to Hack Smartphone Cameras Discovered","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.14722\/ndss.2015.23145"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3017427"},{"year":"2016","author":"clay","article-title":"Continued Rise in Mobile Threats for 2016","key":"ref10"},{"year":"0","article-title":"Ddmlib: APIs for talking with Dalvik VM","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2939918.2939926"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2619091"},{"key":"ref14","article-title":"Phone Application Certification","author":"enck","year":"2009","journal-title":"ACM CCSW"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/COMST.2014.2386139"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2046707.2046779"},{"year":"0","article-title":"Google. UI\/Application Exerciser Monkey","key":"ref17"},{"key":"ref18","article-title":"Performance evaluation on permission-based detection for Android malware","author":"huang","year":"2013","journal-title":"Adv Intell Syst Applicat"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1145\/2664243.2664250","article-title":"automatically generating heuristics to detect android emulators","author":"jing","year":"2014","journal-title":"ACSAC"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.14722\/ndss.2014.23328"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2393596.2393666"},{"key":"ref27","article-title":"A. Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis (Extended Version)","author":"onwuzurike","year":"2018","journal-title":"arXiv 1803 03448"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MALWARE.2012.6461012"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2046614.2046619"},{"year":"2017","article-title":"Profiling with Traceview and dmtracedump","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref8","article-title":"Curiousdroid: automated user interface interaction for android application analysis sandboxes","author":"carter","year":"2016","journal-title":"FC"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/2804345.2804349","article-title":"Detecting Android Malware Using Sequences of System Calls","author":"canfora","year":"2015","journal-title":"Proc Int Workshop Softw Develop Lifecycle Mobile"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3178876.3186035"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ASE.2015.89"},{"key":"ref1","article-title":"DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android","author":"aafer","year":"2013","journal-title":"SECURECOMM"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MILCOM.2015.7357463"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/BADGERS.2014.7"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/COMPSAC.2015.103"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ARES.2014.12"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2491411.2491450"},{"year":"0","author":"mariconti","article-title":"Mamadroid Source Code","key":"ref26"},{"key":"ref25","article-title":"MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models","author":"mariconti","year":"2017","journal-title":"NDSS"}],"event":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2018,8,28]]},"location":"Belfast","end":{"date-parts":[[2018,8,30]]}},"container-title":["2018 16th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8498146\/8514154\/08514191.pdf?arnumber=8514191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T04:50:21Z","timestamp":1694062221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8514191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/pst.2018.8514191","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}