{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:16:55Z","timestamp":1774966615294,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tdsc.2020.2982635","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T03:21:41Z","timestamp":1585624901000},"page":"107-118","source":"Crossref","is-referenced-by-count":29,"title":["Eight Years of Rider Measurement in the Android Malware Ecosystem"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-2553","authenticated-orcid":false,"given":"Guillermo","family":"Suarez-Tangil","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Number of available android applications","year":"2018"},{"key":"ref2","article-title":"Evolution of aptoide malware detection system","year":"2016"},{"key":"ref3","first-page":"231","article-title":"Why are Android apps removed from Google play?: A large-scale empirical study","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Wang"},{"key":"ref4","article-title":"The judy malware: Possibly the largest malware campaign found on Google play","year":"2017"},{"key":"ref5","article-title":"About virustotal","year":"2018"},{"key":"ref6","article-title":"Koodous","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref9","first-page":"468","article-title":"AndroZoo: Collecting millions of Android apps for the research community","volume-title":"Proc. 13th Int. Conf. Mining Softw. Repositories","author":"Allix"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.57"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"ref17","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-play scale","volume-title":"Proc. 24th USENIX Conf. Secur. Symp.","author":"Chen"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274726"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2982635"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029825"},{"key":"ref21","first-page":"61","article-title":"Classification of malware using structured control flow","volume-title":"Proc. 8th Australas. Symp. Parallel Distrib. Comput.","author":"Cesare"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"ref24","first-page":"1057","article-title":"Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence","volume-title":"Proc. 24th USENIX Conf. Secur. Symp.","author":"Graziano"},{"key":"ref25","article-title":"From chrysaor to lipizzan: Blocking a new targeted spyware family","author":"Ruthven","year":"2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996769"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_7"},{"key":"ref28","first-page":"625","article-title":"Transcend: Detecting concept drift in malware classification models","volume-title":"Proc. 26th USENIX Conf. Secur. Symp.","author":"Jordaney"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329854"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687880"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"ref36","article-title":"From throw-away traffic to bots: Detecting the rise of DGA-based malware","volume-title":"Proc. 21st USENIX Conf. Secur. Symp.","author":"Antonakakis"},{"key":"ref37","first-page":"57","article-title":"Measuring and detecting fast-flux service networks","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Holz"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16745-9_27"},{"key":"ref39","article-title":"When malware is packin\u2019 heat","author":"Vigna","journal-title":"Enigma"},{"key":"ref40","article-title":"Simplocker: First confirmed file-encrypting ransomware for android","author":"Hamada","year":"2014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref43","article-title":"Identifying intrusive mobile apps using peer group analysis","author":"Pelikan","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806891"},{"key":"ref45","first-page":"729","article-title":"TESSERACT: Eliminating experimental bias in malware classification across space and time","volume-title":"Proc. 28th USENIX Conf. Secur. Symp.","author":"Pendlebury"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23066"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_12"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"ref50","article-title":"A study of Android application security","volume-title":"Proc. 20th USENIX Conf. Secur. Symp.","volume":"2","author":"Enck"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.64"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9625881\/09050439.pdf?arnumber=9050439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:33:41Z","timestamp":1704839621000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9050439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":53,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2020.2982635","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}