{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:42Z","timestamp":1763468142760,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462100","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":103,"title":["MAST"],"prefix":"10.1145","author":[{"given":"Saurabh","family":"Chakradeo","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Bradley","family":"Reaves","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Encyclopedia of Measurement and Statistics, page 13","author":"Abdi H.","year":"2007","unstructured":"H. Abdi and D. Valentin . Multiple correspondence analysis . In Encyclopedia of Measurement and Statistics, page 13 . Sage , California , 2007 . H. Abdi and D. Valentin. Multiple correspondence analysis. In Encyclopedia of Measurement and Statistics, page 13. Sage, California, 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"Android market API. http:\/\/code.google.com\/p\/android-market-api\/.  Android market API. http:\/\/code.google.com\/p\/android-market-api\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Anzhi Market. http:\/\/www.anzhi.com.  Anzhi Market. http:\/\/www.anzhi.com."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple app store 2012. http:\/\/www.apple.com\/iphone\/from-the-app-store\/.  Apple app store 2012. http:\/\/www.apple.com\/iphone\/from-the-app-store\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Baksmali 2012. http:\/\/code.google.com\/p\/smali\/.  Baksmali 2012. http:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_7_1","volume-title":"August","author":"Beaumont C.","year":"2008","unstructured":"C. Beaumont . Apple iPhone 'kill switch' discovered , August 2008 . http:\/\/www.telegraph.co.uk\/technology\/3358115\/Apple-iPhone-kill-switch-discovered.html. C. Beaumont. Apple iPhone 'kill switch' discovered, August 2008. http:\/\/www.telegraph.co.uk\/technology\/3358115\/Apple-iPhone-kill-switch-discovered.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Blackberry app world 2012. http:\/\/appworld.blackberry.com\/webstore\/.  Blackberry app world 2012. http:\/\/appworld.blackberry.com\/webstore\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"e_1_3_2_1_10_1","volume-title":"June","author":"Bray T.","year":"2010","unstructured":"T. Bray . Exercising Our Remote Application Removal Feature , June 2010 . http:\/\/android-developers.blogspot.com\/2010\/06\/exercising-our-remote-application.html. T. Bray. Exercising Our Remote Application Removal Feature, June 2010. http:\/\/android-developers.blogspot.com\/2010\/06\/exercising-our-remote-application.html."},{"key":"e_1_3_2_1_11_1","volume-title":"Oct.","author":"Burns J.","year":"2008","unstructured":"J. Burns . Developing Secure Mobile Applications for Android. iSEC Partners , Oct. 2008 . http:\/\/www.isecpartners.com\/files\/iSEC_Securing_Android_Apps.pdf. J. Burns. Developing Secure Mobile Applications for Android. iSEC Partners, Oct. 2008. http:\/\/www.isecpartners.com\/files\/iSEC_Securing_Android_Apps.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS)","author":"Egele M.","year":"2011","unstructured":"M. Egele , C. Kruegel , E. Kirda , and G. Vigna . PiOS: Detecting Privacy Leaks in iOS Applications . In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS) , 2011 . M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS), 2011."},{"key":"e_1_3_2_1_14_1","first-page":"393","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. Sheth . TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , pages 393 -- 407 , 2010 . W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, pages 393--407, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_20_1","unstructured":"GFan Market. http:\/\/www.gfan.com\/.  GFan Market. http:\/\/www.gfan.com\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Google play 2012. https:\/\/play.google.com\/store\/apps.  Google play 2012. https:\/\/play.google.com\/store\/apps."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"e_1_3_2_1_25_1","unstructured":"X. Jiang. Questionable Android Apps -- SndApps -- Found and Removed from Official Android Market July 2011. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/SndApps\/.  X. Jiang. Questionable Android Apps -- SndApps -- Found and Removed from Official Android Market July 2011. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/SndApps\/."},{"key":"e_1_3_2_1_26_1","volume-title":"June","author":"Jiang X.","year":"2011","unstructured":"X. Jiang . Security Alert: New Android SMS Trojan -- YZHCSMS -- Found in Official Android Market and Alternative Markets , June 2011 . http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/YZHCSMS\/. X. Jiang. Security Alert: New Android SMS Trojan -- YZHCSMS -- Found in Official Android Market and Alternative Markets, June 2011. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/YZHCSMS\/."},{"key":"e_1_3_2_1_27_1","volume-title":"June","author":"Jiang X.","year":"2011","unstructured":"X. Jiang . Security Alert: New Stealthy Android Spyware -- Plankton -- Found in Official Android Market , June 2011 . http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/. X. Jiang. Security Alert: New Stealthy Android Spyware -- Plankton -- Found in Official Android Market, June 2011. http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"e_1_3_2_1_29_1","volume-title":"November","author":"Kingsley-Hughes A.","year":"2011","unstructured":"A. Kingsley-Hughes . So that's what happens when you highlight an iOS security hole , November 2011 . http:\/\/www.zdnet.com\/blog\/hardware\/so-thats-what-happens-when-you-highlightan-ios-security-hole\/16078. A. Kingsley-Hughes. So that's what happens when you highlight an iOS security hole, November 2011. http:\/\/www.zdnet.com\/blog\/hardware\/so-thats-what-happens-when-you-highlightan-ios-security-hole\/16078."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_2_1_31_1","volume-title":"Feb.","author":"Lockheimer H.","year":"2012","unstructured":"H. Lockheimer . Android and Security . Google Mobile Blog , Feb. 2012 . http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html. H. Lockheimer. Android and Security. Google Mobile Blog, Feb. 2012. http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html."},{"key":"e_1_3_2_1_32_1","volume-title":"Lookout Mobile Security","author":"Security Lookout Mobile","year":"2011","unstructured":"Lookout Mobile Security . Mobile threat report. Technical report , Lookout Mobile Security , Aug. 2011 . Lookout Mobile Security. Mobile threat report. Technical report, Lookout Mobile Security, Aug. 2011."},{"key":"e_1_3_2_1_33_1","unstructured":"Lookout mobile security 2012. https:\/\/www.mylookout.com\/.  Lookout mobile security 2012. https:\/\/www.mylookout.com\/."},{"key":"e_1_3_2_1_34_1","volume-title":"June","author":"Lowensohn J.","year":"2011","unstructured":"J. Lowensohn . iPhone lock-screen password app pulled , June 2011 . http:\/\/news.cnet.com\/8301-27076_3-20071405-248\/iphone-lock-screen-password-app-pulled\/. J. Lowensohn. iPhone lock-screen password app pulled, June 2011. http:\/\/news.cnet.com\/8301-27076_3-20071405-248\/iphone-lock-screen-password-app-pulled\/."},{"key":"e_1_3_2_1_35_1","volume-title":"March","author":"Mahaffey K.","year":"2011","unstructured":"K. Mahaffey . Security Alert: DroidDream Malware Found in Official Android Market , March 2011 . http:\/\/blog.mylookout.com\/2011\/03\/security-alert-malware-found-inofficial-android-market-droiddream\/. K. Mahaffey. Security Alert: DroidDream Malware Found in Official Android Market, March 2011. http:\/\/blog.mylookout.com\/2011\/03\/security-alert-malware-found-inofficial-android-market-droiddream\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.159"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_39_1","unstructured":"Ndoo market. http:\/\/www.nduoa.com\/.  Ndoo market. http:\/\/www.nduoa.com\/."},{"key":"e_1_3_2_1_40_1","unstructured":"NetQin Mobile Security 2012. http:\/\/www.netqin.com\/en\/.  NetQin Mobile Security 2012. http:\/\/www.netqin.com\/en\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076735"},{"key":"e_1_3_2_1_42_1","volume-title":"Adventures in BouncerLand. In Blackhat USA","author":"Nicholas","year":"2012","unstructured":"Nicholas J. Percoco and Sean Schulte . Adventures in BouncerLand. In Blackhat USA , Las Vegas, NV , 2012 . Nicholas J. Percoco and Sean Schulte. Adventures in BouncerLand. In Blackhat USA, Las Vegas, NV, 2012."},{"key":"e_1_3_2_1_43_1","unstructured":"M. Parkour. Contagio mobile malware MiniDump. http:\/\/contagiominidump.blogspot.com\/.  M. Parkour. Contagio mobile malware MiniDump. http:\/\/contagiominidump.blogspot.com\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"e_1_3_2_1_46_1","volume-title":"Multiple Correspondence Analysis. Number 163 in Quantitative Applications in the Social Sciences","author":"Roux B. L.","year":"2010","unstructured":"B. L. Roux and H. Rouanet . Multiple Correspondence Analysis. Number 163 in Quantitative Applications in the Social Sciences . SAGE Publications, Los Angeles , California, USA , 2010 . B. L. Roux and H. Rouanet. Multiple Correspondence Analysis. Number 163 in Quantitative Applications in the Social Sciences. SAGE Publications, Los Angeles, California, USA, 2010."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21579-2_9"},{"key":"e_1_3_2_1_49_1","unstructured":"SoftAndroid Market. http:\/\/softandroid.ru.  SoftAndroid Market. http:\/\/softandroid.ru."},{"key":"e_1_3_2_1_50_1","unstructured":"Trend Micro Command Line Antivirus Scanner 2012. http:\/\/esupport.trendmicro.com\/solution\/en-us\/0117058.aspx.  Trend Micro Command Line Antivirus Scanner 2012. http:\/\/esupport.trendmicro.com\/solution\/en-us\/0117058.aspx."},{"key":"e_1_3_2_1_51_1","volume-title":"Marketplace","author":"Phone Windows","year":"2011","unstructured":"Windows Phone : Marketplace , 2011 . http:\/\/www.windowsphone.com\/en-US\/marketplace. Windows Phone: Marketplace, 2011. http:\/\/www.windowsphone.com\/en-US\/marketplace."},{"key":"e_1_3_2_1_52_1","unstructured":"B. Womack. Google says 700 000 applications available for android Oct. 2012.  B. Womack. Google says 700 000 applications available for android Oct. 2012."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets . In Proceedings of the Network and Distributed System Security Symposium , Feb. 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2012."},{"key":"e_1_3_2_1_55_1","first-page":"93","volume-title":"TRUST","author":"Zhou Y.","year":"2011","unstructured":"Y. Zhou , X. Zhang , X. Jiang , and V. W. Freeh . Taming information-stealing smartphone applications (on android) . In TRUST , pages 93 -- 107 , 2011 . Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In TRUST, pages 93--107, 2011."}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Budapest Hungary","acronym":"WISEC'13"},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462100"}},"subtitle":["triage for market-scale mobile malware analysis"],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":55,"alternative-id":["10.1145\/2462096.2462100","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462100","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}