{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:18Z","timestamp":1750221198021,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,21]]},"DOI":"10.1145\/3230467.3230478","type":"proceedings-article","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T12:38:13Z","timestamp":1536064693000},"page":"44-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Taxonomy on Recent Mobile Malware"],"prefix":"10.1145","author":[{"given":"Hamidreza","family":"Alimardani","sequence":"first","affiliation":[{"name":"Centre of Postgraduate Studies, Limkokwing University of Creative Technology, Kuala Lumpur, Malaysia"}]},{"given":"Mohammed","family":"Nazeh","sequence":"additional","affiliation":[{"name":"Centre of Postgraduate Studies, Limkokwing University of Creative Technology, Kuala Lumpur, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Techcrunch. (2013 1st November). 40% Of YouTube Traffic Now Mobile Up From 25% In 2012 6% In 2011. Available: http:\/\/techcrunch.com\/2013\/10\/17\/youtube-goes-mobile\/  Techcrunch. (2013 1st November). 40% Of YouTube Traffic Now Mobile Up From 25% In 2012 6% In 2011. Available: http:\/\/techcrunch.com\/2013\/10\/17\/youtube-goes-mobile\/"},{"volume-title":"1st December). Gartner Says Five of Top 10 Worldwide Mobile Phone Vendors Increased Sales in Second Quarter of","year":"2016","key":"e_1_3_2_1_2_1","unstructured":"Gartner. (2016 , 1st December). Gartner Says Five of Top 10 Worldwide Mobile Phone Vendors Increased Sales in Second Quarter of 2016 . Available: http:\/\/www.gartner.com\/newsroom\/id\/3415117 Gartner. (2016, 1st December). Gartner Says Five of Top 10 Worldwide Mobile Phone Vendors Increased Sales in Second Quarter of 2016. Available: http:\/\/www.gartner.com\/newsroom\/id\/3415117"},{"key":"e_1_3_2_1_3_1","unstructured":"StarCounter. (2016 1st September). Mobile internet usage surpasses desktop usage for the first time in history. Available: http:\/\/bgr.com\/2016\/11\/02\/internet-usage-desktop-vs-mobile\/  StarCounter. (2016 1st September). Mobile internet usage surpasses desktop usage for the first time in history. Available: http:\/\/bgr.com\/2016\/11\/02\/internet-usage-desktop-vs-mobile\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781584888796","volume-title":"Computational Methods of Feature Selection","author":"Liu H.","year":"2007","unstructured":"H. Liu and H. Motoda , Computational Methods of Feature Selection . USA : CRC Press , 2007 . H. Liu and H. Motoda, Computational Methods of Feature Selection. USA: CRC Press, 2007."},{"key":"e_1_3_2_1_6_1","unstructured":"Google. (2014 1st April). permission. Available: http:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element.html  Google. (2014 1st April). permission. Available: http:\/\/developer.android.com\/guide\/topics\/manifest\/permission-element.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"e_1_3_2_1_10_1","first-page":"400","volume-title":"2013 IEEE 24th International Symposium on","author":"Xu W.","year":"2013","unstructured":"W. Xu , F. Zhang , and S. Zhu , \" Permlyzer: Analyzing permission usage in android applications,\" in Software Reliability Engineering (ISSRE) , 2013 IEEE 24th International Symposium on , 2013 , pp. 400 - 410 . W. Xu, F. Zhang, and S. Zhu, \"Permlyzer: Analyzing permission usage in android applications,\" in Software Reliability Engineering (ISSRE), 2013 IEEE 24th International Symposium on, 2013, pp. 400-410."},{"key":"e_1_3_2_1_11_1","first-page":"527","volume-title":"USA","author":"Pandita R.","year":"2013","unstructured":"R. Pandita , X. Xiao , W. Yang , W. Enck , and T. Xie , \" WHYPER: towards automating risk assessment of mobile applications,\" in 22nd USENIX Security Symposium, Washington, D.C , USA , 2013 , pp. 527 - 542 . R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, \"WHYPER: towards automating risk assessment of mobile applications,\" in 22nd USENIX Security Symposium, Washington, D.C, USA, 2013, pp. 527-542."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_20"},{"key":"e_1_3_2_1_13_1","volume-title":"Malware analysis of android with user-supplied predicates,\" arXiv preprint arXiv:1311.4198","author":"Liang S.","year":"2013","unstructured":"S. Liang , M. Might , and D. Van Horn , \"Anadroid : Malware analysis of android with user-supplied predicates,\" arXiv preprint arXiv:1311.4198 , 2013 . S. Liang, M. Might, and D. Van Horn, \"Anadroid: Malware analysis of android with user-supplied predicates,\" arXiv preprint arXiv:1311.4198, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2284403"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2290431"},{"key":"e_1_3_2_1_16_1","volume-title":"USA","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang , \" Systematic Detection of Capability Leaks in Stock Android Smartphones,\" in 19th Network and Distributed System Security Symposium, San Diego , USA , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang, \"Systematic Detection of Capability Leaks in Stock Android Smartphones,\" in 19th Network and Distributed System Security Symposium, San Diego, USA, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.88"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"e_1_3_2_1_20_1","first-page":"37","volume-title":"Pisa","author":"Crussell J.","year":"2012","unstructured":"J. Crussell , C. Gibler , and H. Chen , \" Attack of the Clones: Detecting Cloned Applications on Android Markets,\" in 17th European Symposium on Research in Computer Security , Pisa , Italy , 2012 , pp. 37 - 54 . J. Crussell, C. Gibler, and H. Chen, \"Attack of the Clones: Detecting Cloned Applications on Android Markets,\" in 17th European Symposium on Research in Computer Security, Pisa, Italy, 2012, pp. 37-54."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6574680"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_23_1","first-page":"158","volume-title":"Qinhuangdao","author":"Zhao M.","year":"2011","unstructured":"M. Zhao , F. Ge , T. Zhang , and Z. Yuan , \" AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android,\" in 2nd International Conference on Intelligent Computing and Applications , Qinhuangdao , China , 2011 , pp. 158 - 166 . M. Zhao, F. Ge, T. Zhang, and Z. Yuan, \"AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android,\" in 2nd International Conference on Intelligent Computing and Applications, Qinhuangdao, China, 2011, pp. 158-166."},{"key":"e_1_3_2_1_24_1","first-page":"29","volume-title":"USA","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin , \" DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis,\" in 21st USENIX Conference on Security symposium, Bellevue, WA , USA , 2012 , pp. 29 - 29 . L. K. Yan and H. Yin, \"DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis,\" in 21st USENIX Conference on Security symposium, Bellevue, WA, USA, 2012, pp. 29-29."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2012.43"},{"key":"e_1_3_2_1_26_1","first-page":"180","volume-title":"Communication and Computing (ICRCC)","author":"Khune R. S.","year":"2012","unstructured":"R. S. Khune and J. Thangakumar , \" A cloud-based intrusion detection system for Android smartphones,\" in 2012 International Conference on Radar , Communication and Computing (ICRCC) , Tiruvannamalai, India , 2012 , pp. 180 - 184 . R. S. Khune and J. Thangakumar, \"A cloud-based intrusion detection system for Android smartphones,\" in 2012 International Conference on Radar, Communication and Computing (ICRCC), Tiruvannamalai, India, 2012, pp. 180-184."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"e_1_3_2_1_28_1","first-page":"289","volume-title":"Permission Usage to Detect Malware in Android,\" in International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions","author":"Sanz B.","year":"2013","unstructured":"B. Sanz , I. Santos , C. Laorden , X. Ugarte-Pedrero , P. Bringas , and G. \u00c1lvarez , \"PUMA : Permission Usage to Detect Malware in Android,\" in International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions . vol. 189 , ed: Springer Berlin Heidelberg , 2013 , pp. 289 - 298 . B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P. Bringas, and G. \u00c1lvarez, \"PUMA: Permission Usage to Detect Malware in Android,\" in International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions. vol. 189, ed: Springer Berlin Heidelberg, 2013, pp. 289-298."},{"key":"e_1_3_2_1_29_1","unstructured":"V. Moonsamy J. Rong and S. Liu. (2013 Mining permission patterns for contrasting clean and malicious android applications. Future Generation Computer Systems. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X13001933  V. Moonsamy J. Rong and S. Liu. (2013 Mining permission patterns for contrasting clean and malicious android applications. Future Generation Computer Systems. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X13001933"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_31_1","first-page":"111","volume-title":"International Computer Symposium ICS","author":"Huang C.-Y.","year":"2013","unstructured":"C.-Y. Huang , Y.-T. Tsai , and C.-H. Hsu , \" Performance Evaluation on Permission-Based Detection for Android Malware ,\" in International Computer Symposium ICS , Hualien, Taiwan , 2013 , pp. 111 - 120 . C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu, \"Performance Evaluation on Permission-Based Detection for Android Malware,\" in International Computer Symposium ICS, Hualien, Taiwan, 2013, pp. 111-120."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875480"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958860"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557563"},{"key":"e_1_3_2_1_38_1","unstructured":"A. Gianazza F. Maggi A. Fattori L. Cavallaro and S. Zanero. (2014 1st April 2014). PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. Available: http:\/\/arxiv.org\/abs\/1402.4826  A. Gianazza F. Maggi A. Fattori L. Cavallaro and S. Zanero. (2014 1st April 2014). PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. Available: http:\/\/arxiv.org\/abs\/1402.4826"},{"key":"e_1_3_2_1_39_1","first-page":"5","volume-title":"USA","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang , \" Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets,\" in 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego , USA , 2012 , pp. 5 - 8 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, \"Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets,\" in 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego, USA, 2012, pp. 5-8."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_41_1","unstructured":"S. Rasthofer S. Arzt M. Miltenberger and E. Bodden \"Harvesting runtime data in android applications for identifying malware and enhancing code analysis \" Technische Universit\u00e4t Darmstadt2015.  S. Rasthofer S. Arzt M. Miltenberger and E. Bodden \"Harvesting runtime data in android applications for identifying malware and enhancing code analysis \" Technische Universit\u00e4t Darmstadt2015."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.005"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_44_1","first-page":"1","volume-title":"USA","author":"Arp D.","year":"2014","unstructured":"D. Arp , M. Spreitzenbarth , M. Hubner , H. Gascon , and K. Rieck , \" DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket,\" in 2014 Network and Distributed System Security (NDSS) Symposium, San Diego , USA , 2014 , pp. 1 - 15 . D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, \"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket,\" in 2014 Network and Distributed System Security (NDSS) Symposium, San Diego, USA, 2014, pp. 1-15."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"}],"event":{"name":"ICEMC '18: 2018 International Conference on E-business and Mobile Commerce","acronym":"ICEMC '18","location":"Chengdu China"},"container-title":["Proceedings of the 2018 International Conference on E-business and Mobile Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230467.3230478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:23Z","timestamp":1750210763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230478"}},"subtitle":["Features, Analysis Methods, and Detection Techniques"],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":45,"alternative-id":["10.1145\/3230467.3230478","10.1145\/3230467"],"URL":"https:\/\/doi.org\/10.1145\/3230467.3230478","relation":{},"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"2018-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}