{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:50:05Z","timestamp":1753602605853,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371685","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"6-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Android Malware Detection Combined with Static and Dynamic Analysis"],"prefix":"10.1145","author":[{"given":"Jianing","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Xingtao","family":"Zhuang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Yunfang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/www.kantarworldpanel.com\/global\/smartphone-os-market-share\/  https:\/\/www.kantarworldpanel.com\/global\/smartphone-os-market-share\/"},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/www.freebuf.com\/articles\/paper\/179295.html  https:\/\/www.freebuf.com\/articles\/paper\/179295.html"},{"volume-title":"Proceedings of the Third International Symposium on Women in Computing and Informatics (WCI '15)","author":"Priyadarshani M. K.","key":"e_1_3_2_1_3_1","unstructured":"Priyadarshani M. K. and Sunita V. D . 2015. Two Phase Static Analysis Technique for Android Malware Detection . In Proceedings of the Third International Symposium on Women in Computing and Informatics (WCI '15) , Indu Nair (Ed.). ACM, New York, NY, USA, 650--655. DOI=https:\/\/doi.org\/10.1145\/2791405.2791558 10.1145\/2791405.2791558 Priyadarshani M. K. and Sunita V. D. 2015. Two Phase Static Analysis Technique for Android Malware Detection. In Proceedings of the Third International Symposium on Women in Computing and Informatics (WCI '15), Indu Nair (Ed.). ACM, New York, NY, USA, 650--655. DOI=https:\/\/doi.org\/10.1145\/2791405.2791558"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile (DeMobile","author":"Gerardo C.","year":"2015","unstructured":"Gerardo C. , Eric M. , and Corrado A . 2015. Detecting Android malware using sequences of system calls . In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile (DeMobile 2015 ). ACM, New York, NY, USA, 13--20. DOI=http:\/\/dx.doi.org\/10.1145\/2804345.2804349 10.1145\/2804345.2804349 Gerardo C., Eric M., and Corrado A. 2015. Detecting Android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile (DeMobile 2015). ACM, New York, NY, USA, 13--20. DOI=http:\/\/dx.doi.org\/10.1145\/2804345.2804349"},{"key":"e_1_3_2_1_5_1","unstructured":"https:\/\/code.google.com\/archive\/p\/androguard\/  https:\/\/code.google.com\/archive\/p\/androguard\/"},{"volume-title":"Proceedings of the 10th Annual Cyber and Information Security Research Conference (CISR '15)","author":"Suzanna S.","key":"e_1_3_2_1_6_1","unstructured":"Suzanna S. , Yang , and Alfred A . 2015. Android Malware Static Analysis Techniques . In Proceedings of the 10th Annual Cyber and Information Security Research Conference (CISR '15) . ACM, New York, NY, USA, Article 5, 8 pages. DOI=https:\/\/doi.org\/10.1145\/2746266.2746271 10.1145\/2746266.2746271 Suzanna S., Yang, and Alfred A. 2015. Android Malware Static Analysis Techniques. In Proceedings of the 10th Annual Cyber and Information Security Research Conference (CISR '15). ACM, New York, NY, USA, Article 5, 8 pages. DOI=https:\/\/doi.org\/10.1145\/2746266.2746271"},{"volume-title":"Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE '16)","author":"Huda A. A.","key":"e_1_3_2_1_7_1","unstructured":"Huda A. A. , Tae O. , and Bill S . 2016. Android Malware Detection Using Category-Based Machine Learning Classifiers . In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE '16) . ACM, New York, NY, USA, 54--59. DOI=https:\/\/doi.org\/10.1145\/2978192.2978218 10.1145\/2978192.2978218 Huda A. A., Tae O., and Bill S. 2016. Android Malware Detection Using Category-Based Machine Learning Classifiers. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE '16). ACM, New York, NY, USA, 54--59. DOI=https:\/\/doi.org\/10.1145\/2978192.2978218"},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/code.google.com\/archive\/p\/droidbox\/  https:\/\/code.google.com\/archive\/p\/droidbox\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)","author":"Michael S.","year":"1808","unstructured":"Michael S. , Felix F. , Florian E. , and Thomas S . 2013. Mobile-sandbox: having a deeper look into android applications . In Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13) . ACM, New York, NY, USA , 1808 --1815. DOI=https:\/\/doi.org\/10.1145\/2480362.2480701 10.1145\/2480362.2480701 Michael S., Felix F., Florian E., and Thomas S. 2013. Mobile-sandbox: having a deeper look into android applications. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13). ACM, New York, NY, USA, 1808--1815. DOI=https:\/\/doi.org\/10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_10_1","first-page":"2","article-title":"2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)","volume":"22","author":"Lucky O.","year":"2019","unstructured":"Lucky O. , Enrico M. , and Panagiotis A . 2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) . ACM Trans. Priv. Secur. 22 , 2 , Article 14 ( April 2019 ), 34 pages. DOI=https:\/\/doi.org\/10.1145\/3313391 10.1145\/3313391 Lucky O., Enrico M., and Panagiotis A. 2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secur. 22, 2, Article 14 (April 2019), 34 pages. DOI=https:\/\/doi.org\/10.1145\/3313391","journal-title":"ACM Trans. Priv. Secur."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (CIIS","author":"Mohsen K.","year":"2018","unstructured":"Mohsen K. , Mohammad D. , and Ali D . 2018. Application of Machine Learning Algorithms for Android Malware Detection . In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (CIIS 2018 ). ACM, New York, NY, USA, 32--36. DOI=https:\/\/doi.org\/10.1145\/3293475.3293489 10.1145\/3293475.3293489 Mohsen K., Mohammad D., and Ali D. 2018. Application of Machine Learning Algorithms for Android Malware Detection. In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (CIIS 2018). ACM, New York, NY, USA, 32--36. DOI=https:\/\/doi.org\/10.1145\/3293475.3293489"},{"volume-title":"Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS '14)","author":"Wu W. C.","key":"e_1_3_2_1_12_1","unstructured":"Wu W. C. and Hung S. H .. 2014. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning . In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS '14) . ACM, New York, NY, USA, 247--252. DOI=http:\/\/dx.doi.org\/10.1145\/2663761.2664223 10.1145\/2663761.2664223 Wu W. C. and Hung S. H.. 2014. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS '14). ACM, New York, NY, USA, 247--252. DOI=http:\/\/dx.doi.org\/10.1145\/2663761.2664223"},{"volume-title":"Proceedings of the 10th International Conference on Security of Information and Networks (SIN '17)","author":"Peter Z.","key":"e_1_3_2_1_13_1","unstructured":"Peter Z. , Dmitry Z. , and Andrew D .. 2017. Detecting Android application malicious behaviors based on the analysis of control flows and data flows . In Proceedings of the 10th International Conference on Security of Information and Networks (SIN '17) . ACM, New York, NY, USA, 280--283. DOI= https:\/\/doi.org\/10.1145\/3136825.3140583 10.1145\/3136825.3140583 Peter Z., Dmitry Z., and Andrew D.. 2017. Detecting Android application malicious behaviors based on the analysis of control flows and data flows. In Proceedings of the 10th International Conference on Security of Information and Networks (SIN '17). ACM, New York, NY, USA, 280--283. DOI= https:\/\/doi.org\/10.1145\/3136825.3140583"},{"volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM","author":"Sen C.","key":"e_1_3_2_1_14_1","unstructured":"Sen C. , Minhui X. , and Tang Z. S . 2016. StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware . In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM , New York, NY, USA, 377--388. DOI=https:\/\/doi.org\/10.1145\/2897845.2897860 10.1145\/2897845.2897860 Sen C., Minhui X., and Tang Z. S. 2016. StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM, New York, NY, USA, 377--388. DOI=https:\/\/doi.org\/10.1145\/2897845.2897860"},{"key":"e_1_3_2_1_15_1","unstructured":"https:\/\/labs.mwrinfosecurity.com\/tools\/drozer\/  https:\/\/labs.mwrinfosecurity.com\/tools\/drozer\/"},{"key":"e_1_3_2_1_16_1","unstructured":"https:\/\/www.virustotal.com\/  https:\/\/www.virustotal.com\/"},{"key":"e_1_3_2_1_17_1","unstructured":"https:\/\/bbs.kafan.cn\/forum-31-1.html  https:\/\/bbs.kafan.cn\/forum-31-1.html"},{"volume-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17)","author":"Dam K.","key":"e_1_3_2_1_18_1","unstructured":"Dam K. and Tayssir T . 2017. Learning Android Malware . In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17) . ACM, New York, NY, USA, Article 59, 9 pages. DOI=https:\/\/doi.org\/10.1145\/3098954.3105826 10.1145\/3098954.3105826 Dam K. and Tayssir T. 2017. Learning Android Malware. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, New York, NY, USA, Article 59, 9 pages. DOI=https:\/\/doi.org\/10.1145\/3098954.3105826"},{"volume-title":"Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 (PPREW'14)","author":"Luke D.","key":"e_1_3_2_1_19_1","unstructured":"Luke D. , Vivek N. , and Arun L . 2014. DroidLegacy: Automated Familial Classification of Android Malware . In Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 (PPREW'14) . ACM, New York, NY, USA, Article 3, 12 pages. DOI=http:\/\/dx.doi.org\/10.1145\/2556464.2556467 10.1145\/2556464.2556467 Luke D., Vivek N., and Arun L. 2014. DroidLegacy: Automated Familial Classification of Android Malware. In Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 (PPREW'14). ACM, New York, NY, USA, Article 3, 12 pages. DOI=http:\/\/dx.doi.org\/10.1145\/2556464.2556467"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":19,"alternative-id":["10.1145\/3371676.3371685","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371685","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}