{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:37:02Z","timestamp":1648672622342},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019inp0003","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:09:54Z","timestamp":1580508594000},"page":"265-275","source":"Crossref","is-referenced-by-count":0,"title":["CLAP: Classification of Android PUAs by Similarity of DNS Queries"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Mitsuhiro","family":"HATADA","sequence":"first","affiliation":[{"name":"Waseda University"},{"name":"NTT Coporation"}]},{"given":"Tatsuya","family":"MORI","sequence":"additional","affiliation":[{"name":"Waseda University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] C. Pickard and S. Miladinov, \u201cRogue software: Protection against potentially unwanted applications,\u201d Proc. 2012 7th International Conference on Malicious and Unwanted Software, pp.1-8, Oct. 2012. 10.1109\/malware.2012.6461001","DOI":"10.1109\/MALWARE.2012.6461001"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, \u201cClone or Relative?: Understanding the Origins of Similar Android Apps,\u201d Proc. 2016 ACM on International Workshop on Security And Privacy Analytics (IWSPA &apos;16), pp.25-32, March 2016. 10.1145\/2875475.2875480","DOI":"10.1145\/2875475.2875480"},{"key":"3","unstructured":"[3] \u201cVirusTotal-Free Online Virus, Malware and URL Scanner.\u201d https:\/\/www.virustotal.com\/ (accessed 2019-02-06)."},{"key":"4","unstructured":"[4] Y. Kikuchi, H. Mori, H. Nakano, K. Yoshioka, T. Matsumoto, and M. van Eeten, \u201cEvaluating Malware Mitigation by Android Market Operators,\u201d 9th Workshop on Cyber Security Experimentation and Test (CSET 16), pp.1-8, Aug. 2016."},{"key":"5","unstructured":"[5] \u201cCuckoo Sandbox: Automated Malware Analysis.\u201d https:\/\/cuckoosandbox.org\/ (accessed 2019-02-06)."},{"key":"6","unstructured":"[6] \u201cAlexa Top Sites.\u201d https:\/\/www.alexa.com\/topsites (accessed 2019-02-06)."},{"key":"7","unstructured":"[7] https:\/\/tools.ietf.org\/html\/rfc6761 (accessed 2019-02-06)."},{"key":"8","unstructured":"[8] \u201cEasyList.\u201d https:\/\/easylist-downloads.adblockplus.org\/easylist.txt(accessed 2019-02-06)."},{"key":"9","unstructured":"[9] \u201cBlocking with ad server and tracking server hostnames.\u201d https:\/\/pgl.yoyo.org\/as (accessed 2019-02-06)."},{"key":"10","unstructured":"[10] \u201cDNS-BH-Malware Domain Blacklist.\u201d http:\/\/www.malwaredomains.com\/ (accessed 2019-02-06)."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Sebasti\u00e1n, R. Rivera, P. Kotzias, and J. Caballero, \u201cAVClass: A Tool for Massive Malware Labeling,\u201d Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, vol.9854, pp.230-253, Springer International Publishing, Cham, 2016. 10.1007\/978-3-319-45719-2_11","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"12","unstructured":"[12] \u201cDGA Domain List.\u201d http:\/\/data.netlab.360.com\/feeds\/dga\/dga.txt (accessed 2019-02-06)."},{"key":"13","unstructured":"[13] \u201cDomain feed of known DGA domains.\u201d http:\/\/osint.bambenekconsulting.com\/feeds\/dga-feed.txt (accessed 2019-02-06)."},{"key":"14","unstructured":"[14] L. Bilge, E. Kirda, C. Kruegel, and Balduzzi, \u201cExposure: Finding malicious domains using passive dns analysis,\u201d Proc. 18th Annual Network and Distributed System Security Symposium (NDSS &apos;11), pp.1-17, Feb. 2011."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] R. Villamar\u00edn-Salom\u00f3n and J.C. Brustoloni, \u201cBayesian bot detection based on dns traffic similarity,\u201d Proc. 2009 ACM symposium on Applied Computing (SAC &apos;09), pp.2035-2041, March 2009. 10.1145\/1529282.1529734","DOI":"10.1145\/1529282.1529734"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, \u201cMADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention,\u201d IEEE Trans. Dependable and Secure Comput., vol.15, no.1, pp.83-97, 2018. 10.1109\/tdsc.2016.2536605","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J. Malik and R. Kaushal, \u201cCREDROID: Android Malware Detection by Network Traffic Analysis,\u201d Proc. 1st ACM Workshop on Privacy-Aware Mobile Computing (PAMCO &apos;16), pp.28-36, July 2016. 10.1145\/2940343.2940348","DOI":"10.1145\/2940343.2940348"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S.K. Dash, G. Suarez-Tangil, S. Khan, K. Tam, M. Ahmadi, J. Kinder, and L. Cavallaro, \u201cDroidScribe: Classifying android malware based on runtime behavior,\u201d Proc. 2016 IEEE Security and Privacy Workshops (SPW 2016), pp.252-261, May 2016. 10.1109\/spw.2016.25","DOI":"10.1109\/SPW.2016.25"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] W. Chen, D. Aspinall, A.D. Gordon, C. Sutton, and I. Muttik, \u201cMore semantics more robust: Improving android malware classifiers,\u201d Proc. 9th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks (WiSec &apos;16), pp.147-158, July 2016. 10.1145\/2939918.2939931","DOI":"10.1145\/2939918.2939931"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] G. Suarez-Tangil, S.K. Dash, M. Ahmadi, J. Kinder, G. Giacinto, and L. Cavallaro, \u201cDroidSieve: Fast and accurate classification of obfuscated android malware,\u201d Proc. 7th ACM on Conference on Data and Application Security and Privacy (CODASPY &apos;17), pp.309-320, March 2017. 10.1145\/3029806.3029825","DOI":"10.1145\/3029806.3029825"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] M. Sun, X. Li, J.C.S. Lui, R.T.B. Ma, and Z. Liang, \u201cMonet: A user-oriented behavior-based malware variants detection system for android,\u201d IEEE Trans. Inform. Forensic Secur., vol.12, no.5, pp.1103-1112, May 2017. 10.1109\/tifs.2016.2646641","DOI":"10.1109\/TIFS.2016.2646641"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Y. Zhou and X. Jiang, \u201cDissecting Android Malware: Characterization and Evolution,\u201d Proc. 2012 IEEE Symposium on Security and Privacy (S&amp;P 2012), pp.95-109, May 2012. 10.1109\/sp.2012.16","DOI":"10.1109\/SP.2012.16"},{"key":"23","unstructured":"[23] V. Svajcer and S. McDonald, \u201cClassifying PUAs in the Mobile Environment,\u201d Virus Bulletin Conference, Oct. 2013."},{"key":"24","unstructured":"[24] P. Kotzias, L. Bilge, and J. Caballero, \u201cMeasuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services,\u201d Proc. 25th USENIX Security Symposium (USENIX Security 16), pp.739-756, Aug. 2016."},{"key":"25","unstructured":"[25] K. Thomas, J.A.E. Crespo, R. Rasti, J.M. Picod, C. Phillips, M.A. Decoste, C. Sharp, F. Tirelo, A. Tofigh, M.A. Courteau, L. Ballard, R. Shield, N. Jagpal, M.A. Rajab, P. Mavrommatis, N. Provos, E. Bursztein, and D. McCoy, \u201cInvestigating Commercial Pay-Per-Install and the Distribution of Unwanted Software,\u201d Proc. 25th USENIX Security Symposium (USENIX Security 16), pp.721-739, Aug. 2016."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] B. Andow, A. Nadkarni, B. Bassett, W. Enck, and T. Xie, \u201cA Study of Grayware on Google Play,\u201d Proc. 2016 IEEE Security and Privacy Workshops (SPW 2016), pp.224-233, May 2016. 10.1109\/spw.2016.40","DOI":"10.1109\/SPW.2016.40"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] K. Chen, X. Wang, Y. Chen, P. Wang, Y. Lee, X. Wang, B. Ma, A. Wang, Y. Zhang, and W. Zou, \u201cFollowing Devil&apos;s Footprints:Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS,\u201d Proc. 2016 IEEE Symposium on Security and Privacy (S&amp;P 2016), pp.357-376, May 2016. 10.1109\/sp.2016.29","DOI":"10.1109\/SP.2016.29"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:27:18Z","timestamp":1580527638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019inp0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}