{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:54:34Z","timestamp":1743155674014,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031375859"},{"type":"electronic","value":"9783031375866"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37586-6_21","type":"book-chapter","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T23:02:16Z","timestamp":1689116536000},"page":"358-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Dynamic Approach to\u00a0Defuse Logic Bombs in\u00a0Android Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3736-6383","authenticated-orcid":false,"given":"Fausto","family":"Fasano","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9990-234X","authenticated-orcid":false,"given":"Michele","family":"Guerra","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Milanese","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7995-8582","authenticated-orcid":false,"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,12]]},"reference":[{"key":"21_CR1","unstructured":"Agrawal, H., et al.: Detecting hidden logic bombs in critical infrastructure software (2012)"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: AndroZoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories. MSR \u201916, pp. 468\u2013471. ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2901739.2903508","DOI":"10.1145\/2901739.2903508"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bond, M.D., Baker, G.Z., Guyer, S.Z.: Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses. In: ACM-SIGPLAN Symposium on Programming Language Design and Implementation (2010)","DOI":"10.1145\/1806596.1806599"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Choudhary, M., Kishore, B.: HAAMD: hybrid analysis for android malware detection. In: 2018 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20134 (2018). https:\/\/doi.org\/10.1109\/ICCCI.2018.8441295","DOI":"10.1109\/ICCCI.2018.8441295"},{"key":"21_CR5","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-01701-9_10","volume-title":"Security and Privacy in Communication Networks","author":"S Dong","year":"2018","unstructured":"Dong, S., et al.: Understanding android obfuscation techniques: a large-scale investigation in the wild. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 172\u2013192. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01701-9_10"},{"key":"21_CR6","unstructured":"Erturk, E.: A case study in open source software security and privacy: Android adware. In: World Congress on Internet Security, pp. 189\u2013191 (2012)"},{"key":"21_CR7","unstructured":"Fasano, F., Guerra, M., Milanese, R., Oliveto, R.: A dynamic approach to defuse logic bombs in android applications: a technical report. Technical report, University of Molise, DiBT (2023). https:\/\/dibt.unimol.it\/fasano\/TR_DBSEC2023.pdf"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Fereidooni, H., Conti, M., Yao, D., Sperduti, A.: Anastasia: android malware detection using static analysis of applications. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2016). https:\/\/doi.org\/10.1109\/NTMS.2016.7792435","DOI":"10.1109\/NTMS.2016.7792435"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Fratantonio, Y., Bianchi, A., Robertson, W., Kirda, E., Kruegel, C., Vigna, G.: TriggerScope: towards detecting logic bombs in android applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 377\u2013396 (2016). https:\/\/doi.org\/10.1109\/SP.2016.30","DOI":"10.1109\/SP.2016.30"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Guerra., M., Milanese., R., Oliveto., R., Fasano., F.: RPCDroid: runtime identification of permission usage contexts in android applications. In: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, pp. 714\u2013721. INSTICC, SciTePress (2023). https:\/\/doi.org\/10.5220\/0011797200003405","DOI":"10.5220\/0011797200003405"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Kang, H., Jang, J.W., Mohaisen, D., Kim, H.K.: Detecting and classifying android malware using static analysis along with creator information. Int. J. Distrib. Sens. Netw. 2015, 1\u20139 (2015). https:\/\/doi.org\/10.1155\/2015\/479174","DOI":"10.1155\/2015\/479174"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Khalid, S., Hussain, F.B.: Evaluating dynamic analysis features for android malware categorization. In: 2022 International Wireless Communications and Mobile Computing (IWCMC), pp. 401\u2013406 (2022). https:\/\/doi.org\/10.1109\/IWCMC55113.2022.9824225","DOI":"10.1109\/IWCMC55113.2022.9824225"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Kotzias, P., Caballero, J., Bilge, L.: How did that get in my phone? Unwanted app distribution on android devices. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 53\u201369 (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00041","DOI":"10.1109\/SP40001.2021.00041"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Li, L., Bissyande, T.F., Klein, J.: Rebooting research on detecting repackaged android apps: literature review and benchmark. IEEE Trans. Softw. Eng. 47(04), 676\u2013693 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2901679","DOI":"10.1109\/TSE.2019.2901679"},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Pan, X., Wang, X., Duan, Y., Wang, X., Yin, H.: Dark hazard: learning-based, large-scale discovery of hidden sensitive operations in android apps (2017). https:\/\/doi.org\/10.14722\/ndss.2017.23265","DOI":"10.14722\/ndss.2017.23265"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Peiravian, N., Zhu, X.: Machine learning for android malware detection using permission and API calls. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp. 300\u2013305 (2013). https:\/\/doi.org\/10.1109\/ICTAI.2013.53","DOI":"10.1109\/ICTAI.2013.53"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Pieterse, H., Olivier, M.S.: Android botnets on the rise: Trends and characteristics. In: 2012 Information Security for South Africa, pp. 1\u20135 (2012). https:\/\/doi.org\/10.1109\/ISSA.2012.6320432","DOI":"10.1109\/ISSA.2012.6320432"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1090\/S0002-9947-1953-0053041-6","volume":"74","author":"HG Rice","year":"1953","unstructured":"Rice, H.G.: Classes of recursively enumerable sets and their decision problems. Trans. Am. Math. Soc. 74, 358\u2013366 (1953)","journal-title":"Trans. Am. Math. Soc."},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: 2012 European Intelligence and Security Informatics Conference, pp. 141\u2013147 (2012). https:\/\/doi.org\/10.1109\/EISIC.2012.34","DOI":"10.1109\/EISIC.2012.34"},{"issue":"6","key":"21_CR20","doi-asserted-by":"publisher","first-page":"3822","DOI":"10.1109\/TDSC.2021.3108057","volume":"19","author":"J Samhi","year":"2022","unstructured":"Samhi, J., Bartel, A.: On the (in)effectiveness of static logic bomb detection for android apps. IEEE Trans. Depend. Secure Comput. 19(6), 3822\u20133836 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3108057","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"21_CR21","doi-asserted-by":"publisher","unstructured":"Samhi, J., Bissyand\u00e9, T.F., Klein, J.: TriggerZoo: a dataset of android applications automatically infected with logic bombs. In: Proceedings of the 19th International Conference on Mining Software Repositories. MSR \u201922, pp. 459\u2013463. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3524842.3528020","DOI":"10.1145\/3524842.3528020"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Samhi, J., Li, L., Bissyand\u2019e, T.F., Klein, J.: Difuzer: uncovering suspicious hidden sensitive operations in android apps. In: 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE), pp. 723\u2013735 (2021)","DOI":"10.1145\/3510003.3510135"},{"key":"21_CR23","doi-asserted-by":"publisher","unstructured":"Sumner, W.N., Zhang, X.: Identifying execution points for dynamic analyses. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 81\u201391 (2013). https:\/\/doi.org\/10.1109\/ASE.2013.6693069","DOI":"10.1109\/ASE.2013.6693069"},{"issue":"5","key":"21_CR24","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/TSE.2011.70","volume":"38","author":"WN Sumner","year":"2012","unstructured":"Sumner, W.N., Zheng, Y., Weeratunge, D., Zhang, X.: Precise calling context encoding. IEEE Trans. Softw. Eng. 38(5), 1160\u20131177 (2012). https:\/\/doi.org\/10.1109\/TSE.2011.70","journal-title":"IEEE Trans. Softw. Eng."},{"key":"21_CR25","doi-asserted-by":"publisher","unstructured":"Xin, B., Sumner, W.N., Zhang, X.: Efficient program execution indexing. In: Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI \u201908, pp. 238\u2013248. Association for Computing Machinery, New York, NY, USA (2008). https:\/\/doi.org\/10.1145\/1375581.1375611","DOI":"10.1145\/1375581.1375611"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Xu, L., Zhang, D., Jayasena, N., Cavazos, J.: Hadm: hybrid analysis for detection of malware, pp. 702\u2013724 (2018). https:\/\/doi.org\/10.1007\/978-3-319-56991-8_51","DOI":"10.1007\/978-3-319-56991-8_51"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Yang, T., Yang, Y., Qian, K., Lo, D.C.T., Qian, Y., Tao, L.: Automated detection and analysis for android ransomware. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp. 1338\u20131343 (2015). https:\/\/doi.org\/10.1109\/HPCC-CSS-ICESS.2015.39","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Zheng, C., et al.: SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. SPSM \u201912, pp. 93\u2013104. Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2381934.2381950","DOI":"10.1145\/2381934.2381950"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37586-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T23:05:08Z","timestamp":1689116708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37586-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031375859","9783031375866"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37586-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"12 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sophia-Antipolis","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dbsec2023.unimol.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}