{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:23Z","timestamp":1740099023604,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756493"},{"type":"electronic","value":"9783319756509"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75650-9_16","type":"book-chapter","created":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T10:14:32Z","timestamp":1518776072000},"page":"242-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Ferrante","sequence":"first","affiliation":[]},{"given":"Miroslaw","family":"Malek","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Milosevic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,17]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-319-26362-5_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"N Andronio","year":"2015","unstructured":"Andronio, N., Zanero, S., Maggi, F.: HelDroid: dissecting and detecting mobile ransomware. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 382\u2013404. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_18"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Canfora, G., De Lorenzo, A., Medvet, E., Mercaldo, F., Visaggio, C.A.: Effectiveness of opcode ngrams for detection of multi family android malware. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 333\u2013340. IEEE (2015)","DOI":"10.1109\/ARES.2015.57"},{"key":"16_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-30222-5_10","volume-title":"E-Business and Telecommunications","author":"G Canfora","year":"2016","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A.: Evaluating op-code frequency histograms in malware and third-party mobile applications. In: Obaidat, M.S., Lorenz, P. (eds.) ICETE 2015. CCIS, vol. 585, pp. 201\u2013222. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30222-5_10"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A.: Mobile malware detection using op-code frequency histograms. In: Proceedings of International Conference on Security and Cryptography (SECRYPT) (2015)","DOI":"10.5220\/0005537800270038"},{"key":"16_CR5","series-title":"Symbolic Computation","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-12405-5_1","volume-title":"Machine learning","author":"JG Carbonell","year":"1983","unstructured":"Carbonell, J.G., Michalski, R.S., Mitchell, T.M.: An overview of machine learning. In: Michalski, R.S., Carbonell, J.G., Mitchell, T.M. (eds.) Machine learning. SYMBOLIC. Springer, Heidelberg (1983). https:\/\/doi.org\/10.1007\/978-3-662-12405-5_1"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-64701-2_14","volume-title":"Network and System Security","author":"A Gharib","year":"2017","unstructured":"Gharib, A., Ghorbani, A.: DNA-Droid: a real-time android ransomware detection framework. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 184\u2013198. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64701-2_14"},{"key":"16_CR7","unstructured":"Infosec Institute: Evolution in the World of Cyber Crime. Technical report Infosec Institute, June 2016. http:\/\/resources.infosecinstitute.com\/evolution-in-the-world-of-cyber-crime\/#gref"},{"key":"16_CR8","unstructured":"McAfee Labs: McAfee Labs Threats report - December 2016. Technical report. McAfee Labs, August 2016. https:\/\/www.mcafee.com\/au\/resources\/reports\/rp-quarterly-threats-dec-2016.pdf"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Saracino, A.: Bridemaid: An hybrid tool for accurate detection of android malware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 899\u2013901. ACM (2017)","DOI":"10.1145\/3052973.3055156"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Saracino, A., Visaggio, C.A.: I find your behavior disturbing: static and dynamic app behavioral analysis for detection of android malware. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 129\u2013136. IEEE (2016)","DOI":"10.1109\/PST.2016.7906947"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-319-39570-8_14","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"F Mercaldo","year":"2016","unstructured":"Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Ransomware steals your phone. Formal methods rescue it. In: Albert, E., Lanese, I. (eds.) FORTE 2016. LNCS, vol. 9688, pp. 212\u2013221. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39570-8_14"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Mercaldo, F., Visaggio, C.A., Canfora, G., Cimitile, A.: Mobile malware detection in the real world. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 744\u2013746. ACM (2016)","DOI":"10.1145\/2889160.2892656"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Milosevic, J., Ferrante, A., Malek, M.: Malaware: Effective and efficient run-time mobile malware detector. In: The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016). IEEE Computer Society Press, Auckland, New Zealand (2016)","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.65"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Milosevic, J., Malek, M., Ferrante, A.: A friend or a foe? Detecting malware using memory and CPU features. In: 13th International Conference on Security and Cryptography SECRYPT 2016 (2016)","DOI":"10.5220\/0005964200730084"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Jiang, X.: Droidchameleon: Evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 329\u2013334. ACM (2013)","DOI":"10.1145\/2484313.2484355"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Song, S., Kim, B., Lee, S.: The effective ransomware prevention technique using process monitoring on android platform. In: Mobile Information Systems 2016 (2016)","DOI":"10.1155\/2016\/2946735"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Yang, T., Yang, Y., Qian, K., Lo, D.C.T., Qian, Y., Tao, L.: Automated detection and analysis for android ransomware. In: IEEE 17th International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security, IEEE 12th International Conference on Embedded Software and Systems, pp. 1338\u20131343. IEEE (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75650-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T23:11:09Z","timestamp":1570749069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75650-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756493","9783319756509"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75650-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}