{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004437,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_4","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:45:26Z","timestamp":1736149526000},"page":"63-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identifying and Analyzing Vault Apps"],"prefix":"10.1007","author":[{"given":"Seth","family":"Barrett","sequence":"first","affiliation":[]},{"given":"Alex","family":"Salontai","sequence":"additional","affiliation":[]},{"given":"Rajon","family":"Bardhan","sequence":"additional","affiliation":[]},{"given":"Gokila","family":"Dorai","sequence":"additional","affiliation":[]},{"given":"Esra","family":"Akbas","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Woodell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"4_CR1","unstructured":"Android Developers, Manifest.permission, Google, Mountain View, California (developer.android.com\/reference\/android\/Manifest.permission), 2024."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau and P. McDaniel, FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, ACM SIGPLAN Notices, vol. 49(6), pp. 259\u2013269, 2014.","DOI":"10.1145\/2666356.2594299"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"G. Dorai, S. Aggarwal, N. Patel and C. Powell, VIDE \u2013 Vault app identification and extraction system for iOS devices, Forensic Science International: Digital Investigation, vol. 33(S), article no. 301007, 2020.","DOI":"10.1016\/j.fsidi.2020.301007"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Y. Feng, S. Anand, I. Dillig and A. Aiken, Apposcopy: Semantics-based detection of Android malware through static analysis, Proceedings of the Twenty-Second ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576\u2013587, 2014.","DOI":"10.1145\/2635868.2635869"},{"key":"4_CR5","unstructured":"A. Fuchs, A. Chaudhuri and J. Foster, Scandroid: Automated Security Certification of Android Applications, Technical Report CS-TR-4991, Department of Computer Science, University of Maryland, College Park, Maryland, 2009."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"S. Hou, Y. Fan, Y. Zhang, Y. Ye, J. Lei, W. Wan, J. Wang, Q. Xiong and F. Shao, $$\\alpha $$Cyber: Enhancing the robustness of an Android malware detection system against adversarial attacks using a heterogeneous graph-based model, Proceedings of the Twenty-Eighth ACM International Conference on Information and Knowledge Management, pp. 609\u2013618, 2019.","DOI":"10.1145\/3357384.3357875"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"A. Javed, W. Ahmed, M. Alazab, Z. Jalil, K. Kifayat and T. Gadekallu, A comprehensive survey of computer forensics: State-of-the-art, tools, techniques, challenges and future directions, IEEE Access, vol. 10, pp. 11065\u201311089, 2022.","DOI":"10.1109\/ACCESS.2022.3142508"},{"key":"4_CR8","unstructured":"Q. Le and T. Mikolov, Distributed representations of sentences and documents, Proceedings of the Thirty-First International Conference on Machine Learning, vol. 32, pp. II-1188\u2013II-1196, 2014."},{"key":"4_CR9","unstructured":"PCMag, Vault app, Ziff Davis, New York (www.pcmag.com\/encyclopedia\/term\/vault-app), 2024."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"M. Peng, M. Khanov, S. Madireddy, H. Chi, E. Akbas and G. Dorai, DECADE \u2013 Deep-learning-based content-hiding application detection system for Android, Proceedings of the IEEE International Conference on Big Data, pp. 5430\u20135440, 2021.","DOI":"10.1109\/BigData52589.2021.9671842"},{"key":"4_CR11","unstructured":"D. Votipka, S. Rabin, K. Micinski, J. Foster and M. Mazurek, An observational investigation of reverse engineers\u2019 processes, Proceedings of the Twenty-Ninth USENIX Security Symposium, 2020, pp. 1875\u20131892, 2020."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"X. Zhang, I. Baggili and F. Breitinger, Breaking into the vault: Privacy, security and forensic analysis of Android vault applications, Computers and Security, vol. 70, pp. 516\u2013531, 2017.","DOI":"10.1016\/j.cose.2017.07.011"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:14:47Z","timestamp":1745320487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}