{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:33Z","timestamp":1725902973559},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_96","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"952-958","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers"],"prefix":"10.1007","author":[{"given":"Luca","family":"Casati","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Visconti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"96_CR1","unstructured":"KingRoot. https:\/\/kingroot.net\/ . Accessed 27 Feb 2017"},{"key":"96_CR2","unstructured":"Password hashing competition (2015). https:\/\/password-hashing.net . Accessed 27 Feb 2017"},{"key":"96_CR3","unstructured":"Nexus Root Toolkit v. 2.1.9 (2016). http:\/\/www.wugfresh.com\/nrt\/ . Accessed 27 Feb 2017"},{"key":"96_CR4","unstructured":"Xposed Module Repository (2017). http:\/\/repo.xposed.info\/ . Accessed 27 Feb 2017"},{"key":"96_CR5","doi-asserted-by":"crossref","unstructured":"Andrus, J., Nieh, J.: Teaching operating systems using android. In: Proceedings of the 43rd ACM Technical Symposium on Computer Science Education. ACM (2012)","DOI":"10.1145\/2157136.2157312"},{"key":"96_CR6","doi-asserted-by":"crossref","unstructured":"Bossi, S., Visconti, A.: What users should know about full disk encryption based on LUKS. In: Proceedings of the 14th International Conference on Cryptology and Network Security (2015)","DOI":"10.1007\/978-3-319-26823-1_16"},{"key":"96_CR7","doi-asserted-by":"crossref","unstructured":"Moriarty, K., Kaliski, B., Rusch, A.: PKCS#5: Password-Based Cryptography Specification Version 2.1. RFC 8018 (2017)","DOI":"10.17487\/RFC8018"},{"key":"96_CR8","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., McDaniel, P.: Retargeting android applications to java bytecode. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, p. 6. ACM (2012)","DOI":"10.1145\/2393596.2393600"},{"key":"96_CR9","doi-asserted-by":"crossref","unstructured":"Oh, H.S., Kim, B.J., Choi, H.K., Moon, S.M.: Evaluation of android dalvik virtual machine. In: Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems. ACM (2012)","DOI":"10.1145\/2388936.2388956"},{"key":"96_CR10","unstructured":"Park, J., Kim, H., Jeong, Y., Cho, S., Han, S., Park, M.: Effects of code obfuscation on android app similarity analysis. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 6(4), 86\u201398 (2015)"},{"key":"96_CR11","unstructured":"Ruddick, A., Yan, J.: Acceleration attacks on PBKDF2: or, what is inside the black-box of oclHashcat? In: 10th USENIX Workshop on Offensive Technologies (2016)"},{"key":"96_CR12","doi-asserted-by":"crossref","unstructured":"Sierra, F., Ramirez, A.: Defending your android app. In: Proceedings of the 4th Annual ACM Conference on Research in Information Technology. ACM (2015)","DOI":"10.1145\/2808062.2808067"},{"key":"96_CR13","unstructured":"Steube, J.: Optimising computation of hash-algorithms as an attacker. https:\/\/hashcat.net\/events\/p13\/js-ocohaaaa.pdf"},{"key":"96_CR14","doi-asserted-by":"publisher","unstructured":"Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of android malware and android analysis techniques. ACM Comput. Surv. 49(4) (2017). doi: 10.1145\/3017427","DOI":"10.1145\/3017427"},{"key":"96_CR15","doi-asserted-by":"crossref","unstructured":"Visconti, A., Bossi, S., Ragab, H., Cal\u00f2, A.: On the weaknesses of PBKDF2. In: Proceedings of the 14th International Conference on Cryptology and Network Security (2015)","DOI":"10.1007\/978-3-319-26823-1_9"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T07:03:30Z","timestamp":1569654210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_96","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}