{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:05:37Z","timestamp":1742958337211,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_12","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"203-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Categorizing Mobile Device Malware Based on System Side-Effects"],"prefix":"10.1007","author":[{"given":"Zachary","family":"Grimmett","sequence":"first","affiliation":[]},{"given":"Jason","family":"Staggs","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"key":"12_CR1","unstructured":"Android Open Source Project, Security, May 22, 2017. source.android.com\/security"},{"key":"12_CR2","unstructured":"Argyroudis, P., Karamitas, C.: Exploiting the jemalloc memory allocator: Owning Firefox\u2019s heap. Presented at the Black Hat USA Conference (2012)"},{"key":"12_CR3","unstructured":"Be\u2019er, H.: Metaphor: A (Real) Real-Life Stagefright Exploit, Revision 1.1, NorthBit, Herzliya, Israel (2016). raw.githubusercontent.com\/NorthBit\/Public\/master\/NorthBit-Metaphor.pdf"},{"key":"12_CR4","unstructured":"Brand, M.: Stagefrightened? Project Zero, Google, Mountain View, California, September 16, 2015. googleprojectzero.blogspot.com\/2015\/09\/stagefrightened.html"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proceedings of the Nineteenth International Conference on World Wide Web, pp. 281\u2013290 (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"12_CR6","unstructured":"Drake, J.: Stagefright: Scary code in the heart of Android. Presented at the Black Hat USA Conference (2015)"},{"key":"12_CR7","unstructured":"Edmonds, J.: Cell Phone Reverse Engineering and Malware Analysis, Ph.D. Dissertation, Tandy School of Computer Science, University of Tulsa, Tulsa, Oklahoma (2012)"},{"key":"12_CR8","unstructured":"Exodus Intelligence, Stagefright: Mission Accomplished? Austin, Texas, August 13, 2015. blog.exodusintel.com\/2015\/08\/13\/stagefright-mission-accomplished"},{"key":"12_CR9","unstructured":"G Data Software, G Data Mobile Malware Report, Threat Report: Q2\/2015, Bochum, Germany (2015)"},{"key":"12_CR10","unstructured":"Ludwig, A., Rapaka, V.: An Update to Nexus Devices, Google, Mountain View, California, August 5, 2015. officialandroid.blogspot.com\/2015\/08\/an-update-to-nexus-devices.html"},{"key":"12_CR11","unstructured":"Ratanaworabhan, P., Livshits, B., Zorn, B.: NOZZLE: a defense against heap-spraying code injection attacks. In: Proceedings of the Eighteenth USENIX Security Symposium, pp. 169\u2013186 (2009)"},{"key":"12_CR12","unstructured":"Samsung Electronics, Samsung Announces an Android Security Update Process to Ensure Timely Protection from Security Vulnerabilities. Press Release, Suwon, South Korea, August 5, 2015"},{"key":"12_CR13","unstructured":"Scientific Working Group on Digital Evidence, SWGDE Best Practices for Mobile Phone Forensics, Version 2.0 (2013)"},{"key":"12_CR14","unstructured":"Serna, F.: The info leak era of software exploitation. Presented at the Black Hat USA Conference (2012)"},{"key":"12_CR15","unstructured":"Sotirov, A.: Heap feng shui in JavaScript. Presented at the Black Hat Europe Conference (2007)"},{"issue":"S1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"S112","DOI":"10.1016\/j.diin.2014.03.014","volume":"11","author":"J Stuttgen","year":"2014","unstructured":"Stuttgen, J., Cohen, M.: Robust Linux memory acquisition with minimal target impact. Digital Investigation 11(S1), S112\u2013S119 (2014)","journal-title":"Digital Investigation"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-319-11203-9_12","volume-title":"Computer Security - ESORICS 2014","author":"H Sun","year":"2014","unstructured":"Sun, H., Sun, K., Wang, Y., Jing, J., Jajodia, S.: TrustDump: reliable memory acquisition on smartphones. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 202\u2013218. Springer, Cham (2014). doi:10.1007\/978-3-319-11203-9_12"},{"issue":"3\u20134","key":"12_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.diin.2011.10.003","volume":"8","author":"J Sylve","year":"2012","unstructured":"Sylve, J., Case, A., Marziale, L., Richard, G.: Acquisition and analysis of volatile memory from Android devices. Digital Investigation 8(3\u20134), 175\u2013184 (2012)","journal-title":"Digital Investigation"},{"issue":"S","key":"12_CR19","doi-asserted-by":"publisher","first-page":"S74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"V Thing","year":"2010","unstructured":"Thing, V., Ng, K., Chang, E.: Live memory forensics of mobile phones. Digital Investigation 7(S), S74\u2013S82 (2010)","journal-title":"Digital Investigation"},{"key":"12_CR20","unstructured":"Zimperium zLabs, The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes, San Francisco, California, September 9, 2015. blog.zimperium.com\/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:06:34Z","timestamp":1630368394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}