{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:53:36Z","timestamp":1725915216822},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_69","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"793-798","source":"Crossref","is-referenced-by-count":3,"title":["System Log-Based Android Root State Detection"],"prefix":"10.1007","author":[{"given":"Junjie","family":"Jin","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Evans, N.S., Benameur, A., Shen, Y.: All your root checks are belong to us: the sad state of root detection. In: Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access (MobiWac 2015), pp. 81\u201388, New York (2015)","DOI":"10.1145\/2810362.2810364"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Sun, S.-T., Cuadros, A., Beznosov, K.: Android rooting: methods, detection, and evasion. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2015), pp. 3\u201314, New York (2015)","DOI":"10.1145\/2808117.2808126"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Ho, T.-H., Dean, D., Gu, X., Enck, W.: PREC: practical root exploit containment for android devices. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), pp. 187\u2013198, New York (2014)","DOI":"10.1145\/2557547.2557563"},{"key":"69_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, H., She, D., Qian, Z.: Android root and its providers: a double-edged sword. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), pp. 1093\u20131104, New York (2015)","DOI":"10.1145\/2810103.2813714"},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. NDSS (2015)","DOI":"10.14722\/ndss.2015.23263"},{"key":"69_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-319-08344-5_23","volume-title":"Information Security and Privacy","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Wang, Y., Jing, J., Wang, Q., Lei, L.: Once root always a threat: analyzing the security threats of android permission system. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 354\u2013369. Springer, Cham (2014). doi: 10.1007\/978-3-319-08344-5_23"},{"key":"69_CR7","unstructured":"Google Compatibility Test Suite. https:\/\/source.android.com\/compatibility\/cts\/"},{"key":"69_CR8","unstructured":"cyanogenmod. http:\/\/www.cyanogenmod.org\/"},{"key":"69_CR9","unstructured":"supersu. https:\/\/www.chainfire.eu\/"},{"key":"69_CR10","unstructured":"Xposed Framework. http:\/\/www.cydiasubstrate.com\/"},{"key":"69_CR11","unstructured":"titanium-backup. http:\/\/www.titaniumtrack.com\/titanium-backup.html"},{"key":"69_CR12","unstructured":"xda-developers. http:\/\/forum.xda-developers.com\/apps\/supersu"},{"key":"69_CR13","unstructured":"compatibility. http:\/\/source.android.com\/compatibility"},{"key":"69_CR14","unstructured":"Google Android Security 2015 Report. https:\/\/source.android.com\/zh-CN\/\/security\/reports\/Google_Android_Security_2015_Report_Final.pdf"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T12:53:18Z","timestamp":1570279998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}