{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:21:41Z","timestamp":1725974501320},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_9","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T10:03:21Z","timestamp":1523354601000},"page":"167-184","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["ThiefTrap \u2013 An Anti-theft Framework for Android"],"prefix":"10.1007","author":[{"given":"Sascha","family":"Gro\u00df","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"issue":"5","key":"9_CR1","first-page":"544","volume":"3","author":"I Al Rassan","year":"2013","unstructured":"Al Rassan, I., Al Sheikh, M.A.: Securing application in mobile computing. Int. J. Inf. Electron. Eng. 3(5), 544 (2013)","journal-title":"Int. J. Inf. Electron. Eng."},{"key":"9_CR2","unstructured":"Apple: Find my iPhone, iPad, iPod touch, or Mac. www.apple.com\/support\/icloud\/find-my-device\/"},{"key":"9_CR3","unstructured":"Avast: Avast free mobile security, June 2017. http:\/\/www.avast.com\/en-us\/free-mobile-security"},{"key":"9_CR4","unstructured":"Cannon, T., Bradford, S.: Into the droid: gaining access to Android user data. In: DefCon Hacking Conference (DefCon 2012), Las Vegas, Nevada, USA (2012)"},{"issue":"03","key":"9_CR5","first-page":"195","volume":"7","author":"JG Chouhan","year":"2016","unstructured":"Chouhan, J.G., Singh, N.K., Modi, P.S., Jani, K.A., Joshi, B.N., et al.: Camera and voice control based location services and information security on Android. J. Inf. Secur. 7(03), 195 (2016)","journal-title":"J. Inf. Secur."},{"key":"9_CR6","unstructured":"CNBC: CNBC study. http:\/\/www.cnbc.com\/2014\/04\/26\/most-americans-dont-secure-their-smartphones.html"},{"key":"9_CR7","unstructured":"Google: Android device manager, June 2017. https:\/\/www.google.com\/android\/devicemanager"},{"key":"9_CR8","unstructured":"Google: Android device protection, June 2017. https:\/\/support.google.com\/nexus\/answer\/6172890"},{"key":"9_CR9","unstructured":"Google: Android internals, February 2017. https:\/\/source.android.com\/source\/index.html"},{"key":"9_CR10","unstructured":"Google: Android open source project, June 2017. https:\/\/source.android.com"},{"key":"9_CR11","unstructured":"Google: Android OS version usages, January 2017. https:\/\/developer.android.com\/about\/dashboards\/index.html"},{"key":"9_CR12","unstructured":"Google: Android version usage, 6 July 2017. https:\/\/developer.android.com\/about\/dashboards\/index.html"},{"key":"9_CR13","unstructured":"IDC: Worldwide smartphone OS market share, November 2016. http:\/\/www.idc.com\/promo\/smartphone-market-share\/os;jsessionid=6A0934D1434A49DBFFE74D63DA2C595B"},{"key":"9_CR14","unstructured":"Insider, B.: IDG research, May 2014. http:\/\/www.businessinsider.com\/smartphone-theft-statistics-2014-5?IR=T"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kuppusamy, K.S., Senthilraja, R., Aghila, G.: A model for remote access and protection of smartphones using short message service. arXiv preprint arXiv:1203.3431 (2012)","DOI":"10.5121\/ijcseit.2012.2109"},{"key":"9_CR16","unstructured":"Ossmann, M., Osborn, K.: Multiplexed wired attack surfaces. In: BlackHat USA (2013)"},{"key":"9_CR17","unstructured":"Reports, C.: Consumer reports, May 2014. http:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm"},{"key":"9_CR18","unstructured":"Ruddock, D.: Anti-theft. http:\/\/www.androidpolice.com\/2015\/03\/12\/guide-what-is-android-5-1s-antitheft-device-protection-feature-and-how-do-i-use-it\/"},{"key":"9_CR19","unstructured":"Schneider, D.M.: iMobileSitter, March 2014. http:\/\/www.imobilesitter.com\/"},{"key":"9_CR20","unstructured":"Shetty, A.: Mobile anti theft system (MATS) (2012)"},{"key":"9_CR21","unstructured":"Dhanu, S., Shaikh, A., Barshe, S.: Anti-theft application for Android based devices. Int. J. Adv. Res. Comput. Commun. Eng. (2016)"},{"key":"9_CR22","unstructured":"Simon, L., Anderson, R.: Security analysis of consumer-grade anti-theft solutions provided by Android mobile anti-virus apps. In: 4th Mobile Security Technologies Workshop (MoST). Citeseer (2015)"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-35362-8_2","volume-title":"Cyberspace Safety and Security","author":"A Srinivasan","year":"2012","unstructured":"Srinivasan, A., Wu, J.: SafeCode \u2013 safeguarding security and privacy of user data on stolen iOS devices. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 11\u201320. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35362-8_2"},{"key":"9_CR24","unstructured":"Symantec: Norton mobile security. https:\/\/us.norton.com\/anti-theft\/"},{"key":"9_CR25","unstructured":"Tang, Y., Ames, P., Bhamidipati, S., Bijlani, A., Geambasu, R., Sarda, N.: CleanOS: limiting mobile data exposure with idle eviction. In: Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), pp. 77\u201391 (2012)"},{"key":"9_CR26","unstructured":"Whitwam, R.: Anti-theft (2015). http:\/\/www.greenbot.com\/article\/2904397\/everything-you-need-to-know-about-device-protection-in-android-51.html"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Z., Sun, K., Zhu, W.T., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 537\u2013542. ACM (2014)","DOI":"10.1145\/2590296.2590318"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T21:52:45Z","timestamp":1571089965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}