{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:40:42Z","timestamp":1725975642470},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_8","type":"book-chapter","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:02:48Z","timestamp":1524524568000},"page":"104-112","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Possible Keyloggers Without Implementing a Keyboard in Android"],"prefix":"10.1007","author":[{"given":"Itzael","family":"Jim\u00e9nez Aranda","sequence":"first","affiliation":[]},{"given":"Eleazar","family":"Aguirre Anaya","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Acosta Bermejo","sequence":"additional","affiliation":[]},{"given":"Ponciano Jorge","family":"Escamilla Ambrosio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Cho, J., Cho, G., Kim, H.: Keyboard or keylogger?: a security analysis of third-party keyboards on Android. In: 13th Annual Conference on Privacy, Security and Trust, pp. 173\u2013176. IEEE (2015)","DOI":"10.1109\/PST.2015.7232970"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Mohsen, F., Bello-Ogunu, E., Shehab, M.: Investigating the keylogging threat in android\u2014User perspective (Regular research paper). In: Second International Conference on Mobile and Secure Services (MobiSecServ), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/MOBISECSERV.2016.7440223"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Mohsen, F., Shehab, M.: Android keylogging threat. In: 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 545\u2013552. IEEE (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254209"},{"key":"8_CR4","unstructured":"Kaspersky Lab.: What is a keylogger? \nhttp:\/\/www.kaspersky.com\/au\/internet-security-center\/definitions\/keylogger"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Nasution, S.M., Purwanto, Y., Virgono, A., Ruriawan, M.F.: Modified kleptodata for spying soft-input keystroke and location based on Android mobile device. In: International Conference on Information Technology Systems and Innovation, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ICITSI.2015.7437700"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Hirabe, Y., Arakawa, Y., Yasumoto, K.: Logging all the touch operations on Android. In: Seventh International Conference on Mobile Computing and Ubiquitous Networking, pp. 93\u201394. IEEE (2014)","DOI":"10.1109\/ICMU.2014.6799073"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2012.10.002","volume":"32","author":"D Damopoulos","year":"2013","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102\u2013114 (2013)","journal-title":"Comput. Secur."},{"key":"8_CR8","unstructured":"Android open source project: Devices - Input. \nhttps:\/\/source.android.com\/devices\/input\/index.html"},{"key":"8_CR9","unstructured":"Google Git: Git repositories on Android. \nhttps:\/\/android.googlesource.com\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:07:12Z","timestamp":1524524832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}