{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:48Z","timestamp":1725899988649},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_1","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"1-15","source":"Crossref","is-referenced-by-count":36,"title":["Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Nauman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sohail","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"PandaLabs: PandaLabs Q1 2008 report (2008), http:\/\/pandalabs.pandasecurity.com\/blogs\/images\/PandaLabs\/2008\/04\/01\/Quarterly_Report_PandaLabs_Q1_2008.pdf"},{"key":"1_CR2","unstructured":"Gartner Research (2009) Press Release, http:\/\/www.gartner.com\/it\/page.jsp?id=985912"},{"key":"1_CR3","unstructured":"Google: Android Home Page (2009), http:\/\/www.android.com ."},{"key":"1_CR4","unstructured":"AdMob Mobile Metrics: Mobile Metrics Report (June 2009), http:\/\/metrics.admob.com\/2009\/07\/june-2009-mobile-metrics-report\/ ."},{"key":"1_CR5","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"S. Pearson","year":"2002","unstructured":"Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2002)"},{"key":"1_CR6","unstructured":"TCG: Trusted Computing Group (2010), http:\/\/www.trustedcomputinggroup.org\/"},{"key":"1_CR7","unstructured":"Zovi, D.A.D.: Advanced Mac OS X Rootkits. In: Black Hat Technical Security Conference USA (2009), https:\/\/www.blackhat.com\/html\/bh-usa-09\/bh-usa-09-archives.html"},{"key":"1_CR8","unstructured":"Miller, C., Mulliner, C.: Fuzzing the Phone in your Phone. In: Black Hat Technical Security Conference USA (2009), https:\/\/www.blackhat.com\/html\/bh-usa-09\/bh-usa-09-archives.html"},{"key":"1_CR9","unstructured":"Burns, J.: Exploratory Android Surgery. In: Black Hat Technical Security Conference USA (2009), https:\/\/www.blackhat.com\/html\/bh-usa-09\/bh-usa-09-archives.html"},{"key":"1_CR10","unstructured":"Evers, J.: Russian Phone Trojan Tries to Ring Up Charges \u2013 Zdnet Australia (2006), http:\/\/www.zdnet.com.au\/news\/security\/soa\/Russian-phone-Trojan-tries-to-ring-up-charges\/0,130061744,139240795,00.htm"},{"key":"1_CR11","unstructured":"Google: Android Abstract ClassLoader (2009), http:\/\/developer.android.com\/reference\/java\/lang\/ClassLoader.html"},{"key":"1_CR12","unstructured":"Mobile Phone Work Group Mobile Trusted Module Overview Document, http:\/\/www.trustedcomputinggroup.org\/resources\/mobile_phone_work_group_mobile_trusted_module_overview_document"},{"key":"1_CR13","unstructured":"Strasser, M., Stamer, H., Molina, J.: Software-based TPM Emulator, http:\/\/tpm-emulator.berlios.de\/"},{"key":"1_CR14","unstructured":"Ekberg, J., Kylaanpaa, M.: Mobile Trusted Module (MTM)\u2013An Introduction (2007)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1655108.1655111","volume-title":"STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing","author":"J.E. Ekberg","year":"2009","unstructured":"Ekberg, J.E., Bugiel, S.: Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 9\u201318. ACM, New York (2009)"},{"key":"1_CR16","unstructured":"IAIK: About IAIK\/OpenTC PrivacyCA (2010), http:\/\/trustedjava.sourceforge.net\/index.php?item=pca\/about ."},{"key":"1_CR17","unstructured":"Google: Android Market (2009), http:\/\/www.android.com\/market.html ."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Kuntze, N., Kasper, M.: On the deployment of Mobile Trusted Modules. Arxiv preprint arXiv:0712.2113 (2007)","DOI":"10.1109\/WCNC.2008.553"},{"key":"1_CR19","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: SSYM 2004: Proceedings of the 13th Conference on USENIX Security Symposium (2004)"},{"key":"1_CR20","unstructured":"Oberheide, J.: A Look at a Modern Mobile Security Model: Google\u2019s Android Platform. In: Annual CanSecWest Applied Security Conference (March 2009), http:\/\/jon.oberheide.org\/research\/"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:44:41Z","timestamp":1606185881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}