{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:02:12Z","timestamp":1743069732698,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_9","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"107-125","source":"Crossref","is-referenced-by-count":5,"title":["SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms"],"prefix":"10.1007","author":[{"given":"Xinwen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]},{"given":"Onur","family":"Ac\u0131i\u00e7mez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Android, \n                    \n                      http:\/\/code.google.com\/android\/"},{"key":"9_CR2","unstructured":"Gpe phone edition, \n                    \n                      http:\/\/gpephone.linuxtogo.org\/"},{"key":"9_CR3","unstructured":"J2ME CLDC specifications, version 1.0a, \n                    \n                      http:\/\/jcp.org\/aboutjava\/communityprocess\/final\/jsr030\/index.html"},{"key":"9_CR4","unstructured":"Limo foundation, \n                    \n                      https:\/\/www.limofoundation.org"},{"key":"9_CR5","unstructured":"LMbench-tools for performance analysis, \n                    \n                      http:\/\/www.bitmover.com\/lmbench"},{"key":"9_CR6","unstructured":"Maemo, \n                    \n                      http:\/\/www.maemo.org"},{"key":"9_CR7","unstructured":"Mcafee mobile security report (2008), \n                    \n                      http:\/\/www.mcafee.com\/us\/research\/mobile_security_report_2008.html"},{"key":"9_CR8","unstructured":"Mcafee mobile security report (2009), \n                    \n                      http:\/\/www.mcafee.com\/us\/local_content\/reports\/mobile_security_report_2009.pdf"},{"key":"9_CR9","unstructured":"Motomagx security, \n                    \n                      http:\/\/ecosystem.motorola.com\/get-inspired\/whitepapers\/security-whitepaper.pdf"},{"key":"9_CR10","unstructured":"OpenEZX, \n                    \n                      http:\/\/wiki.openezx.org\/main_page"},{"key":"9_CR11","unstructured":"Pandalab report, \n                    \n                      http:\/\/pandalabs.pandasecurity.com\/blogs\/images\/pandalabs\/2008\/04\/01\/quarterly_report_pandalabs_q1_2008.pdf"},{"key":"9_CR12","unstructured":"Qtopia phone edition, \n                    \n                      http:\/\/doc.trolltech.com"},{"key":"9_CR13","unstructured":"Security in qtopia phones, \n                    \n                      http:\/\/www.linuxjournal.com\/article\/9896"},{"key":"9_CR14","unstructured":"Setools\u2013policy analysis tools for selinux, \n                    \n                      http:\/\/oss.tresys.com\/projects\/setools"},{"key":"9_CR15","unstructured":"Understanding the windows mobile security model, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/library\/cc512651.aspx"},{"key":"9_CR16","unstructured":"Biba, K.J.: Integrity consideration for secure computer system. Technical report, Mitre Corp. Report TR-3153, Bedford, Mass. (1977)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Bose, A., Shin, K.: Proactive security for mobile messaging networks. In: Proc. of ACM Workshop on Wireless Security (2006)","DOI":"10.1145\/1161289.1161307"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Cheng, J., Wong, S., Yang, H., Lu, S.: Smartsiren: Virus detection and alert for smartphones. In: Proc. of ACM Conference on Mobile Systems, Applications (2007)","DOI":"10.1145\/1247660.1247690"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security & Privacy\u00a07(1) (2009)","DOI":"10.1109\/MSP.2009.26"},{"key":"9_CR21","unstructured":"Fraser, T.: LOMAC: MAC you can live with. In: Proc. of USENIX Annual Technical Conference (2001)"},{"key":"9_CR22","unstructured":"Heath, C.: Symbian os platform security. Symbian press (2006)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Hu, G., Venugopal, D.: A malware signature extraction and detection method applied to mobile networks. In: Proc. of 26th IEEE International Performance, Computing, and Communications Conference (2007)","DOI":"10.1109\/PCCC.2007.358875"},{"key":"9_CR24","unstructured":"Hypponen, M.: State of cell phone malware in 2007 (2007), \n                    \n                      http:\/\/www.usenix.org\/events\/sec07\/tech\/hypponen.pdf"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: PRIMA: Policy-reduced integrity measurement architecture. In: Proc. of ACM SACMAT (2006)","DOI":"10.1145\/1133058.1133063"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proc. of the International Conference on Mobile Systems, Applications, and Services (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Li, N., Mao, Z., Chen, H.: Usable mandatory integrity protections for operating systems. In: Proc. of IEEE Symposium on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.37"},{"key":"9_CR28","unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: Proceedings of USENIX Annual Technical Conference, June 25-30, pp. 29\u201342 (2001)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Lunt, T., Denning, D., Schell, R., Heckman, M., Shockley, M.: The seaview security model. IEEE Transactions on Software Engineering\u00a016(6) (1990)","DOI":"10.1109\/32.55088"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11790754_6","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"C. Mulliner","year":"2006","unstructured":"Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using labeling to prevent cross-service attacks against smart phones. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol.\u00a04064, pp. 91\u2013108. Springer, Heidelberg (2006)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring integrity on mobile phone systems. In: Proc. of ACM SACMAT (2008)","DOI":"10.1145\/1377836.1377862"},{"key":"9_CR32","unstructured":"Shankar, U., Jaeger, T., Sailer, R.: Toward automated information-flow integrity verification for security-critical applications. In: Proc. of NDSS (2006)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Venugopal, D., Hu, G., Roman, N.: Intelligent virus detection on mobile devices. In: Proc. of International Conference on Privacy, Security and Trust (2006)","DOI":"10.1145\/1501434.1501511"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:20Z","timestamp":1566764240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}