{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:13:29Z","timestamp":1725700409810},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642324970"},{"type":"electronic","value":"9783642324987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32498-7_39","type":"book-chapter","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T14:04:28Z","timestamp":1344953068000},"page":"516-524","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Malware Threats and Defenses for Homeland Security"],"prefix":"10.1007","author":[{"given":"Seung-Hyun","family":"Seo","sequence":"first","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCSSPSM 2011 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing Inter-Application Communication in Android. In: Proceedings of the 9th Annual Symposium on Network and Distributed System Security, MobiSys 2011 (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"39_CR3","unstructured":"DroidDream, \n                      \n                        http:\/\/blog.mylookout.com\/blog\/2011\/03\/01\/security-alert-malware-found-in-official-android-market-droiddream\/"},{"key":"39_CR4","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., Mc- Daniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI 2010 (2010)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android Permissions Demystied. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"39_CR7","unstructured":"Fuchs, A., Chaudhuri, A., Foster, J.: SCanDroid: Automated Security Certification of Android Applications, \n                      \n                        http:\/\/www.cs.umd.edu\/avik\/projects\/scandroidascaa"},{"key":"39_CR8","unstructured":"GingerMaster, \n                      \n                        http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/GingerMaster\/"},{"key":"39_CR9","unstructured":"Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security, NDSS 2012 (2012)"},{"key":"39_CR10","unstructured":"Homeland Security, \n                      \n                        http:\/\/en.wikipedia.org\/wiki\/Homeland_security"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M.: L4Android: A Generic Operating System Framework for Secure Smartphones. In: Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM 2011 (2011)","DOI":"10.1145\/2046614.2046623"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing Your Cellphone from Spies. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 2009 (2009)","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"39_CR13","unstructured":"McAfee, Threats Report: Second Quarter 2011 (2011)"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010 (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"39_CR15","unstructured":"KISA, Korea Internet and Security Agency, \n                      \n                        http:\/\/www.kisa.or.kr"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Kim, H., Smith, J., Shin, K.G.: Detecting Energy-Greedy Anomalies and Mobile Malware Variants. In: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, MobiSys 2008 (2008)","DOI":"10.1145\/1378600.1378627"},{"key":"39_CR17","unstructured":"RootSmart, \n                      \n                        http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/RootSmart\/"},{"key":"39_CR18","unstructured":"SCADA, Supervisory Control and Data Acquisition, \n                      \n                        http:\/\/en.wikipedia.org\/wiki\/SCADA"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Xie, L., Zhang, X., Seifert, J.-P., Zhu, S.: pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In: Proceedings of the 3rd ACM conference on Wireless Network Security, WiSec 2010 (2010)","DOI":"10.1145\/1741866.1741874"},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party AndroidMarketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY 2012 (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"39_CR21","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In: Proceedings of NDSS 2012 (2012)"}],"container-title":["Lecture Notes in Computer Science","Multidisciplinary Research and Practice for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32498-7_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:04:52Z","timestamp":1620129892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32498-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642324970","9783642324987"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32498-7_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}