{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:59:36Z","timestamp":1743008376785,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439074"},{"type":"electronic","value":"9783662439081"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43908-1_6","type":"book-chapter","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T12:43:02Z","timestamp":1403786582000},"page":"46-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hijacking Activity Technology Analysis and Research in Android System"],"prefix":"10.1007","author":[{"given":"Yunlong","family":"Ren","sequence":"first","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fangfang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Fangjiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"key":"6_CR1","unstructured":"Developers A. What is android?, Feb. 2011. http:\/\/developer.android.com\/guide\/basics\/what-is-android.html"},{"key":"6_CR2","first-page":"107","volume":"9","author":"R Wang","year":"2012","unstructured":"Wang, R., Jiang, Z., Liu, Q.: Under the android binder inter-process communication mechanism analysis and research. Comput. Technol. Dev. 9, 107\u2013110 (2012)","journal-title":"Comput. Technol. Dev."},{"key":"6_CR3","unstructured":"Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. USENIX Security Symposium (2011)"},{"key":"6_CR4","unstructured":"Brahler, S.: Analysis of the android architecture. Karlsruhe Institute for Technology (2010)"},{"key":"6_CR5","unstructured":"Alliance OH. Android overview. http:\/\/www.openhandsetalliance.com. Accessed 8 Oct 2007"},{"issue":"3","key":"6_CR6","first-page":"96","volume":"18","author":"L Chen","year":"2013","unstructured":"Chen, L., Zhang, C.: Design and implement of binder extension model based on android inter-process communication. J. Xi\u2019an Univ. Post Telecom 18(3), 96\u201399 (2013)","journal-title":"J. Xi\u2019an Univ. Post Telecom"},{"key":"6_CR7","unstructured":"Developers A. The activity lifecycle. http:\/\/developer.android.com\/intl\/de\/reference\/android\/app\/Activity.html. Accessed Aug 2010"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Duan, L.: In-depth analyze android activity. The new technology and new products of China, 16: 034 (2011)","DOI":"10.1016\/S1350-4789(11)70366-X"},{"issue":"6","key":"6_CR9","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1002\/sec.360","volume":"5","author":"M Ongtang","year":"2012","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., et al.: Semantically rich application-centric security in android. Secur. Commun. Netw. 5(6), 658\u2013673 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., et al.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43908-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T07:11:26Z","timestamp":1676877086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43908-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439074","9783662439081"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43908-1_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"27 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}