{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:46:24Z","timestamp":1742928384598,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_125","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"784-789","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic Analysis"],"prefix":"10.1007","author":[{"given":"Suhyoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Junhoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jaecheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"unstructured":"Mcafee Android malicious apps. \nhttps:\/\/www.mcafee.com\/us\/resources\/reports\/rp-mobile-threat-report-2016.pdf","key":"125_CR1"},{"key":"125_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jnca.2013.05.008","volume":"38","author":"S-H Seo","year":"2014","unstructured":"Seo, S.-H., Gupta, A., Sallam, A.M., Bertino, E., Yim, K.: Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38, 43\u201353 (2014). ELSEVIER","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"010 editor. \nhttps:\/\/www.sweetscape.com\/010editor\/","key":"125_CR3"},{"unstructured":"Android Manifest structure. \nhttps:\/\/justanapplication.wordpress.com\/category\/android","key":"125_CR4"},{"unstructured":"Android source. \nhttps:\/\/android.googlesource.com\/platform\/frameworks\/base","key":"125_CR5"},{"unstructured":"Malicious app. \nhttp:\/\/blog.alyac.co.kr\/711","key":"125_CR6"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T12:56:20Z","timestamp":1533387380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_125","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}