{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:55:40Z","timestamp":1773154540454,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819751006","type":"print"},{"value":"9789819751013","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5101-3_14","type":"book-chapter","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:01:46Z","timestamp":1720980106000},"page":"256-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Research for\u00a0Android Remote Assistance Apps"],"prefix":"10.1007","author":[{"given":"Liwei","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaofeng","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ting","family":"Lei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenna","family":"Song","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shanqing","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pengcheng","family":"Ren","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,15]]},"reference":[{"key":"14_CR1","unstructured":"AweRay: Awesun remote desktop software. https:\/\/sun.aweray.com\/en"},{"key":"14_CR2","unstructured":"360 Mobile\u00a0Security (in Chinese): New disclosure of fraudulent modus operandi! offshore remote control fraud methods exposed, separation of man and machine, remote control... (in Chinese). https:\/\/mp.weixin.qq.com\/s\/Lsp8_B8pyeLlwHdNdopo5w"},{"issue":"10","key":"14_CR3","first-page":"18","volume":"5","author":"SC Chong","year":"2013","unstructured":"Chong, S.C., Leong, B.K., New, W.K., Chin, Y.J.: An android-based remote desktop for IOS platforms. Int. J. Intell. Syst. Appl 5(10), 18\u201327 (2013)","journal-title":"Int. J. Intell. Syst. Appl"},{"key":"14_CR4","unstructured":"Fornaciali, M.: A brand new application for remote control of android devices. e-Soc., 160  (2015)"},{"key":"14_CR5","unstructured":"Nagaraj, V.: Design and implementation of a remote assistance application for persons with visual impairments. Ph.D. thesis, Wichita State University (2021)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Pearson, K.: X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. London Edinburgh Dublin Philosophical Mag. J. Sci. 50(302), 157\u2013175 (1900)","DOI":"10.1080\/14786440009463897"},{"key":"14_CR7","unstructured":"Android developers: MotionEvent. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent"},{"key":"14_CR8","unstructured":"Diao, W., et al.: Kindness is a risky business: on the usage of the accessibility APIs in android. In: RAID, pp. 261\u2013275 (2019)"},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Alenezi, M., Almomani, I.: Abusing android permissions: a security perspective. In: 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/AEECT.2017.8257772"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Feal, \u00c1., Calciati, P., Vallina-Rodriguez, N., Troncoso, C., Gorla, A., et\u00a0al.: Angel or devil? A privacy study of mobile parental control apps. Proc. Privacy Enhancing Technol. (PoPETS) 2020 (2020)","DOI":"10.2478\/popets-2020-0029"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Hu, Y., Wang, H., Li, L., Guo, Y., Xu, G., He, R.: Want to earn a few extra bucks? A first look at money-making apps. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 332\u2013343. IEEE (2019)","DOI":"10.1109\/SANER.2019.8668035"},{"key":"14_CR13","unstructured":"Android developers: AAPT2. https:\/\/developer.android.com\/tools\/aapt2"},{"key":"14_CR14","unstructured":"Lin, Y.C.: AndroBugs_Framework. https:\/\/github.com\/AndroBugs\/AndroBugs_Framework"},{"key":"14_CR15","unstructured":"Fiterau-Brostean, P., Jonsson, B., Merget, R., De\u00a0Ruiter, J., Sagonas, K., Somorovsky, J.: Analysis of $$\\{$$DTLS$$\\}$$ implementations using protocol state fuzzing. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2523\u20132540 (2020)"},{"key":"14_CR16","unstructured":"Android developers: permissions on Android. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"issue":"6","key":"14_CR17","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TIFS.2017.2656460","volume":"12","author":"L Li","year":"2017","unstructured":"Li, L., et al.: Understanding android app piggybacking: a systematic study of malicious code grafting. IEEE Trans. Inf. Forensics Secur. 12(6), 1269\u20131284 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR18","unstructured":"OWASP: OWASP mobile Top 10. https:\/\/www.owasp.org\/index.php\/Mobile_Top_10_2014-M3"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.infsof.2017.04.001","volume":"88","author":"L Li","year":"2017","unstructured":"Li, L., et al.: Static analysis of android apps: a systematic literature review. Inf. Softw. Technol. 88, 67\u201395 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Tian, G., Chen, J., Yan, K., Yang, S., Diao, W.: Cast away: On the security of DLNA deployments in the SmartTV ecosystem. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 105\u2013116. IEEE (2022)","DOI":"10.1109\/QRS57517.2022.00021"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5101-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:03:55Z","timestamp":1720980235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5101-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819751006","9789819751013"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5101-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}