{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T07:42:10Z","timestamp":1648971730551},"reference-count":21,"publisher":"Oxford University Press (OUP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1093\/jigpal\/jzw052","type":"journal-article","created":{"date-parts":[[2016,8,13]],"date-time":"2016-08-13T00:39:20Z","timestamp":1471048760000},"page":"971-981","source":"Crossref","is-referenced-by-count":0,"title":["Applying highly space efficient blacklisting to mobile malware"],"prefix":"10.1093","volume":"24","author":[{"given":"Mari\u00e1n","family":"K\u00fchnel","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,12]]},"reference":[{"key":"2016120907301195000_24.6.971.1","unstructured":"Android Developers. Android sdk tools."},{"key":"2016120907301195000_24.6.971.2","doi-asserted-by":"crossref","unstructured":"Burguera, I. Zurutuza U. and Nadjm-Tehrani. S. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM, 2011.","DOI":"10.1145\/2046614.2046619"},{"key":"2016120907301195000_24.6.971.3","doi-asserted-by":"crossref","unstructured":"Cai, L. Machiraju S. and Chen. H. Defending against sensor-sniffing attacks on mobile phones. In Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, pp. 31\u201336. ACM, 2009.","DOI":"10.1145\/1592606.1592614"},{"key":"2016120907301195000_24.6.971.4","doi-asserted-by":"crossref","unstructured":"Dini, G. Martinelli, F. Saracino A. and Sgandurra. D. Madam: a multi-level anomaly detector for android malware. In Proceedings of the 6th International Conference on Computer Network Security, MMM-ACNS\u201912, 2012.","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"2016120907301195000_24.6.971.5","doi-asserted-by":"crossref","unstructured":"Enck, W. Gilbert, P. Han, S. Tendulkar, V. Chun, B.-G. Cox, L. P. Jung, J. McDaniel P. and Sheth. A. N. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32, 5, 2014.","DOI":"10.1145\/2619091"},{"key":"2016120907301195000_24.6.971.6","doi-asserted-by":"crossref","unstructured":"Felt, A. P. Egelman S. and Wagner. D. I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM \u201912, pp. 33\u201344. ACM, 2012.","DOI":"10.1145\/2381934.2381943"},{"key":"2016120907301195000_24.6.971.7","doi-asserted-by":"crossref","unstructured":"Jain, T. K. Kushwaha D. S. and Misra. A. K. Optimization of the quine-mccluskey method for the minimization of the boolean expressions. In Autonomic and Autonomous Systems, 2008. ICAS 2008. Fourth International Conference, pp. 165\u2013168. IEEE, 2008.","DOI":"10.1109\/ICAS.2008.11"},{"key":"2016120907301195000_24.6.971.8","unstructured":"K\u00fchnel M. and Meyer. U. 4GMOP: mopping the malware initiated traffic in mobile networks. In The 16th Information Security Conference (ISC 2013). Springer, 2013."},{"key":"2016120907301195000_24.6.971.9","doi-asserted-by":"crossref","unstructured":"K\u00fchnel M. and Meyer. U. Highly space efficient blacklisting. In International Joint Conference SOCO14-CISIS14-ICEUTE14, pp. 483\u2013493. Springer, 2014.","DOI":"10.1007\/978-3-319-07995-0_48"},{"key":"2016120907301195000_24.6.971.10","doi-asserted-by":"crossref","unstructured":"Lindorfer, M. Neugschwandtner, M. Weichselbaum, L. Fratantonio, Y. van der Veen V. and Platzer. C. Andrubis-1,000,000 apps later: a view on current android malware behaviors. In Proceedings of the the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014.","DOI":"10.1109\/BADGERS.2014.7"},{"key":"2016120907301195000_24.6.971.11","unstructured":"NiX Spam project. Dns-based blacklist of nix spam. www.dnsbl.manitu.net."},{"key":"2016120907301195000_24.6.971.12","doi-asserted-by":"crossref","unstructured":"Rastogi, V. Chen Y. and Enck. W. Appsplayground: automatic security analysis of smartphone applications. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 209\u2013220. ACM, 2013.","DOI":"10.1145\/2435349.2435379"},{"key":"2016120907301195000_24.6.971.13","first-page":"8","article-title":"Survey and taxonomy of ip address lookup algorithms.","volume-title":"Network","volume":"15","author":"Ruiz-S\u00e1nchez,","year":"2001"},{"key":"2016120907301195000_24.6.971.14","doi-asserted-by":"crossref","unstructured":"Thames, L. Abler R. and Keeling. D. Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. In Proceedings of the 47th Annual Southeast Regional Conference, p. 22. ACM, 2009.","DOI":"10.1145\/1566445.1566476"},{"key":"2016120907301195000_24.6.971.15","unstructured":"The Internet Assigned Numbers Authority (IANA). Service name and transport protocol port number registry."},{"key":"2016120907301195000_24.6.971.16","unstructured":"Ullrich. J. Dshield global worst offender list."},{"key":"2016120907301195000_24.6.971.17","doi-asserted-by":"crossref","unstructured":"Vidas T. and Christin. N. Evading android runtime analysis via sandbox detection. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 447\u2013458. ACM, 2014.","DOI":"10.1145\/2590296.2590325"},{"key":"2016120907301195000_24.6.971.18","unstructured":"VirusTotal. Free online virus, malware and url scanner. www.virustotal.com."},{"key":"2016120907301195000_24.6.971.19","doi-asserted-by":"crossref","unstructured":"Virvilis, N. Tsalis, N. Mylonas A. and Gritzalis. D. Mobile devices: a phisher\u2019s paradise. In Proceedings of the 11th International Conference on Security and Cryptography, pp. 79\u201387, 2014.","DOI":"10.5220\/0005045000790087"},{"key":"2016120907301195000_24.6.971.20","unstructured":"Xu, R. Sa\u00efdi H. and Anderson. R. Aurasium: practical policy enforcement for android applications. In USENIX Security Symposium, pp. 539\u2013552, 2012."},{"key":"2016120907301195000_24.6.971.21","unstructured":"Zhou, Y. Wang, Z. Zhou W. and Jiang. X. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In NDSS, 2012."}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/24\/6\/971\/8357707\/jzw052.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T14:12:42Z","timestamp":1568297562000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzw052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,12]]},"references-count":21,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,12,9]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1093\/jigpal\/jzw052"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzw052","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,12]]}}}