{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:36Z","timestamp":1740169056315,"version":"3.37.3"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea through the Korea Government (MSIT)","doi-asserted-by":"publisher","award":["2017R1A2B3009643"],"award-info":[{"award-number":["2017R1A2B3009643"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2799384","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:11:25Z","timestamp":1517245885000},"page":"11482-11501","source":"Crossref","is-referenced-by-count":7,"title":["Security Architecture for a Secure Database on Android"],"prefix":"10.1109","volume":"6","author":[{"given":"Jin Hyung","family":"Park","sequence":"first","affiliation":[]},{"given":"Seok-Man","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"In Seok","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0692-2543","authenticated-orcid":false,"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13858-4_21"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref32","article-title":"Clickjacking revisited: A perceptual view of UI security","author":"akhawe","year":"2014","journal-title":"Proc WOOT"},{"key":"ref31","first-page":"1037","article-title":"Peeking into your app without actually seeing it: UI state inference and novel Android attacks","author":"chen","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_14"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1147\/rd.53.0183"},{"key":"ref35","first-page":"547","article-title":"&#x00C9;tude comparative de la distribution florale dans une portion des alpes et des jura","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin de la Socit Vaudoise des Sciences Naturelles"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.46"},{"journal-title":"A Collection of Android Apps Which are Open Source","year":"2017","key":"ref60"},{"journal-title":"K-9 Mail","year":"2017","key":"ref62"},{"journal-title":"Telegram","year":"2017","key":"ref61"},{"journal-title":"PocketMaps","year":"2017","key":"ref63"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476628"},{"journal-title":"&#x2018;Evil Maid&#x2019; Attacks on Encrypted Hard Drives","year":"2017","author":"schneier","key":"ref27"},{"journal-title":"Learning iOS Forensics","year":"2016","author":"epifani","key":"ref65"},{"journal-title":"iOS Hacker&#x2019;s Handbook","year":"2012","author":"miller","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"journal-title":"Hacking and Securing IOS Applications Stealing Data Hijacking Software and How to Prevent It","year":"2012","author":"zdziarski","key":"ref67"},{"journal-title":"DB browser for SQLite","year":"2016","key":"ref2"},{"key":"ref1","article-title":"Samsung pay: Tokenized numbers, flaws and issues","author":"mendoza","year":"2016","journal-title":"Proc Black Hat USA"},{"key":"ref20","first-page":"1","article-title":"Detecting passive content leaks and pollution in Android applications","author":"zhou","year":"2013","journal-title":"Proc 20th Annu Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"ref21","first-page":"19","article-title":"Towards taming privilege-escalation attacks on Android","volume":"17","author":"bugiel","year":"2012","journal-title":"Proc NDSS"},{"key":"ref24","first-page":"20","article-title":"Employ a secure flavor of Linux","volume":"20","author":"nahari","year":"2007","journal-title":"Embedded Syst Design"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"journal-title":"Evil Maid Goes After TrueCrypt!","year":"2017","author":"tereshkin","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655081"},{"journal-title":"Intel Software Guard Extensions&#x2014;Memory Encryption Engine (MEE)","year":"2016","author":"gueron","key":"ref51"},{"journal-title":"F-Droid An Installable Catalogue of FOSS (Free and Open Source Software) Applications for the Android Platform","year":"2017","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"journal-title":"DexProtector&#x2014;The Obfuscator for Android Platform","year":"2017","key":"ref56"},{"journal-title":"Smali&#x2014;An Assembler\/Disassembler for Android&#x2019;s Dex Format","year":"2017","key":"ref55"},{"journal-title":"SQLCipher&#x2014;Speedtest1","year":"2017","key":"ref54"},{"journal-title":"SQLite&#x2014;Speedtest1","year":"2017","key":"ref53"},{"journal-title":"iOS security (iOS 11)","year":"2018","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818041"},{"journal-title":"Full Database Encryption for SQLite","year":"2016","key":"ref11"},{"article-title":"Recommendation for key management part 1: General (revision 4)","year":"2016","author":"barker","key":"ref40"},{"journal-title":"Meet evolving enterprise mobility challenges with Samsung KNOX","year":"2014","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666627"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23061"},{"year":"2012","key":"ref15","article-title":"Mobile threat report: Q3 2012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref17","first-page":"50","article-title":"Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets","volume":"25","author":"zhou","year":"2012","journal-title":"Proc NDSS"},{"key":"ref18","first-page":"346","article-title":"Privilege escalation attacks on Android","author":"davi","year":"2010","journal-title":"Proc Intl Conf Info Sec"},{"key":"ref19","first-page":"22","article-title":"Permission re-delegation: Attacks and defenses","volume":"30","author":"felt","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref4","first-page":"29","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"smalley","year":"2001","journal-title":"Proc USENIX Annu Technical Conf Freenix Track"},{"key":"ref3","article-title":"A security analysis of encrypted databases in KakaoTalk messenger","author":"kim","year":"2016","journal-title":"Proc of MSE"},{"journal-title":"SQLite&#x2014;An Embedded SQL Database Engine","year":"2016","key":"ref6"},{"key":"ref5","first-page":"20","article-title":"Security enhanced (SE) Android: Bringing flexible MAC to Android","volume":"310","author":"smalley","year":"2013","journal-title":"Proc NDSS"},{"journal-title":"TPM mobile with trusted execution environment for comprehensive mobile device security","year":"2012","key":"ref8"},{"journal-title":"Tee System Architecture Version 1 0","year":"2017","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076743"},{"journal-title":"Android keystore system","year":"2017","key":"ref9"},{"journal-title":"AeskeyFinder","year":"2008","author":"heninger","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48390-X_9"},{"key":"ref48","first-page":"17","article-title":"TRESOR runs encryption securely outside RAM","volume":"17","author":"m\u00fcller","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1752046.1752053"},{"key":"ref42","first-page":"1","article-title":"Firewire: All your memory are belong to us","author":"becher","year":"2005","journal-title":"Proc CanSecWest"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978297"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"article-title":"Firewire-based physical security attacks on Windows 7, EFS and BitLocker","year":"2009","author":"b\u00f6ock","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08271994.pdf?arnumber=8271994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:39:45Z","timestamp":1641987585000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8271994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2799384","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}