{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:18:33Z","timestamp":1729635513025,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/bigcomp.2017.7881732","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T20:33:57Z","timestamp":1490042037000},"page":"156-161","source":"Crossref","is-referenced-by-count":2,"title":["Forensic analysis of the backup database file in KakaoTalk messenger"],"prefix":"10.1109","author":[{"family":"Jusop Choi","sequence":"first","affiliation":[]},{"family":"Jaewoo Park","sequence":"additional","affiliation":[]},{"family":"Hyoungshick Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2991\/3ca-13.2013.69"},{"article-title":"Anatomy of a hack: How crackers ransack passwords like &#x201C;qeadzcwrsfxv1331","year":"2013","author":"goodin","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref14","article-title":"Encryption Is Not Enough: Inferring user activities on KakaoTalk with traffic analysis","author":"park","year":"2015","journal-title":"International Workshop on Information Security and Application"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"article-title":"Forensic Analysis of WhatsApp on Android Smart-phones","year":"2013","author":"thakur","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.04.003"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1080\/01449291003611326","article-title":"Privacy in instant messaging: an impression management model","volume":"31","author":"meyer","year":"2012","journal-title":"Behaviour & Information Technology"},{"key":"ref6","first-page":"63","article-title":"KakaoTalk, a mobile social platform pioneer","volume":"6","author":"choi","year":"2013","journal-title":"SERI Quarterly"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/2660267.2660350","article-title":"Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, and Wenbo Shen. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. In","author":"azab","year":"2014","journal-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computerand Communications Security"},{"year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.11.708-715"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.5120\/11602-6965","article-title":"Forensic Analysis of Instant Messenger Applications on Android Devices","volume":"68","author":"dahiya","year":"2013","journal-title":"International Journal of Computer Applications"},{"journal-title":"Here's How Police Get a Suspect's Facebook Information 2016","year":"0","author":"fitzpatrick","key":"ref9"}],"event":{"name":"2017 IEEE International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2017,2,13]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2017,2,16]]}},"container-title":["2017 IEEE International Conference on Big Data and Smart Computing (BigComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7877084\/7881676\/07881732.pdf?arnumber=7881732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T18:25:45Z","timestamp":1658859945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7881732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/bigcomp.2017.7881732","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}