{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:01:24Z","timestamp":1760043684439,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/i4cs.2014.6860558","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T20:59:13Z","timestamp":1406667553000},"page":"87-94","source":"Crossref","is-referenced-by-count":5,"title":["Curtailing privilege escalation attacks over asynchronous channels on Android"],"prefix":"10.1109","author":[{"given":"Katharina","family":"Mollus","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Markmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"22","article-title":"Permission re-delegation: Attacks and defenses. In","volume":"2011","author":"felt","year":"0","journal-title":"Proceedings of the 20th USENIX Conference on Security SEC'11"},{"key":"2","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI'10"},{"key":"1","volume":"2011","author":"bugiel","year":"0","journal-title":"Fischer and Ahmad Reza Sadeghi XManDroid A new Android evolution to mitigate privilege escalation attacks"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654844"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176284"},{"key":"4","first-page":"2010","author":"ghorbani","year":"0","journal-title":"Network Intrusion Detection and Prevention volume 47 of Advances in Information Security"},{"journal-title":"Analyzing covert channels on mobile devices","year":"2012","author":"ritzdorf","key":"8"}],"event":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","start":{"date-parts":[[2014,6,4]]},"location":"Reims, France","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 14th International Conference on Innovations for Community Services (I4CS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6851345\/6860533\/06860558.pdf?arnumber=6860558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:07:35Z","timestamp":1490299655000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6860558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/i4cs.2014.6860558","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}