{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:07Z","timestamp":1755838387219},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883394","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"659-664","source":"Crossref","is-referenced-by-count":6,"title":["Android low entropy demystified"],"prefix":"10.1109","author":[{"given":"Yu","family":"Ding","sequence":"first","affiliation":[]},{"given":"Zhuo","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Linux Kernel 3 7 Commit 4369c64c Input Send Events One Packet at A Time","year":"0","key":"3"},{"journal-title":"Android Open Source Program Git Repository File History Zygote Java","year":"0","key":"2"},{"year":"0","key":"1"},{"journal-title":"Android Boot Sequence","year":"0","author":"huang","key":"7"},{"key":"6","article-title":"Mining your Ps and Qs: Detection of widespread weak keys in network devices","author":"heninger","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"4","first-page":"63","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"journal-title":"Jni-overflow Project","year":"0","author":"ding","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/1030083.1030124","article-title":"On the effectiveness of address-space randomization","author":"shacham","year":"2004","journal-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883394.pdf?arnumber=6883394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T06:06:46Z","timestamp":1650089206000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883394","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}