{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:42:06Z","timestamp":1725511326046},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icccn.2012.6289217","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T15:57:53Z","timestamp":1347033473000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["A Smartphone Security Architecture for App Verification and Process Authentication"],"prefix":"10.1109","author":[{"given":"Osman","family":"Ugus","sequence":"first","affiliation":[]},{"given":"Martin","family":"Landsmann","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Gessner","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"H-Online Blog News","article-title":"Back door exploit for Android phones","year":"2010","key":"19"},{"journal-title":"PandaBoard Open OMAP 4 Mobile Software Development Platform","year":"0","key":"17"},{"journal-title":"Stolen Apps That Root Android Steal Data and Open Backdoors Available for Download from Google Market","year":"2011","key":"18"},{"journal-title":"BitLocker Drive Encryption","year":"2011","key":"15"},{"journal-title":"The Developer's Guide Android 3 0 R1","year":"2011","key":"16"},{"key":"13","first-page":"63","article-title":"Remote Attestation of Attribute Updates and Information Flows in a UCON System","author":"nauman","year":"0","journal-title":"The 2nd Trust'09 Oxford UK Apr 2009"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377862"},{"key":"12","article-title":"Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform","author":"nauman","year":"0","journal-title":"The 3rd TRUST'10 Berlin Germany Jun 2010"},{"key":"3","article-title":"An MTM based Watchdog for Malware Famishment in Smartphones","author":"ugus","year":"0","journal-title":"11th I2CS Berlin Germany June 2011"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197513"},{"key":"1","article-title":"Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices","author":"becher","year":"0","journal-title":"The IEEE SP'11 Oakland California USA May 2011"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"journal-title":"TCG Mobile Trusted Module Specification","year":"2010","key":"7"},{"journal-title":"GRSecurity Security Patches for the Linux Kernel","year":"0","key":"6"},{"journal-title":"SE Android SELinux in Android","year":"2011","key":"5"},{"journal-title":"Security-Enhanced Linux","year":"2009","key":"4"},{"key":"9","first-page":"71","article-title":"Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms","author":"zhang","year":"0","journal-title":"The First MobiSec'09 Turin Italy Jun 2009"},{"key":"8","first-page":"16","article-title":"Design and implementation of a TCG-based integrity measurement architecture","author":"sailer","year":"0","journal-title":"The 13th SSYM'04 San Diego CA USA Aug 2004"}],"event":{"name":"2012 21st International Conference on Computer Communications and Networks - ICCCN 2012","start":{"date-parts":[[2012,7,30]]},"location":"Munich, Germany","end":{"date-parts":[[2012,8,2]]}},"container-title":["2012 21st International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6287204\/6289167\/06289217.pdf?arnumber=6289217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:23:00Z","timestamp":1490127780000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6289217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccn.2012.6289217","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}