{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:28:55Z","timestamp":1730251735919,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icnidc.2016.7974582","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T16:50:21Z","timestamp":1499964621000},"page":"288-292","source":"Crossref","is-referenced-by-count":1,"title":["The static detection analysis technology of Android source codes"],"prefix":"10.1109","author":[{"given":"Yanhui","family":"Guo","sequence":"first","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaomeng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"123","author":"muchnick","year":"2003","journal-title":"Advanced Compiler Design and Implementation"},{"key":"ref11","first-page":"29","author":"gang","year":"2013","journal-title":"Crazy Android Lectures [M]"},{"key":"ref12","first-page":"56","author":"qian","year":"2013","journal-title":"The Android Security Mechanism Analysis and Application Practices [M]"},{"key":"ref13","first-page":"64","author":"drake","year":"2015","journal-title":"Android Hacker's Handbook [M]"},{"key":"ref14","first-page":"329","author":"shengqiang","year":"2013","journal-title":"Android Software Security and Reverse Analysis [M]"},{"journal-title":"50 Good Android Projects' Source Codes50 EB\/OL]","year":"2013","key":"ref15"},{"journal-title":"Open Source China[EB\/OL]","year":"2015","key":"ref16"},{"journal-title":"CVE Chinese vulnerability information database [EB\/OL]","year":"2015","key":"ref17"},{"journal-title":"Common Weakness Enumeration (CWE)[EB\/OL]","year":"2015","key":"ref18"},{"key":"ref4","first-page":"627","article-title":"Android privileges demystified[C]","author":"felt","year":"2011","journal-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security"},{"year":"2015","key":"ref3"},{"key":"ref6","first-page":"12","author":"brian","year":"2008","journal-title":"Secure Programming Static Analysis [M]"},{"key":"ref5","first-page":"147","article-title":"Android malicious software static detection based on mixed characteristics [J]","volume":"35","author":"wenqing","year":"2014","journal-title":"Radio communication technology"},{"key":"ref8","first-page":"163","volume":"269","author":"appel","year":"2006","journal-title":"Modern Compiler Implementation in C [M]"},{"key":"ref7","article-title":"Software Security Codes Analyzer and Detection Methods based on Source Codes Static Analysis","author":"guoai","year":"2007","journal-title":"ZL20071 0064155 1"},{"journal-title":"OWASP Mobile Top 10 Risks[EB\/OL]","year":"2015","key":"ref2"},{"journal-title":"[EB\/OL]","article-title":"Tencent mobile security laboratory Mobile Security Report in the first quarter of 2015","year":"2015","key":"ref1"},{"key":"ref9","first-page":"328","author":"aho","year":"2008","journal-title":"Compilers Principles Techniques and Tools"}],"event":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","start":{"date-parts":[[2016,9,23]]},"location":"Beijing, China","end":{"date-parts":[[2016,9,25]]}},"container-title":["2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7966451\/7974524\/07974582.pdf?arnumber=7974582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T12:25:41Z","timestamp":1502886341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7974582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icnidc.2016.7974582","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}