{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:55:29Z","timestamp":1729616129201,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057956","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T20:58:20Z","timestamp":1426280300000},"page":"503-508","source":"Crossref","is-referenced-by-count":0,"title":["Detecting and tracing leaked private phone number data in Android smartphones"],"prefix":"10.1109","author":[{"given":"Wooguil","family":"Pak","sequence":"first","affiliation":[]},{"given":"Youngrok","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Sunki","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Go ogle android: A state-of-the-art review of security mechanisms","author":"shabtai","year":"2009","journal-title":"arXiv preprint arXiv 0912 5101"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding Android Security","volume":"7","author":"william","year":"2009","journal-title":"IEEE Security & Privacy"},{"journal-title":"why app developers should guard their users' privacy","year":"2014","author":"leak","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1999995.2000018","article-title":"Analyzing Inter-Application Communication in Android","author":"chin","year":"2011","journal-title":"Proceedings of the 9th International Conference on Mobile Systems Applications and Services"},{"year":"0","author":"number","key":"ref8"},{"key":"ref7","article-title":"An Android Dynamic Data Protection Model Based on Light Virtualization","author":"sun","year":"2013","journal-title":"IEEE international conference on communication technology"},{"journal-title":"Security Alert DroidDream Malware Found in Android Market","year":"0","key":"ref2"},{"key":"ref1","article-title":"DroidLegacy: Automated Familial Classification of Android Malware","author":"luke","year":"2014","journal-title":"Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057956.pdf?arnumber=7057956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T17:10:36Z","timestamp":1651511436000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057956","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}