{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:25:14Z","timestamp":1725387914050},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/ictc.2016.7763562","type":"proceedings-article","created":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T21:54:58Z","timestamp":1480974898000},"page":"684-693","source":"Crossref","is-referenced-by-count":0,"title":["Android malware analysis and conceptual malware mitigation approaches"],"prefix":"10.1109","author":[{"given":"Tae","family":"Oh","sequence":"first","affiliation":[]},{"given":"Hwa Shin","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Young Ho","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jeong Neyo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Bill","family":"Stackpole","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Implementing SELinux as a Linux security module","author":"smalley","year":"2001","journal-title":"NAI Labs Technical report 01-043"},{"journal-title":"The Case for SEAndroid","year":"2012","author":"smalley","key":"ref11"},{"journal-title":"SEAndroid - SELinux Wiki","year":"2012","key":"ref12"},{"journal-title":"Inside Android 4 2's powerful new security system","year":"0","author":"raphael","key":"ref13"},{"journal-title":"RFC 86 Unified Login with Pluggable Authentication Modules (PAM)","year":"0","author":"samar","key":"ref14"},{"journal-title":"Android Debug Bridge","year":"0","key":"ref15"},{"journal-title":"Android 4 2 Alpha Teardown Part 2 SELinux VPN Lockdown and Premium SMS Confirmation","year":"2012","author":"amadeo","key":"ref16"},{"key":"ref17","article-title":"(2012 November 01)","author":"rodrigo","year":"0","journal-title":"DroidWall - Android Firewall"},{"key":"ref18","article-title":"Android Anti-virus Analysis","author":"ramachandran","year":"2012","journal-title":"ASIA and SKM 2012 Albany NY"},{"journal-title":"Android Security Overview","year":"2012","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958860"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"journal-title":"Android marks fourth anniversary since launch with 75% market share in third quarter according to IDC","year":"2012","key":"ref6"},{"journal-title":"Eric Schmidt There are now 1 3 million android device activations per day","year":"2012","author":"burns","key":"ref5"},{"journal-title":"Android Source Code","year":"2012","key":"ref8"},{"journal-title":"Android Open Source Project","year":"2012","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741874"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"journal-title":"Android Permissions","year":"2012","key":"ref9"},{"journal-title":"Presentation of Dalvik VM Internals","year":"2012","author":"borstein","key":"ref20"}],"event":{"name":"2016 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2016,10,19]]},"location":"Jeju","end":{"date-parts":[[2016,10,21]]}},"container-title":["2016 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7750938\/7763035\/07763562.pdf?arnumber=7763562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T04:00:34Z","timestamp":1484625634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7763562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ictc.2016.7763562","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}