{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:46:50Z","timestamp":1730260010578,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ictc.2017.8191012","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:02:05Z","timestamp":1513288925000},"page":"400-405","source":"Crossref","is-referenced-by-count":1,"title":["An efficient approach to securing user data in android"],"prefix":"10.1109","author":[{"given":"Suranya","family":"Jayan","sequence":"first","affiliation":[]},{"given":"Jiangfeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Dongwan","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27552-4_89"},{"key":"ref11","article-title":"These aren't the permissions you're looking for","volume":"18","author":"lineberry","year":"2010","journal-title":"DefCon"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369041"},{"journal-title":"An efficient implementation of block cipher in android platform","year":"2011","author":"paik","key":"ref14"},{"journal-title":"dm-crypt a device-mapper crypto target 2007","year":"2014","author":"saout","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.163"},{"key":"ref18","volume":"3","author":"shneiderman","year":"1992","journal-title":"Designing the User Interface Strategies for Effective Human-Computer Interaction"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516771"},{"journal-title":"The Essential Guide to User Interface Design An Introduction to GUI design Principles and techniques","year":"2007","author":"galitz","key":"ref4"},{"key":"ref3","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"USENIX Security Symposium"},{"journal-title":"Google Google play top free in android apps","year":"0","key":"ref6"},{"journal-title":"Google Full disk encryption","year":"0","key":"ref5"},{"journal-title":"Google Storage options","year":"0","key":"ref8"},{"journal-title":"Google Security tips","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref1","first-page":"346","author":"davi","year":"2011","journal-title":"Privilege Escalation Attacks on Android"},{"journal-title":"IDC Smartphone OS Market Share","year":"0","key":"ref9"},{"journal-title":"Teamcyanogenmod Cyanogenmod","year":"0","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2014.6970599"}],"event":{"name":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2017,10,18]]},"location":"Jeju","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125636\/8190740\/08191012.pdf?arnumber=8191012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:33:11Z","timestamp":1516660391000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8191012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ictc.2017.8191012","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}