{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:19:52Z","timestamp":1729613992109,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/icufn.2016.7537161","type":"proceedings-article","created":{"date-parts":[[2016,8,11]],"date-time":"2016-08-11T16:34:40Z","timestamp":1470933280000},"page":"873-875","source":"Crossref","is-referenced-by-count":2,"title":["Detection of android malware by static analysis on permissions and sensitive functions"],"prefix":"10.1109","author":[{"family":"Ming-Yang Su","sequence":"first","affiliation":[]},{"family":"Kek-Tung Fung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.12"},{"journal-title":"Sandbox","year":"0","key":"ref13"},{"key":"ref14","article-title":"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc of USENIX Symposium on OSDI"},{"journal-title":"Droidbox Android Application Sandbox","year":"2011","author":"lantz","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.13"},{"journal-title":"apk-tool","year":"0","key":"ref17"},{"journal-title":"Dex Manager","year":"0","key":"ref18"},{"journal-title":"Contagio mobile dump","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.88"},{"key":"ref3","first-page":"61","article-title":"Reducing the window of opportunity for Android malware Gotta catch'em all","volume":"8","author":"apvrille","year":"2012","journal-title":"The Computer J"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref5","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"journal-title":"Desnos A Androguard","year":"2011","key":"ref7"},{"journal-title":"Symantec Security Response Mobile Adware and Malware Analysis version 1 0","year":"2013","key":"ref2"},{"journal-title":"IDC Smartphone OS Market Share Ql","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.22"}],"event":{"name":"2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2016,7,5]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,7,8]]}},"container-title":["2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7527553\/7536915\/07537161.pdf?arnumber=7537161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:23:32Z","timestamp":1475173412000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7537161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icufn.2016.7537161","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}