{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:05:33Z","timestamp":1725401133104},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906409","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"511-517","source":"Crossref","is-referenced-by-count":2,"title":["StoreDroid: Sensor-based data protection framework for Android"],"prefix":"10.1109","author":[{"given":"Miriam","family":"Allalouf","sequence":"first","affiliation":[]},{"given":"Radel","family":"Ben-Av","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Gerdov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Repo and Git Androids Version Control and Sync Tools","year":"0","key":"19"},{"journal-title":"Seandroid Project","year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.144"},{"year":"0","key":"18"},{"key":"15","first-page":"639","article-title":"These arent the droids youre looking for: Retrofitting android to protect data from imperious applications","author":"hornyack","year":"2011","journal-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security Ser CCS 11"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264934"},{"key":"13","article-title":"Towards taming privilege-escalation attacks on android","author":"bugiel","year":"2012","journal-title":"NDSS"},{"key":"14","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation Ser OSDI10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"12","article-title":"Quire: Lightweight provenance for smart phone operating systems","author":"dietz","year":"2011","journal-title":"CoRR"},{"key":"21","article-title":"All your droid are belong to us: A survey of current android attacks","author":"vidas","year":"2011","journal-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies"},{"key":"3","article-title":"Mobile malware development continues to rise, android leads the way","author":"vennon","year":"2012","journal-title":"FAST"},{"journal-title":"A User Friendly Gui Application for Creating Managing and Examining Keystores Keys Certificates Certificate Requests Certificate Revocation Lists and More","year":"0","key":"20"},{"journal-title":"McAfee Android Malware Surges 76 Percent IPhone Untouched Electronista com","year":"0","key":"2"},{"journal-title":"Android Sees A 472 Percent Increase in Malware since July","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"journal-title":"Moblie Threat Report q1 2013 F-Secure","year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70092-8"},{"key":"4","article-title":"Google android: A state-of-The-art review of security mechanisms","author":"shabtai","year":"2009","journal-title":"CoRR"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906409.pdf?arnumber=6906409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:39:00Z","timestamp":1602689940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906409"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906409","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}