{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:41:51Z","timestamp":1729618911318,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423634","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"300-303","source":"Crossref","is-referenced-by-count":8,"title":["Detecting covert communication on Android"],"prefix":"10.1109","author":[{"given":"Michael","family":"Hansen","sequence":"first","affiliation":[]},{"given":"Raquel","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Wimberly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Soundcomber: A stealthy and context-aware sound trojan for smartphones","author":"schlegel","year":"2011","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176284"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"6","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on OS Design and Implementation"},{"key":"5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"enck","year":"2009","journal-title":"Security & Privacy IEEE"},{"key":"4","article-title":"Xmandroid: A new android evolution to mitigate privilege escalation attacks","author":"bugiel","year":"2011","journal-title":"Security"},{"key":"9","article-title":"Towards taming privilege-escalation attacks on android","author":"bugiel","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems","year":"2011","author":"marforio","key":"8"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423634.pdf?arnumber=6423634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:12:59Z","timestamp":1498014779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423634","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}