{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:30:08Z","timestamp":1773858608725,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/malware.2010.5665792","type":"proceedings-article","created":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T23:39:39Z","timestamp":1292974779000},"page":"55-62","source":"Crossref","is-referenced-by-count":260,"title":["An Android Application Sandbox system for suspicious software detection"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Bla\u0308sing","sequence":"first","affiliation":[]},{"given":"Leonid","family":"Batyuk","sequence":"additional","affiliation":[]},{"given":"Aubrey-Derrick","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Seyit Ahmet","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"Sahin","family":"Albayrak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"szor","year":"2005","journal-title":"Virus Research and Defense"},{"key":"ref32","article-title":"Securing android-powered mobile devices using selinux","author":"shabtai","year":"2009","journal-title":"IEEE Security and Privacy 99(PrePrints)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403024"},{"key":"ref35","author":"zovi","year":"0","journal-title":"Kernel Rootkits"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref10","article-title":"Traps and pitfalls: Practical problems in in system call interposition based security tools","author":"garfinkel","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref11","author":"goldhammer","year":"0","journal-title":"Goldmedia mobile life report 2012 mobile life in the 21st century status quo and outlook"},{"key":"ref12","first-page":"102","article-title":"Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit&#x2122; 1.2","author":"gong","year":"1997","journal-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73368-3_10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.159"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2004.1288042"},{"key":"ref16","author":"love","year":"2007","journal-title":"Linux System Programming"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref18","author":"mulliner","year":"2005","journal-title":"Exploiting pocketpc 2005 Talk on WhatTheHack"},{"key":"ref19","article-title":"Advanced attacks against pocketpc phones","author":"mulliner","year":"2006"},{"key":"ref4","year":"2006"},{"key":"ref28","article-title":"Malicious software for smartphones","author":"schmidt","year":"2008","journal-title":"Technical Report TUB-DAI 02\/08&#x2013;01 Technische Universit&#x00E4;t Berlin - DAI-Labor"},{"key":"ref3","author":"bishop","year":"2002","journal-title":"The Art and Science of Computer Security"},{"key":"ref27","article-title":"Malicious software for smartphones. Technical Report TUB-DAI 02\/08&#x2013;01","author":"schmidt","year":"2008","journal-title":"Technische Universit&#x00E4;t Berlin DAI-Labor"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774482"},{"key":"ref5","author":"burns","year":"0","journal-title":"Developing Secure Mobile Applications for Android - An Introduction to Making Secure Android Applications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437807"},{"key":"ref2","article-title":"Static detection of malicious code in executable programs","author":"bergeron","year":"2001","journal-title":"Symposium on Requirements Engineering for Information Security (SREIS' 01"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381933"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.54"},{"key":"ref20","article-title":"Exploiting symbian: Symbian exploitation and shellcode development","author":"mulliner","year":"2009","journal-title":"Talk on BlackHat Japan 2008"},{"key":"ref22","first-page":"1","article-title":"Exploiting execution context for the detection of anomalous system calls","author":"mutz","year":"2007","journal-title":"RAID"},{"key":"ref21","first-page":"77","article-title":"Vulnerability analysis of mms user agents","author":"mulliner","year":"2006","journal-title":"ACSAC &#x2018;06 Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"ref23","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium (Security'08)"},{"key":"ref26","author":"rubini","year":"0","journal-title":"Kernel System Calls"},{"key":"ref25","author":"raffetseder","year":"0"}],"event":{"name":"2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010)","location":"Nancy, Lorraine","start":{"date-parts":[[2010,10,19]]},"end":{"date-parts":[[2010,10,20]]}},"container-title":["2010 5th International Conference on Malicious and Unwanted Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655114\/5665785\/05665792.pdf?arnumber=5665792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:02:51Z","timestamp":1490094171000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5665792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/malware.2010.5665792","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}