{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:28:11Z","timestamp":1729664891503,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999415","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:44:39Z","timestamp":1421721879000},"page":"50-57","source":"Crossref","is-referenced-by-count":3,"title":["MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android"],"prefix":"10.1109","author":[{"given":"Jihwan","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Dongwon","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Chanyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jonghoon","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"John","family":"Milburn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"21","article-title":"On the potential of limitation-oriented malware detection and prevention techniques on mobile phones","volume":"4","author":"yan","year":"2010","journal-title":"International Journal of Security and its Applications"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAW.2011.37"},{"journal-title":"Zeus Variant Targets Mobile Online Banking Apps","year":"2010","key":"18"},{"key":"15","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/11601494_3","article-title":"Remote software-based attestation for wireless sensors","author":"shaneck","year":"2005","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39637-3_31"},{"key":"12","first-page":"329","article-title":"Droidchameleon: Evaluating Android anti-malware against transformation attacks","author":"rastogi","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6157418"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-8652-1_33"},{"journal-title":"Detailed Test Reports-Android","year":"2013","key":"1"},{"journal-title":"NQ Mobile Security Report 2012","year":"2013","key":"10"},{"journal-title":"Android Trojan Horse","year":"2011","author":"klein","key":"7"},{"key":"6","first-page":"1","article-title":"Retroactive detection of malware with applications to mobile platforms","author":"jakobsson","year":"2010","journal-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security USENIX Association"},{"key":"5","first-page":"255","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","volume":"10","author":"enck","year":"2010","journal-title":"OSDI"},{"journal-title":"Droidbox An Android Application Sandbox for Dynamic Analysis","year":"2011","author":"desnos","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-642-13869-0_2","article-title":"Sbap: Software-based attestation for peripherals","author":"li","year":"2010","journal-title":"Trust and Trustworthy Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27142-7_41"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999415.pdf?arnumber=6999415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:54:53Z","timestamp":1498190093000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999415","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}