{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:34:06Z","timestamp":1725561246981},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413695","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T16:26:08Z","timestamp":1456503968000},"page":"144-151","source":"Crossref","is-referenced-by-count":1,"title":["Counterfeit mobile devices - the duck test"],"prefix":"10.1109","author":[{"given":"John","family":"O'brien","sequence":"first","affiliation":[]},{"given":"Kimmo","family":"Lehtonen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"McAfee Labs Threats Report May 2015","year":"2015","key":"ref4"},{"journal-title":"Motive Security Labs malware report - H2 2004","year":"2015","key":"ref3"},{"journal-title":"MEl Security Weakness Reporting and Correction Process","year":"2007","key":"ref10"},{"journal-title":"Cellebrite UFED 4PC","year":"0","key":"ref6"},{"journal-title":"More than 80% of Smartphones Remain Unprotectedfrom Malware and Attacks Juniper Research Finds","year":"2013","key":"ref5"},{"journal-title":"IEC 60950&#x2013;1 2005 Information technology equipment - Safety - Part 1 General requirements","year":"2005","key":"ref8"},{"journal-title":"AVAR presentation The Evolution of an Automated Scanning Service &#x2018;Still Scanning for a Cyber-Needle in a Cyber-Haystack&#x2019;","year":"2009","author":"mcmillan","key":"ref7"},{"journal-title":"Danger Why You Shouldn't Buy Cheap Third-Party Batteries For Laptops or Smartphones","year":"2013","author":"hoffman","key":"ref9"},{"journal-title":"Counterfeit\/Substandard mobile phones A resource guide for governments","year":"2014","key":"ref1"},{"journal-title":"Counterfeit\/Substandard mobile phones A resource guide for governments","year":"2014","key":"ref1a"}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413695.pdf?arnumber=7413695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T20:28:02Z","timestamp":1594153682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7413695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413695","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}