{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:23:52Z","timestamp":1740165832215,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Consumer Electron. Mag."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/mce.2018.2797618","type":"journal-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T19:42:27Z","timestamp":1523043747000},"page":"48-55","source":"Crossref","is-referenced-by-count":5,"title":["User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3799-8970","authenticated-orcid":false,"given":"Junsung","family":"Cho","sequence":"first","affiliation":[]},{"given":"Dayeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Is rooting your phone safe? The security risks of rooting devices","author":"howarth","year":"2015","journal-title":"Insights"},{"key":"ref11","article-title":"80% of Android phone owners in China have rooted their device","author":"boxall","year":"2015","journal-title":"Business of Apps"},{"journal-title":"Storage Options","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/948148.948149"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.71"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808126"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1557\/PROC-625-37","article-title":"Pikit: A new kernel-independent processor-interconnect rootkit","author":"song","year":"0","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2014.2340211"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.144"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"journal-title":"Android security 2016 year in review","year":"2017","key":"ref8"},{"journal-title":"260 000 Android users infected with malware","year":"2011","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2639189.2639218"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"journal-title":"The Evolution of Cross-site Scripting Attack","year":"2002","author":"endler","key":"ref1"},{"journal-title":"Building a Secure System Using TrustZone Technology","year":"2009","key":"ref20"},{"journal-title":"Mobile top 10 2014-M2","year":"2016","key":"ref22"},{"journal-title":"A Practical Guide to Trusted Computing","year":"2007","author":"challener","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e17063947"},{"journal-title":"Android application security with OWASP mobile top 10 2014","year":"2014","author":"king","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1118276"}],"container-title":["IEEE Consumer Electronics Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962380\/8332905\/08332917.pdf?arnumber=8332917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:13:05Z","timestamp":1642003985000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8332917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":25,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mce.2018.2797618","relation":{},"ISSN":["2162-2248","2162-2256"],"issn-type":[{"type":"print","value":"2162-2248"},{"type":"electronic","value":"2162-2256"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}