{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:05:37Z","timestamp":1730282737582,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160474","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T22:02:26Z","timestamp":1437084146000},"page":"1290-1295","source":"Crossref","is-referenced-by-count":2,"title":["Improving the android smartphone security against various malware threats"],"prefix":"10.1109","author":[{"given":"Darko","family":"Hrestak","sequence":"first","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"given":"Zeljko","family":"Rumenjak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","key":"ref10","article-title":"Security-Enhanced Linux in Android"},{"journal-title":"The SELinux Notebook","year":"2014","author":"haines","key":"ref11"},{"year":"2015","key":"ref12","article-title":"Security Enhancements (SE) for Android"},{"article-title":"IntentFirewal","year":"2015","author":"yagemann","key":"ref13"},{"article-title":"MIT App Inventor","year":"2013","author":"cashmore","key":"ref14"},{"year":"2015","key":"ref15","article-title":"A tool for reverse engineering Android apk files"},{"year":"2015","key":"ref16","article-title":"dex2jar"},{"year":"2015","key":"ref17","article-title":"Java Decompiler. Yet another fast Java decompiler"},{"year":"2015","key":"ref18","article-title":"JAD Java Decompiler"},{"year":"2015","key":"ref19","article-title":"Androguard"},{"key":"ref4","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","author":"michalevsky","year":"0","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"journal-title":"Mobile device identification via sensor fingerprinting","year":"2014","author":"bojinov","key":"ref3"},{"year":"2014","key":"ref6","article-title":"2014 Mobile Threat Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4063-1"},{"journal-title":"Android Security Internals An In-Depth Guide to Android's Security Architecture","year":"2014","author":"elenkov","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"journal-title":"Powerspy Location tracking using mobile device power analysis","year":"2015","author":"michalevsky","key":"ref2"},{"key":"ref9","article-title":"Security enhanced (SE) android: Bringing flexible MAC to android","author":"smalley","year":"0","journal-title":"20th Annual Network and Distributed System Security Symposium NDSS 2013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.90"},{"year":"2015","key":"ref20","article-title":"APK Studio | Android Reverse-Engineering"},{"key":"ref22","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for real-time privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"},{"year":"2015","key":"ref21","article-title":"JEB - The Interactive Android Decompiler"},{"year":"2015","key":"ref24","article-title":"X-Ray for Android"},{"key":"ref23","volume":"2","author":"fuchs","year":"2009","journal-title":"SCanDroid Automated Security Certification of Android Applications"},{"year":"2013","key":"ref26","article-title":"Android Application Vulnerability Scanner Toolkit"},{"year":"2015","key":"ref25","article-title":"Appvigil"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2015,5,25]]},"location":"Opatija, Croatia","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160474.pdf?arnumber=7160474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:08:00Z","timestamp":1490389680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160474","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}