{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:21:36Z","timestamp":1730290896392,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/prisms.2014.6970601","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T22:20:33Z","timestamp":1418077233000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Android - On-device detection of SMS catchers and sniffers"],"prefix":"10.1109","author":[{"given":"Peter","family":"Teufl","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Zefferer","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Woergoetter","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Oprisnik","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","article-title":"Hackers to get eavesdropping lessons on cell calls","key":"ref10"},{"year":"2012","article-title":"Media Alert: Check Point and Versafe Uncover New Eurograbber Attack","key":"ref11"},{"key":"ref12","article-title":"2011 Mobile Threat Report","author":"security","year":"2011","journal-title":"Tech Rep"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/MALWARE.2009.5403026"},{"year":"0","journal-title":"Hackmageddon","article-title":"One Year Of Android Malware (Full List)","key":"ref14"},{"year":"0","author":"blog","article-title":"Current Android Malware","key":"ref15"},{"key":"ref16","article-title":"Malware Detection by Applying Knowledge Discovery Processes to Application Metadata on the Android Market (Google Play)","author":"teufi","year":"0","journal-title":"Security and Communication Networks"},{"year":"0","journal-title":"Androguard","article-title":"Androguard","key":"ref17"},{"year":"0","author":"egele","article-title":"PiOS: Detecting Privacy Leaks in iOS Applications","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1877972.1877992"},{"year":"0","journal-title":"CWarn","article-title":"Tsunali Early Warning System","key":"ref4"},{"year":"0","author":"centre","article-title":"Earthquake Email and SMS notification service","key":"ref3"},{"year":"0","journal-title":"Proteins","article-title":"Televoting System","key":"ref6"},{"year":"0","article-title":"Information via SMS","key":"ref5"},{"year":"0","journal-title":"Raiffeisen","article-title":"Raiffeisen smsTAN","key":"ref8"},{"year":"0","journal-title":"Sparkasse","key":"ref7"},{"year":"0","journal-title":"3GPP","article-title":"TS 24.011-Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface","key":"ref2"},{"key":"ref9","article-title":"Qualified Mobile Server Signature","author":"orthacker","year":"0","journal-title":"Proceedings of the 25th TC 11 International Information Security Conference SEC 2010 2010"},{"year":"2010","journal-title":"I T U (ITU)","article-title":"ITU estimates two billion people online by end 2010","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","volume":"49","author":"enck","year":"2010","journal-title":"Design"},{"year":"0","journal-title":"Droidbox","article-title":"Droidbox","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2184489.2184500"},{"key":"ref24","article-title":"SymDroid: Symbolic Execution for Dalvik Bytecode","author":"jeon","year":"0","journal-title":"Journal of Systems and Software 2012"},{"year":"0","article-title":"Permissions","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6963210\/6970591\/06970601.pdf?arnumber=6970601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:13:02Z","timestamp":1489428782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6970601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/prisms.2014.6970601","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}