{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:53:28Z","timestamp":1767855208698,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,17]]},"DOI":"10.1109\/syscon53073.2023.10131073","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T13:29:09Z","timestamp":1685021349000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Inspecting Binder Transactions to Detect Anomalies in Android"],"prefix":"10.1109","author":[{"given":"Rodrigo G.","family":"Lemos","sequence":"first","affiliation":[{"name":"Federal University of Paran&#x00E1; - Curitiba,Computer Science Department,Brazil,81530-015"}]},{"given":"Tiago","family":"Heinrich","sequence":"additional","affiliation":[{"name":"Federal University of Paran&#x00E1; - Curitiba,Computer Science Department,Brazil,81530-015"}]},{"given":"Newton C.","family":"Will","sequence":"additional","affiliation":[{"name":"Federal University of Technology - Paran&#x00E1; - Dois Vizinhos,Computer Science Department,Brazil,85660-000"}]},{"given":"Rafael R.","family":"Obelheiro","sequence":"additional","affiliation":[{"name":"State University of Santa Catarina - Joinville,Computer Science Department,Brazil,89219-710"}]},{"given":"Carlos A.","family":"Maziero","sequence":"additional","affiliation":[{"name":"Federal University of Paran&#x00E1; - Curitiba,Computer Science Department,Brazil,81530-015"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Man in the Binder: He who controls IPC, controls the droid","author":"artenstein","year":"2014","journal-title":"Black Hat Conf"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref12","article-title":"A survey of Android security threats and defenses","volume":"6","author":"rashidi","year":"2015","journal-title":"J of Wir Mob Net Ubiq Comp and Depen Appl"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2643"},{"key":"ref15","article-title":"Security tips","author":"android","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS1.2017.8325997"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_21"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074847"},{"key":"ref2","article-title":"Mobile operating system market share worldwide","year":"2021"},{"key":"ref1","article-title":"Desktop vs mobile vs tablet market share worldwide","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326095"},{"key":"ref16","article-title":"Android Binder","author":"schreiber","year":"2011","journal-title":"Master's Thesis Ruhr-Universit\ufffdt Bochum Germany"},{"key":"ref19","article-title":"Ftrace","author":"kukunas","year":"2015","journal-title":"Power and Performance in Enterprise Systems"},{"key":"ref18","article-title":"Using Binder IPC","author":"android","year":"2021"},{"key":"ref24","article-title":"Binder: Fix race that allows malicious free of live buffer","author":"kjos","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504911"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref25","article-title":"Binder: Add support for scatter-gather","author":"coenen","year":"2017"},{"key":"ref20","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref22","article-title":"UI\/application exerciser Monkey","year":"2019"},{"key":"ref21","article-title":"Virustotal: Free online virus, malware and url scanner","year":"2020"},{"key":"ref28","article-title":"A survey of random forest based methods for intrusion detection systems","volume":"51","author":"resende","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"ref29","article-title":"TESSERACT: Eliminating experimental bias in malware classification across space and time","author":"pendlebury","year":"2019","journal-title":"Usenix Security Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref7","article-title":"Mobile malware evolution 2020","author":"chebyshev","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon53536.2022.9773881"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019INI0003"},{"key":"ref3","article-title":"A novel permission-based Android malware detection system using feature selection based on linear regression","volume":"33","author":"\u00f6zkan ?ahin","year":"2021","journal-title":"Neural Comput Appl"},{"key":"ref6","article-title":"Americans are catching on","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1675-7_2"}],"event":{"name":"2023 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2023,4,17]]},"end":{"date-parts":[[2023,4,20]]}},"container-title":["2023 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131045\/10131046\/10131073.pdf?arnumber=10131073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T13:45:24Z","timestamp":1687182324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/syscon53073.2023.10131073","relation":{},"subject":[],"published":{"date-parts":[[2023,4,17]]}}}