{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:01:54Z","timestamp":1767837714007,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/syscon53536.2022.9773881","type":"proceedings-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:45:11Z","timestamp":1652733911000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication"],"prefix":"10.1109","author":[{"given":"Rodrigo","family":"Lemos","sequence":"first","affiliation":[{"name":"Federal University of Paran&#x00E1; State,Computer Science Department,Curitiba,Brazil"}]},{"given":"Tiago","family":"Heinrich","sequence":"additional","affiliation":[{"name":"Federal University of Paran&#x00E1; State,Computer Science Department,Curitiba,Brazil"}]},{"given":"Carlos A.","family":"Maziero","sequence":"additional","affiliation":[{"name":"Federal University of Paran&#x00E1; State,Computer Science Department,Curitiba,Brazil"}]},{"given":"Newton C.","family":"Will","sequence":"additional","affiliation":[{"name":"Federal University of Technology - Paran&#x00E1;,Computer Science Department,Dois Vizinhos,Brazil"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"ref30","article-title":"Inappbrowser plugin","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2792941"},{"key":"ref35","article-title":"An&#x00E1;lise de aplicativos no Android utilizando tra&#x00E7;os de execu&#x00E7;&#x00E3;o","author":"de souza polisciuc","year":"2020","journal-title":"Proceedings of the Brazilian Symposium on Information and Computational Systems Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"ref10","article-title":"Application sandbox","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.43"},{"key":"ref12","article-title":"Android Binder","author":"schreiber","year":"2011"},{"key":"ref13","article-title":"Secure Android devices","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1675-7_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT52682.2021.9491765"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019INI0003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30619-9_14"},{"key":"ref18","first-page":"56","article-title":"Mobile malware detection: A survey","volume":"17","author":"hamed","year":"2019","journal-title":"Proceedings of the International Journal of Computer Science and Information Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2643"},{"key":"ref28","article-title":"StatCounter, Mobile Android Version Market Share Worldwide","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2667658"},{"key":"ref27","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref3","article-title":"Mobile security report","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019EDP7119"},{"key":"ref29","article-title":"The original barcode scanner app, seemingly mistaken for malware, is getting review-bombed","author":"hollister","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS1.2017.8325997"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon48628.2021.9447066"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101663"},{"key":"ref2","article-title":"Alert (aa20-099a): COVID-19 exploited by malicious cyber actors","year":"2020"},{"key":"ref1","article-title":"Mobile malware evolution 2020","author":"chebyshev","year":"2021"},{"key":"ref9","article-title":"AndroBlend","author":"lemos","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006143"},{"key":"ref22","article-title":"Man in the Binder: He who controls IPC, controls the Droid","author":"artenstein","year":"2014","journal-title":"BlackHat Europe"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref24","article-title":"Intents and intent filters","author":"android","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40316-3_33"},{"key":"ref26","article-title":"AndroGuard: Reverse engineering, malware and goodware analysis of Android applications","author":"desnos","year":"2015"},{"key":"ref25","article-title":"App manifest overview","author":"android","year":"2021"}],"event":{"name":"2022 IEEE International Systems Conference (SysCon)","location":"Montreal, QC, Canada","start":{"date-parts":[[2022,4,25]]},"end":{"date-parts":[[2022,4,28]]}},"container-title":["2022 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9773363\/9773791\/09773881.pdf?arnumber=9773881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:09:08Z","timestamp":1655154548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9773881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/syscon53536.2022.9773881","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}