{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:37:28Z","timestamp":1769917048973,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,6]]},"DOI":"10.1109\/wifs49906.2020.9360906","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:12:41Z","timestamp":1614287561000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["AmpleDroid Recovering Large Object Files from Android Application Memory"],"prefix":"10.1109","author":[{"given":"Sneha","family":"Sudhakaran","sequence":"first","affiliation":[]},{"given":"Aisha","family":"Ali-Gombe","sequence":"additional","affiliation":[]},{"given":"Augustine","family":"Orgah","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Case","sequence":"additional","affiliation":[]},{"given":"Golden G.","family":"Richard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Performance and memory improvements in android run time (art)","author":"chartier","year":"2017","journal-title":"Google I\/O &#x2018;17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781420082807"},{"key":"ref12","article-title":"Androidxref oreo 8.0.0 r4","year":"2018"},{"key":"ref13","article-title":"Androidxref oreo 8.0.0 r4","year":"2018"},{"key":"ref14","article-title":"Memfetch","year":"0"},{"key":"ref15","article-title":"Memparser Analysis Tool by Chris Betz","year":"0"},{"key":"ref16","article-title":"Androidxref oreo 8.0.0 r4","year":"2018"},{"key":"ref17","article-title":"Androidxref oreo 8.0.0.r4","year":"2018"},{"key":"ref18","article-title":"AndroidXRef oreo 8.0.0 r4","year":"2018"},{"key":"ref19","article-title":"Androidxref oreo 8.0.0 r4","year":"2018"},{"key":"ref28","first-page":"255","article-title":"{DSCRETE}: Automatic rendering of forensic information from memory images via application logic reuse","author":"saltaformaggio","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref4","first-page":"547","article-title":"DroidScraper: A tool for android in-memory object recovery and reconstruction","author":"ali-gombe","year":"2019","journal-title":"22nd International Symposium on Research in Attacks Intrusions and Defenses ( RAID 2019)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813650"},{"key":"ref3","author":"case","year":"2011","journal-title":"Memory Analysis of the Dalvik (Android) Virtual Machine"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23324"},{"key":"ref5","first-page":"147","article-title":"A technique for extraction and analysis of application heap objects within android runtime (art)","author":"soares","year":"2017","journal-title":"ICISS"},{"key":"ref8","article-title":"Volatility-an advanced memory forensics framework","author":"auty","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37437-1_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"ref9","author":"macht","year":"2013","journal-title":"Live Memory Forensics on Android with Volatility"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRCW.2019.8880840"},{"key":"ref20","article-title":"memory allocation algorithms","year":"2017"},{"key":"ref22","year":"2018","journal-title":"Android Developers Char Array"},{"key":"ref21","article-title":"Android developers byte array","year":"2018"},{"key":"ref24","article-title":"Google Play","year":"2018","journal-title":"Google"},{"key":"ref23","year":"2018","journal-title":"Android Developers String Array"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813720"},{"key":"ref25","article-title":"Genymotion Desktop","year":"0"}],"event":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"New York, NY, USA","start":{"date-parts":[[2020,12,6]]},"end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9360831\/9360880\/09360906.pdf?arnumber=9360906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:17:50Z","timestamp":1656602270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/wifs49906.2020.9360906","relation":{},"subject":[],"published":{"date-parts":[[2020,12,6]]}}}