{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:38:56Z","timestamp":1730306336056,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/worldcis.2013.6751023","type":"proceedings-article","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T21:13:02Z","timestamp":1398892382000},"page":"88-93","source":"Crossref","is-referenced-by-count":7,"title":["In-memory credentials robbery on android phones"],"prefix":"10.1109","author":[{"given":"Pasquale","family":"Stirparo","sequence":"first","affiliation":[]},{"given":"Igor Nai","family":"Fovino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Taddeo","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kounelis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","article-title":"Android memory dump analysis","volume":"1","author":"leppert","year":"2012","journal-title":"Student Research Paper Chair of Computer Science"},{"journal-title":"Live Memory Forensics on Android with Volatility","year":"2013","author":"macht","key":"16"},{"journal-title":"The Volatility Framework Volatile memory artifact extraction utility framework","year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.010"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0022-0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2004.1375935"},{"key":"1","first-page":"297","article-title":"The mobileak project: Forensics methodology for mobile application privacy assessment","author":"stirparo","year":"2012","journal-title":"Internet Technology and Secured Transactions 2012 International Conferece For IEEE"},{"journal-title":"Forensic Ram Dump Image Analyser","year":"2010","author":"koll?ar","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.008"},{"journal-title":"Memfetch Homepage","year":"0","author":"zalweski","key":"6"},{"key":"5","article-title":"All your droid are belong to us: A survey of current android attacks","author":"vidas","year":"2011","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.005"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.006"}],"event":{"name":"2013 World Congress on Internet Security (WorldCIS)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["World Congress on Internet Security (WorldCIS-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745499\/6750999\/06751023.pdf?arnumber=6751023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:42:45Z","timestamp":1490308965000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6751023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/worldcis.2013.6751023","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}