{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:51Z","timestamp":1750307271241,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,8]],"date-time":"2010-10-08T00:00:00Z","timestamp":1286496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,8]]},"DOI":"10.1145\/1866886.1866892","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T15:38:31Z","timestamp":1286897911000},"page":"21-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reverse engineering for mobile systems forensics with Ares"],"prefix":"10.1145","author":[{"given":"John","family":"Tuttle","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Robert J.","family":"Walls","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Erik","family":"Learned-Miller","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Brian Neil","family":"Levine","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"213","volume":"462","year":"1983","unstructured":"}}Illinois v . Gates , 462 U.S. 213 , 238 ( 1983 ). }}Illinois v. Gates, 462 U.S. 213, 238 (1983).","journal-title":"Gates"},{"key":"e_1_3_2_1_2_1","volume-title":"NIST","author":"Ayers R.","year":"2007","unstructured":"}} R. Ayers , W. Jansen , A. Delaitre , and L. Moenner . Cell Phone Forensics Tools: An Overview and Analysis Update. Interagency report 7387 , NIST , Feb 2007 . }}R. Ayers, W. Jansen, A. Delaitre, and L. Moenner. Cell Phone Forensics Tools: An Overview and Analysis Update. Interagency report 7387, NIST, Feb 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1134760.1220164"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1653662.1653737"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1315245.1315286"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/829514.830534"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. ACM OSDI","author":"Cozzie A.","year":"2008","unstructured":"}} A. Cozzie , F. Stratton , H. Xue , and S. T. King . Digging for data structures . In Proc. ACM OSDI , 2008 . }}A. Cozzie, F. Stratton, H. Xue, and S. T. King. Digging for data structures. In Proc. ACM OSDI, 2008."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"USENIX Security Symp","author":"Cui W.","year":"2007","unstructured":"}} W. Cui , J. Kannan , and H. J. Wang . Discoverer: automatic protocol reverse engineering from network traces . In USENIX Security Symp , pages 1 -- 14 , 2007 . }}W. Cui, J. Kannan, and H. J. Wang. Discoverer: automatic protocol reverse engineering from network traces. In USENIX Security Symp, pages 1--14, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1455770.1455820"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1376616.1376759"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1328438.1328488"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/S0019-9958(67)91165-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_14_1","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft J. E.","year":"2000","unstructured":"}} J. E. Hopcroft , R. Motwani , and J. D. Ullman . Introduction to Automata Theory, Languages, and Computation . Addison-Wesley , 2000 . }}J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.diin.2010.01.006"},{"key":"e_1_3_2_1_17_1","volume-title":"US Dept. of Justice","author":"Judish N.","year":"2009","unstructured":"}} N. Judish Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations . US Dept. of Justice , 2009 . }}N. Judish et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. US Dept. of Justice, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1065010.1065034"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '10","name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","location":"Chicago Illinois USA"},"container-title":["Proceedings of the 2010 ACM workshop on Insider threats"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866886.1866892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866886.1866892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:59Z","timestamp":1750243979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866886.1866892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,8]]},"references-count":17,"alternative-id":["10.1145\/1866886.1866892","10.1145\/1866886"],"URL":"https:\/\/doi.org\/10.1145\/1866886.1866892","relation":{},"subject":[],"published":{"date-parts":[[2010,10,8]]},"assertion":[{"value":"2010-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}