{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:54Z","timestamp":1750307154712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T00:00:00Z","timestamp":1318377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,12]]},"DOI":"10.1145\/2179298.2179367","type":"proceedings-article","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T17:52:37Z","timestamp":1333475557000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Network covert channels on the Android platform"],"prefix":"10.1145","author":[{"given":"Wade","family":"Gasior","sequence":"first","affiliation":[]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2011,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Covert channel detection using process query systems","author":"Berk V.","year":"2005","unstructured":"V. Berk , A. Giani , and G. Cybenko . Covert channel detection using process query systems . 2005 . V. Berk, A. Giani, and G. Cybenko. Covert channel detection using process query systems. 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731523"},{"key":"e_1_3_2_1_9_1","unstructured":"B. Reed. Android market share nears 50% worldwide. http:\/\/www.networkworld.com\/news\/2011\/ 080111-canalys.html 2011.  B. Reed. Android market share nears 50% worldwide. http:\/\/www.networkworld.com\/news\/2011\/ 080111-canalys.html 2011."},{"key":"e_1_3_2_1_10_1","first-page":"17","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)","author":"Schlegel R.","year":"2011","unstructured":"R. Schlegel , K. Zhang , X. Zhou , M. Intwala , A. Kapadia , and X. Wang . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones . In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS) , pages 17 - 33 , Feb. 2011 . R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), pages 17-33, Feb. 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 15th conference on USENIX Security Symposium -","volume":"15","author":"Shah G.","year":"2006","unstructured":"G. Shah , A. Molina , and M. Blaze . Keyboards and covert channels . In Proceedings of the 15th conference on USENIX Security Symposium - Volume 15 , Berkeley, CA, USA , 2006 . USENIX Association. G. Shah, A. Molina, and M. Blaze. Keyboards and covert channels. In Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_13_1","first-page":"51","volume-title":"CRYPTO","author":"Simmons G. J.","year":"1983","unstructured":"G. J. Simmons . The prisoners' problem and the subliminal channel . In CRYPTO , pages 51 - 67 , 1983 . G. J. Simmons. The prisoners' problem and the subliminal channel. In CRYPTO, pages 51-67, 1983."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"}],"event":{"name":"CSIIRW '11: Cyber Security and Information Intelligence Research Workshop","sponsor":["Eurosis Eurosis","Oak Ridge National Laboratory","University of Tennessee University of Tennessee"],"location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '11"},"container-title":["Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2179298.2179367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:20Z","timestamp":1750240460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,12]]},"references-count":12,"alternative-id":["10.1145\/2179298.2179367","10.1145\/2179298"],"URL":"https:\/\/doi.org\/10.1145\/2179298.2179367","relation":{},"subject":[],"published":{"date-parts":[[2011,10,12]]},"assertion":[{"value":"2011-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}