{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:58Z","timestamp":1750307098752,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T00:00:00Z","timestamp":1350345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382304","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"998-1000","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Demonstrating the effectiveness of MOSES for separation of execution modes"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Russello","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Universita di Padova, Padova, Italy"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"Universita di Trento, Trento, Italy"}]},{"given":"Earlence","family":"Fernandes","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Yury","family":"Zhauniarovich","sequence":"additional","affiliation":[{"name":"Universita di Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Eric Chien. The motivations of recent android malware. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/motivations_of_recent_android_malware.pdf.  Eric Chien. The motivations of recent android malware. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/motivations_of_recent_android_malware.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Gartner says worldwide smartphone sales soared in fourth quarter of 2011 with 47 percent growth. http:\/\/www.gartner.com\/it\/page.jsp?id=1924314.  Gartner says worldwide smartphone sales soared in fourth quarter of 2011 with 47 percent growth. http:\/\/www.gartner.com\/it\/page.jsp?id=1924314."},{"key":"e_1_3_2_1_3_1","unstructured":"Gartner survey shows byod is top concern for enterprise mobile security. http:\/\/www.gartner.com\/it\/page.jsp?id=2048617.  Gartner survey shows byod is top concern for enterprise mobile security. http:\/\/www.gartner.com\/it\/page.jsp?id=2048617."},{"key":"e_1_3_2_1_4_1","unstructured":"Unisys establishes a bring your own device (byod) policy. http:\/\/www.insecureaboutsecurity.com\/2011\/03\/14\/unisys_establishes_a_bring_your_own_device_byod_policy\/.  Unisys establishes a bring your own device (byod) policy. http:\/\/www.insecureaboutsecurity.com\/2011\/03\/14\/unisys_establishes_a_bring_your_own_device_byod_policy\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Technische Universitat Dresden and University of Technology Berlin. L4android.  Technische Universitat Dresden and University of Technology Berlin. L4android."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering","author":"Xu Yang","year":"2010","unstructured":"Yang Xu , Felix Bruns , Elizabeth Gonzalez , Shadi Traboulsi , Klaus Mott , and Attila Bilgic . Performance evaluation of para-virtualization on modern mobile phone platform . In Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering , 2010 . Yang Xu, Felix Bruns, Elizabeth Gonzalez, Shadi Traboulsi, Klaus Mott, and Attila Bilgic. Performance evaluation of para-virtualization on modern mobile phone platform. In Proceedings of the International Conference on Computer, Electrical, and Systems Science, and Engineering, 2010."}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:48Z","timestamp":1750239288000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":8,"alternative-id":["10.1145\/2382196.2382304","10.1145\/2382196"],"URL":"https:\/\/doi.org\/10.1145\/2382196.2382304","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}