{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:00Z","timestamp":1761621180410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T00:00:00Z","timestamp":1395619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003561","name":"Ministry of Culture, Sports and Tourism","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003561","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Culture, Sports and Tourism (MCST) and Korea Copyright Commission in 2013"},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["H2101-13-1001"],"award-info":[{"award-number":["H2101-13-1001"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,24]]},"DOI":"10.1145\/2554850.2559915","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"1737-1738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A kernel-based monitoring approach for analyzing malicious behavior on Android"],"prefix":"10.1145","author":[{"given":"Youn-sik","family":"Jeong","sequence":"first","affiliation":[{"name":"Dankook University, Yongin-si, Gyeonggi-do, Korea"}]},{"given":"Hwan-taek","family":"Lee","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin-si, Gyeonggi-do, Korea"}]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin-si, Gyeonggi-do, Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Konkuk University, Chungju-si, Chungbuk-do, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Konkuk University, Chungju-si, Chungbuk-do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.226"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation (pp. 1--6).","author":"Enck W.","year":"2010","unstructured":"Enck , W. , Gilbert , P. , Chun , B. G. , Cox , L. P. , Jung , J. , McDaniel , P. , & Sheth , A. N. ( 2010 ) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation (pp. 1--6). Enck, W., Gilbert, P., Chun, B. G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2010) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation (pp. 1--6)."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 20th USENIX Security Symposium.","author":"Dietz M.","year":"2011","unstructured":"Dietz , M. , Shekhar , S. , Pisetsky , Y. , Shu , A. , & Wallach , D. S. ( 2011 ) Quire: Lightweight provenance for smart phone operating systems . In Proceedings of the 20th USENIX Security Symposium. Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., & Wallach, D. S. (2011) Quire: Lightweight provenance for smart phone operating systems. In Proceedings of the 20th USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","unstructured":"Zhou Y. and Jiang X. Android Malware Genome Project. www.malgenomeproject.org  Zhou Y. and Jiang X. Android Malware Genome Project. www.malgenomeproject.org"}],"event":{"name":"SAC 2014: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Gyeongju Republic of Korea","acronym":"SAC 2014"},"container-title":["Proceedings of the 29th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2559915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2554850.2559915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:04Z","timestamp":1750232104000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2559915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,24]]},"references-count":5,"alternative-id":["10.1145\/2554850.2559915","10.1145\/2554850"],"URL":"https:\/\/doi.org\/10.1145\/2554850.2559915","relation":{},"subject":[],"published":{"date-parts":[[2014,3,24]]},"assertion":[{"value":"2014-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}