{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:32Z","timestamp":1750306832010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557554","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"333-344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Is it really you?"],"prefix":"10.1145","author":[{"given":"Paul","family":"Giura","sequence":"first","affiliation":[{"name":"AT&amp;T Security Research Center, New York, NY, USA"}]},{"given":"Ilona","family":"Murynets","sequence":"additional","affiliation":[{"name":"AT&amp;T Security Research Center, New York, NY, USA"}]},{"given":"Roger","family":"Piqueras Jover","sequence":"additional","affiliation":[{"name":"AT&amp;T Security Research Center, New York, NY, USA"}]},{"given":"Yevgeniy","family":"Vahlis","sequence":"additional","affiliation":[{"name":"Bionym Inc, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GGTracker Android Trojan. http:\/\/goo.gl\/apq7eV.  GGTracker Android Trojan. http:\/\/goo.gl\/apq7eV."},{"key":"e_1_3_2_1_2_1","unstructured":"Security Alert - SpamSoldier. The Lookout Blog December 2012. http:\/\/goo.gl\/7lkRM.  Security Alert - SpamSoldier. The Lookout Blog December 2012. http:\/\/goo.gl\/7lkRM."},{"volume-title":"Daily Mail","year":"2012","author":"The","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"2013","author":"Threats Report McAfee","year":"2013","journal-title":"Second Quarter"},{"key":"e_1_3_2_1_5_1","unstructured":"C. Arthur. More than 50 android apps found infected with rootkit malware March 2011. http:\/\/www.guardian.co.uk\/technology\/blog\/2011\/mar\/02\/android-market-apps-malware.  C. Arthur. More than 50 android apps found infected with rootkit malware March 2011. http:\/\/www.guardian.co.uk\/technology\/blog\/2011\/mar\/02\/android-market-apps-malware."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"volume-title":"New York Times","year":"2013","author":"Chen B.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Chow M. Jakobsson R. Masuoka J. Molina Y. Niu E. Shi and Z. Song. Authentication in the clouds: A framework and its application to mobile users. 2010.  R. Chow M. Jakobsson R. Masuoka J. Molina Y. Niu E. Shi and Z. Song. Authentication in the clouds: A framework and its application to mobile users. 2010.","DOI":"10.1145\/1866835.1866837"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935230_1"},{"key":"e_1_3_2_1_12_1","first-page":"10","volume-title":"Proceedings of the 6th conference on Symposium on Operarting Systems Design & Implementation -","volume":"6","author":"Dean J.","year":"2004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"e_1_3_2_1_15_1","unstructured":"FortiBlog. Android droiddream uses two vulnerabilities March 2011. http:\/\/blog.fortinet.com\/android-droiddream-uses-two-vulnerabilities\/.  FortiBlog. Android droiddream uses two vulnerabilities March 2011. http:\/\/blog.fortinet.com\/android-droiddream-uses-two-vulnerabilities\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70127-1"},{"volume-title":"HotNets III","year":"2004","author":"Guo C.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634532"},{"volume-title":"Inc.","year":"1982","author":"Lint J. H. v.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39804-2_33"},{"key":"e_1_3_2_1_24_1","unstructured":"P. Pachal. Google removes 21 malware apps from android market March 2011. http:\/\/www.pcmag.com\/article2\/0 2817 2381252 00.asp.  P. Pachal. Google removes 21 malware apps from android market March 2011. http:\/\/www.pcmag.com\/article2\/0 2817 2381252 00.asp."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.820038"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"E. Shi Y. Niu M. Jakobsson and R. Chow. Implicit authentication through learning user behavior. 2010.  E. Shi Y. Niu M. Jakobsson and R. Chow. Implicit authentication through learning user behavior. 2010.","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"e_1_3_2_1_27_1","unstructured":"R. Siciliano. Recycled Lost Stolen Phones Equal Identity Theft. FinExtra February 2009. http:\/\/goo.gl\/OVgidl.  R. Siciliano. Recycled Lost Stolen Phones Equal Identity Theft. FinExtra February 2009. http:\/\/goo.gl\/OVgidl."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.57"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Z. Xu K. Bai and S. Zhu. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. 2012.  Z. Xu K. Bai and S. Zhu. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. 2012.","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557554"}},"subtitle":["user identification via adaptive behavior fingerprinting"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":30,"alternative-id":["10.1145\/2557547.2557554","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557554","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}