{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:50Z","timestamp":1750306490030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of China","award":["61303057","61170072"],"award-info":[{"award-number":["61303057","61170072"]}]},{"name":"National Science and Technology Major Projects","award":["2012ZX01039-004"],"award-info":[{"award-number":["2012ZX01039-004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2810108","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1690-1692","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Jingzheng","family":"Wu","sequence":"first","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]},{"given":"Yanjun","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]},{"given":"Mutian","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]},{"given":"Zhifei","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]},{"given":"Tianyue","family":"Luo","sequence":"additional","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]},{"given":"Yongji","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Software, The Chinese Academy of Sciences, BeiJing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Schlegel R.","year":"2011","unstructured":"Schlegel , R. , Zhang , K. , Zhou , X. , Intwala , M. , Kapadia , A. , and Wang , X . Soundcomber: A stealthy and context-aware sound trojan for smartphones . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 , San Diego, California, USA, February 6--9 , 2011 (2011). Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., and Wang, X. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, February 6--9, 2011 (2011)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.754"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2810108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2810108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:35Z","timestamp":1750225715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2810108"}},"subtitle":["biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":3,"alternative-id":["10.1145\/2810103.2810108","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2810108","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}