{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:43Z","timestamp":1750306483523,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T00:00:00Z","timestamp":1445817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,26]]},"DOI":"10.1145\/2846661.2846671","type":"proceedings-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T15:05:10Z","timestamp":1454079910000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile device security"],"prefix":"10.1145","author":[{"given":"Robert C.","family":"Seacord","sequence":"first","affiliation":[{"name":"NCC Group, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"659","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15) , Jaeyeon Jung (Ed.). USENIX Association, Berkeley, CA, USA , 659 - 674 . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15), Jaeyeon Jung (Ed.). USENIX Association, Berkeley, CA, USA, 659-674."},{"key":"e_1_3_2_1_2_1","unstructured":"NCC Group 2015. Faux Disk Encryption: Realities of Secure Storage on Mobile Devices.  NCC Group 2015. Faux Disk Encryption: Realities of Secure Storage on Mobile Devices."},{"key":"e_1_3_2_1_3_1","article-title":")","volume":"28","author":"Soghoian Stephanie","year":"2014","unstructured":"Pell, Stephanie K. and Soghoian , Christopher, Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy (December 29 , 2014 ) . Harvard Journal of Law and Technology , Volume 28 , Number 1 Fall 2014. Available at SSRN: http:\/\/ssrn.com\/abstract=2437678 Pell, Stephanie K. and Soghoian, Christopher, Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy (December 29, 2014). Harvard Journal of Law and Technology, Volume 28, Number 1 Fall 2014. Available at SSRN: http:\/\/ssrn.com\/abstract=2437678","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_3_2_1_4_1","unstructured":"2013. Practical Cellphone Spying. Kristin Paget.  2013. Practical Cellphone Spying. Kristin Paget."},{"key":"e_1_3_2_1_5_1","unstructured":"DePerry D. Ritter T. and Rahimi A. 2013. Traffic Interception & Remote Mobile Phone Cloning with a Compromised CDMA Femtocell.  DePerry D. Ritter T. and Rahimi A. 2013. Traffic Interception & Remote Mobile Phone Cloning with a Compromised CDMA Femtocell."},{"volume-title":"The CERT C Coding Standard","author":"Seacord Robert C.","key":"e_1_3_2_1_6_1","unstructured":"Robert C. Seacord . 2014. The CERT C Coding Standard , Second Edition: 98 Rules for Developing Safe, Reliable , and Secure Systems (2nd Ed.). Addison-Wesley Professional . i https:\/\/www.alcatel-lucent.com\/solutions\/malware-reports. ii http:\/\/www.apple.com\/cn\/xcodeghost\/ iii http:\/\/www.kb.cert.org\/vuls\/id\/924951 Robert C. Seacord. 2014. The CERT C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems (2nd Ed.). Addison-Wesley Professional. i https:\/\/www.alcatel-lucent.com\/solutions\/malware-reports. ii http:\/\/www.apple.com\/cn\/xcodeghost\/ iii http:\/\/www.kb.cert.org\/vuls\/id\/924951"}],"event":{"name":"SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"],"location":"Pittsburgh PA USA","acronym":"SPLASH '15"},"container-title":["Proceedings of the 3rd International Workshop on Mobile Development Lifecycle"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846661.2846671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2846661.2846671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2846661.2846671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,26]]},"references-count":6,"alternative-id":["10.1145\/2846661.2846671","10.1145\/2846661"],"URL":"https:\/\/doi.org\/10.1145\/2846661.2846671","relation":{},"subject":[],"published":{"date-parts":[[2015,10,26]]},"assertion":[{"value":"2015-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}