{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:40Z","timestamp":1750220680650,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation (NSF)","award":["1850054"],"award-info":[{"award-number":["1850054"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450322","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"313-315","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis"],"prefix":"10.1145","author":[{"given":"Adamu","family":"Hussaini","sequence":"first","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"given":"Bassam","family":"Zahran","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]},{"given":"Aisha","family":"Ali-Gombe","sequence":"additional","affiliation":[{"name":"Towson University, Towson, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"volume-title":"Apr. 30","year":"2020","unstructured":"Smartphone Market Share. Accessed : Apr. 30 , 2020 . [Online]. Available: https:\/\/www.idc.com\/promo\/smartphone-market-share\/os Smartphone Market Share. Accessed: Apr. 30, 2020. [Online]. Available: https:\/\/www.idc.com\/promo\/smartphone-market-share\/os","key":"e_1_3_2_2_1_1"},{"unstructured":"G. Data Software \"G DATA Mobile Malware Report 2019: New high for malicious Android apps\" [Online]. Available: https:\/\/www.gdata-software.com\/news\/gdata-mobile-malware-report-2019-new-high-for-malicious-android-apps  G. Data Software \"G DATA Mobile Malware Report 2019: New high for malicious Android apps\" [Online]. Available: https:\/\/www.gdata-software.com\/news\/gdata-mobile-malware-report-2019-new-high-for-malicious-android-apps","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","first-page":"547","volume-title":"Intrusions and Defenses","author":"Ali-Gombe A.","year":"2019","unstructured":"A. Ali-Gombe , S. Sudhakaran , A. Case , and G. G. Richard , \" DroidScraper: a tool for Android in-memory object recovery and reconstruction,\" in Proceedings of the International Symposium on Research in Attacks , Intrusions and Defenses , pp. 547 -- 559 , Beijing, China , October 2019 . A. Ali-Gombe, S. Sudhakaran, A. Case, and G. G. Richard, \"DroidScraper: a tool for Android in-memory object recovery and reconstruction,\" in Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses, pp. 547--559, Beijing, China, October 2019."},{"key":"e_1_3_2_2_4_1","volume-title":"USA","author":"Ali-Gombe A.","year":"2020","unstructured":"A. Ali-Gombe , A. Tambaoan , A. Gurfolino , and G. G. Richard , \" App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts, \"In Annual Computer Security Applications Conference (ACSAC), Austin , USA , December 2020 . A. Ali-Gombe, A. Tambaoan, A. Gurfolino, and G. G. Richard, \"App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts, \"In Annual Computer Security Applications Conference (ACSAC), Austin, USA, December 2020."},{"unstructured":"Volatility Foundation. 2017. Volatility Command Reference. https:\/\/github.com\/volatilityfoundation\/volatility\/wiki\/Command-Reference. Available:accessed 21-March 2018].  Volatility Foundation. 2017. Volatility Command Reference. https:\/\/github.com\/volatilityfoundation\/volatility\/wiki\/Command-Reference. Available:accessed 21-March 2018].","key":"e_1_3_2_2_5_1"},{"unstructured":"Google 2016. Rekall. https:\/\/github.com\/google\/rekall.  Google 2016. Rekall. https:\/\/github.com\/google\/rekall.","key":"e_1_3_2_2_6_1"},{"volume-title":"https:\/\/github.com\/citypw\/lcamtuf-memfetch [Online","year":"2018","unstructured":"Michal Zalewski. 2003. Memfetch. https:\/\/github.com\/citypw\/lcamtuf-memfetch [Online ; accessed 17- March 2018 ]. Michal Zalewski. 2003. Memfetch. https:\/\/github.com\/citypw\/lcamtuf-memfetch [Online; accessed 17-March 2018].","key":"e_1_3_2_2_7_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '21","name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":7,"alternative-id":["10.1145\/3422337.3450322","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450322","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}