{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:25:36Z","timestamp":1742988336323,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470627"},{"type":"electronic","value":"9783319470634"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47063-4_2","type":"book-chapter","created":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T23:59:58Z","timestamp":1483574398000},"page":"16-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Controlled Android Application Execution for the IoT Infrastructure"],"prefix":"10.1007","author":[{"given":"Michael N.","family":"Johnstone","sequence":"first","affiliation":[]},{"given":"Zubair","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Hannay","sequence":"additional","affiliation":[]},{"given":"Clinton","family":"Carpene","sequence":"additional","affiliation":[]},{"given":"Malik","family":"Feroze","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"2_CR1","unstructured":"Barroso, D.: 21sec Security Blog: ZeuS Mitmo: Man-in-the-mobile (III) (2015). http:\/\/securityblog.s21sec.com\/2010\/09\/zeus-mitmo-man-in-mobile-iii.html"},{"key":"2_CR2","unstructured":"Valli, C., Martinus, I., Johnstone, M.: Small to medium enterprise cyber security awareness: an initial survey of Western Australian business. In: Proceedings of the 2014 International Conference on Security and Management, pp. 71\u201375 (2014)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Lohr, H., Sadeghi, A., Winandy, M.: Patterns for secure boot and secure storage in computer systems. In: Proceedings of the 10th International Conference on Availability, Reliability, and Security, pp. 569\u2013573 (2010)","DOI":"10.1109\/ARES.2010.110"},{"key":"2_CR4","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65\u201371. IEEE Press, New York (1997)"},{"key":"2_CR5","unstructured":"Bulygin, Y., Furtak, A., Bazhaniuk, O.: A Tale of one software bypass of Windows 8 secure boot. In: Proceedings of Black Hat, USA (2013)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Kostiainen, K., Reshetova, E., Ekberg, J., Asokan, N.: Old, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY 2011), pp. 13\u201324. ACM, New York (2011)","DOI":"10.1145\/1943513.1943517"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: a comprehensive security assessment. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 35\u201344. IEEE Press, New York (2010)","DOI":"10.1109\/MSP.2010.2"},{"key":"2_CR8","unstructured":"Gostev, A.: Mobile malware evolution: an overview (2001). http:\/\/www.viruslist.com\/en\/analysis?pubid=200119916"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"King, S., Chen, P., Wang, Y., Verbowski, C., Wang, H., Lorch, J.: SubVirt: implementing malware with virtual machines. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 314\u2013327. IEEE Press, New York (2006)","DOI":"10.1109\/SP.2006.38"},{"key":"2_CR10","unstructured":"Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: a survey of current Android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 10. USENIX Association, Berkeley, CA, USA (2011)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Dietrich, K., Winter, J.: Secure boot revisited. In: Proceedings of the International Conference for Young Computer Scientists, pp. 2360\u20132365 (2008)","DOI":"10.1109\/ICYCS.2008.535"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hendricks, J., van Doorn, L.: Secure bootstrap is not enough: shoring up the trusted computing base. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop. ACM, New York (2004). Article 11","DOI":"10.1145\/1133572.1133600"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Bethesda, Maryland, USA (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"2_CR14","unstructured":"Agrawal, A.: Android application security part 3-Android application fundamentals (2015). https:\/\/manifestsecurity.com\/android-application-security-part-3\/"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.-R., Shastry, B.: Practical and lightweight domain isolation on Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, Illinois, USA (2011)","DOI":"10.1145\/2046614.2046624"},{"key":"2_CR16","unstructured":"Chen, Q.A., Qian, Z., Mao, Z.M.: Peeking into your app without actually seeing it: UI state inference and novel Android attacks. In: Proceedings of the 23rd USENIX Conference on Security Symposium, San Diego, CA (2014)"},{"key":"2_CR17","unstructured":"Elenkov, N.: Android explorations: using KitKat verified boot (2014). http:\/\/nelenkov.blogspot.com.au\/2014\/05\/using-kitkat-verified-boot.html. Accessed 22 Sept. 2016"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Things. IoT Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47063-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T07:52:17Z","timestamp":1617263537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47063-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470627","9783319470634"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47063-4_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoT360","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Internet of Things Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iot3602015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}