{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:30:15Z","timestamp":1729611015656,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cns.2016.7860472","type":"proceedings-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T19:32:43Z","timestamp":1487878363000},"page":"73-81","source":"Crossref","is-referenced-by-count":0,"title":["On-chip system call tracing: A feasibility study and open prototype"],"prefix":"10.1109","author":[{"family":"Chengyu Zheng","sequence":"first","affiliation":[]},{"given":"Mila Dalla","family":"Preda","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Granjal","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076790"},{"key":"ref11","first-page":"287","article-title":"Bareclou d: bare-metal analysis-based evasive malware detection","author":"kirat","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818036"},{"key":"ref14","first-page":"86","article-title":"A fistful of red-pills: How to automatically generate procedures to detect cpu emulators","volume":"41","author":"paleari","year":"2009","journal-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT)"},{"journal-title":"Cortex-A9 Technical Reference Manual","year":"0","key":"ref15"},{"journal-title":"Linux Cross Reference","year":"0","key":"ref16"},{"journal-title":"Android hehe Malware now disconnects phone calls","year":"0","key":"ref17"},{"journal-title":"F-Secure Android pincer a","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-319-11379-1_6","article-title":"Unsupervised anomaly-based malware detection using hardware features","author":"tang","year":"2014","journal-title":"Research in Attacks Intrusions and Defenses"},{"journal-title":"Tracedroid","year":"2015","author":"der veen","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref6","first-page":"569","article-title":"Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis","author":"yan","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"journal-title":"Security predictions The fine line","year":"0","key":"ref2"},{"journal-title":"Smartphone OS Market Share","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"journal-title":"Lo-phi Low-observable physical host instrumentation for malware analysis","year":"2016","author":"spensky","key":"ref20"}],"event":{"name":"2016 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2016,10,17]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7854080\/7860451\/07860472.pdf?arnumber=7860472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T21:17:13Z","timestamp":1568841433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7860472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cns.2016.7860472","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}