{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:05:50Z","timestamp":1729638350169,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icc.2013.6655583","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:26Z","timestamp":1384208546000},"page":"6123-6127","source":"Crossref","is-referenced-by-count":5,"title":["Two vulnerabilities in Android OS kernel"],"prefix":"10.1109","author":[{"given":"Xiali","family":"Hei","sequence":"first","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proc of the 9th USENIX Symp on the USENIX Symp on Operating Systems Design and Implementation (OSDI)","article-title":"Taintdroid: An information- flow tracking system for realtime privacy monitoring on smartphones","year":"2010","author":"enck","key":"19"},{"journal-title":"BlackHat Abu Dhabi 2010","article-title":"Building android sandcastles in android's sandbox","year":"2010","key":"35"},{"journal-title":"Apple App Store","year":"0","key":"17"},{"key":"36","first-page":"17","article-title":"Soundcomber: A stealthy and context-aware sound trojan for smartphones","author":"schlegel","year":"2011","journal-title":"Proc of the 18th Annual Network and Distributed System Security Symp (NDSS)"},{"journal-title":"Proc of the 18th Annual Network and Distributed System Security Symp NDSS'11","article-title":"PIOS: Detecting privacy leaks in IOS applications","year":"2011","author":"egele","key":"18"},{"key":"33","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/54289.871709","article-title":"The confused deputy: Or why capabilities might have been invented","volume":"22","author":"hardy","year":"1988","journal-title":"SIGOPS Oper Syst Rev"},{"key":"15","first-page":"1","article-title":"Static analysis of executables for collaborative malware detection on android. In communications, 2009","author":"schmidt","year":"2009","journal-title":"ICC'09 IEEE Intl Conf on Communications"},{"journal-title":"BlackHat USA 2010","article-title":"These aren't the permissions you're looking for","year":"2010","author":"lineberry","key":"34"},{"key":"16","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","article-title":"Taming information-stealing smartphone applications (on android)","author":"zhou","year":"2011","journal-title":"Proc of the 4th Intl Conf on Trust and Trustworthy Computing TRUST'11"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"journal-title":"CoRR","article-title":"Google android: A stateof- The-art review of security mechanisms","year":"2009","author":"shabtai","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21599-5_7","article-title":"Taming information-stealing smartphone applications (on android)","author":"zhou","year":"2011","journal-title":"Proc of the 4th Intl Conf on Trust and Trustworthy Computing TRUST'11"},{"journal-title":"App Attack-Surviving the Explosive Growth of Mobile Apps","year":"0","author":"mahaffey","key":"20"},{"journal-title":"IPhone Stored Location in Test Even If Disabled","year":"0","key":"22"},{"key":"23","first-page":"13","article-title":"Would you mind forking this process? a denial of service attack on android (and some countermeasures)","volume":"376","author":"armando","year":"2012","journal-title":"IFIP SEC 2012 27th International Information Security and Privacy Conf"},{"year":"0","key":"24"},{"journal-title":"Rooting the Droid without Rsdlite","year":"2010","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.003"},{"journal-title":"Root Any Android Device and Samsung Captivate with Super One-click App","year":"2010","author":"waqas","key":"27"},{"year":"0","key":"28"},{"journal-title":"DroidDream Becomes Android Market Nightmare","year":"2011","author":"bradley","key":"29"},{"journal-title":"Gartner Group","year":"2011","key":"3"},{"journal-title":"Worldwide Smartphone 2012-2016 Forecast and Analysis","year":"0","key":"2"},{"key":"10","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","article-title":"Privilege escalation attacks on android","author":"davi","year":"2011","journal-title":"Information Security"},{"year":"0","key":"1"},{"journal-title":"20th USENIX Security Symp","article-title":"Quire: Lightweight provenance for smartphone operating systems","year":"2011","author":"dietz","key":"30"},{"key":"7","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1145\/1755688.1755732","article-title":"Apex: Extending android permission model and enforcement with user-defined runtime constraints","author":"nauman","year":"2010","journal-title":"Proc of the 5th ACM Symp on Information Computer and Communications Security ASIACCS'10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"journal-title":"Android Trojan Captures Credit Card Details","year":"2011","author":"halfacree","key":"32"},{"journal-title":"SCanDroid Automated Security Certification of Android Applications","year":"0","author":"fuchs","key":"5"},{"journal-title":"Technical Report NAS-TR-0094-2008","article-title":"Mitigating android software misuse before it happens","year":"2008","author":"enck","key":"31"},{"key":"4","first-page":"21","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"Proc of the 20th USENIX Conf on Security SEC'11"},{"journal-title":"Technical Report TR- 2011-04 Technische Univ Darmstadt","article-title":"Xmandroid: A new android evolution to mitigate privilege escalation attacks","year":"2011","author":"bugiel","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"}],"event":{"name":"ICC 2013 - 2013 IEEE International Conference on Communications","start":{"date-parts":[[2013,6,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637584\/6654691\/06655583.pdf?arnumber=6655583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T13:15:46Z","timestamp":1564665346000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6655583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icc.2013.6655583","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}