{"id":"https://openalex.org/W2064808983","doi":"https://doi.org/10.1109/icccn.2012.6289217","title":"A Smartphone Security Architecture for App Verification and Process Authentication","display_name":"A Smartphone Security Architecture for App Verification and Process Authentication","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2064808983","doi":"https://doi.org/10.1109/icccn.2012.6289217","mag":"2064808983"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2012.6289217","is_oa":true,"landing_page_url":"https://doi.org/10.1109/icccn.2012.6289217","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6289217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 21st International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6289217","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046219206","display_name":"Osman Ugus","orcid":null},"institutions":[{"id":"https://openalex.org/I70451448","display_name":"HAW Hamburg","ror":"https://ror.org/00fkqwx76","country_code":"DE","type":"education","lineage":["https://openalex.org/I70451448"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Osman Ugus","raw_affiliation_strings":["HAW Hamburg, Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"HAW Hamburg, Hamburg, Germany","institution_ids":["https://openalex.org/I70451448"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069382355","display_name":"Martin Landsmann","orcid":null},"institutions":[{"id":"https://openalex.org/I70451448","display_name":"HAW Hamburg","ror":"https://ror.org/00fkqwx76","country_code":"DE","type":"education","lineage":["https://openalex.org/I70451448"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Landsmann","raw_affiliation_strings":["HAW Hamburg, Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"HAW Hamburg, Hamburg, Germany","institution_ids":["https://openalex.org/I70451448"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080902885","display_name":"Dennis Gessner","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dennis Gessner","raw_affiliation_strings":["NEC Laboratories Europe, NEC Europe Limited, Heidelberg, Germany","NEC Labs. Eur., Heidelberg, Germany"],"affiliations":[{"raw_affiliation_string":"NEC Laboratories Europe, NEC Europe Limited, Heidelberg, Germany","institution_ids":[]},{"raw_affiliation_string":"NEC Labs. Eur., Heidelberg, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010820800","display_name":"Dirk Westhoff","orcid":null},"institutions":[{"id":"https://openalex.org/I70451448","display_name":"HAW Hamburg","ror":"https://ror.org/00fkqwx76","country_code":"DE","type":"education","lineage":["https://openalex.org/I70451448"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Dirk Westhoff","raw_affiliation_strings":["HAW Hamburg, Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"HAW Hamburg, Hamburg, Germany","institution_ids":["https://openalex.org/I70451448"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046219206"],"corresponding_institution_ids":["https://openalex.org/I70451448"],"apc_list":null,"apc_paid":null,"fwci":1.4691,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85413988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7128316760063171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7073799967765808},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6209383606910706},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.6031897664070129},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.584714949131012},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5743672251701355},{"id":"https://openalex.org/keywords/smartphone-app","display_name":"Smartphone app","score":0.5556577444076538},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.527838945388794},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4725266098976135},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.46615278720855713},{"id":"https://openalex.org/keywords/smartphone-application","display_name":"Smartphone application","score":0.4613267481327057},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4488166868686676},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3171711564064026},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2511093020439148},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.118695467710495}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7128316760063171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073799967765808},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6209383606910706},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.6031897664070129},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.584714949131012},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5743672251701355},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.5556577444076538},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.527838945388794},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4725266098976135},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46615278720855713},{"id":"https://openalex.org/C3020250448","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone application","level":2,"score":0.4613267481327057},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4488166868686676},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3171711564064026},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2511093020439148},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.118695467710495},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2012.6289217","is_oa":true,"landing_page_url":"https://doi.org/10.1109/icccn.2012.6289217","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6289217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 21st International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/icccn.2012.6289217","is_oa":true,"landing_page_url":"https://doi.org/10.1109/icccn.2012.6289217","pdf_url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6289217","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 21st International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2064808983.pdf","grobid_xml":"https://content.openalex.org/works/W2064808983.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1504669610","https://openalex.org/W1542792105","https://openalex.org/W1979755985","https://openalex.org/W2076317514","https://openalex.org/W2089067454","https://openalex.org/W2110022211","https://openalex.org/W2140911579","https://openalex.org/W2167956239","https://openalex.org/W2346059855","https://openalex.org/W2408322241","https://openalex.org/W6629953387","https://openalex.org/W6632544823","https://openalex.org/W6676302660","https://openalex.org/W6684330213","https://openalex.org/W6704656489","https://openalex.org/W6713900569"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W2755037920","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W3044207086","https://openalex.org/W2330898644"],"abstract_inverted_index":{"We":[0,62],"present":[1],"a":[2,13,29,56],"runtime":[3],"integrity":[4],"measurement":[5],"for":[6,71],"Linux-based":[7],"smartphones.":[8],"It":[9],"is":[10,68],"based":[11],"on":[12,28,41,86],"Mobile":[14],"Trusted":[15],"Module":[16],"(MTM)":[17],"with":[18,54],"the":[19,35,42,45,65,79],"objective":[20],"to":[21,39,76,84,90],"prevent":[22],"running":[23,49],"arbitrary":[24],"third-party":[25],"applications":[26],"(Apps)":[27],"smartphone.":[30,43],"Only":[31],"Apps":[32,50,82,93],"signed":[33],"by":[34],"MTM":[36],"are":[37,52,103],"allowed":[38,83],"run":[40,85],"Moreover,":[44],"proposed":[46,66],"architecture":[47],"inhibits":[48],"which":[51],"infected":[53],"e.g.":[55],"mobile":[57],"virus":[58],"after":[59,95],"their":[60,96],"installation.":[61],"believe":[63],"that":[64,92],"approach":[67],"useful":[69],"particularly":[70],"company":[72,101],"administrators":[73],"who":[74],"want":[75],"fully":[77],"control":[78],"list":[80],"of":[81],"employees'":[87],"smartphones":[88],"and":[89],"ensure":[91],"altered":[94],"installation":[97],"or":[98],"installed":[99],"without":[100],"permission":[102],"never":[104],"executed.":[105]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
