{"id":"https://openalex.org/W2893610239","doi":"https://doi.org/10.15439/2018f11","title":"Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study","display_name":"Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study","publication_year":2018,"publication_date":"2018-09-26","ids":{"openalex":"https://openalex.org/W2893610239","doi":"https://doi.org/10.15439/2018f11","mag":"2893610239"},"language":"en","primary_location":{"id":"doi:10.15439/2018f11","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f11","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/11.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2018/drp/pdf/11.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011178945","display_name":"Mark Vella","orcid":"https://orcid.org/0000-0002-6483-9054"},"institutions":[{"id":"https://openalex.org/I197854408","display_name":"University of Malta","ror":"https://ror.org/03a62bv60","country_code":"MT","type":"education","lineage":["https://openalex.org/I197854408"]}],"countries":["MT"],"is_corresponding":true,"raw_author_name":"Mark Vella","raw_affiliation_strings":["Department of Computer Science University of Malta Msida, Malta"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science University of Malta Msida, Malta","institution_ids":["https://openalex.org/I197854408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068162378","display_name":"Vishwas Rudramurthy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vishwas Rudramurthy","raw_affiliation_strings":["Department Of Computer Science and Engineering Channabasaveshwara Institute Of Technology Gubbi, Tumkur, India"],"affiliations":[{"raw_affiliation_string":"Department Of Computer Science and Engineering Channabasaveshwara Institute Of Technology Gubbi, Tumkur, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011178945"],"corresponding_institution_ids":["https://openalex.org/I197854408"],"apc_list":null,"apc_paid":null,"fwci":0.6901,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66507937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"15","issue":null,"first_page":"607","last_page":"616"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6790496110916138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6790496110916138}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2018f11","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f11","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/11.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:b894bb451dbe4a66b5951a4143759d18","is_oa":true,"landing_page_url":"https://doaj.org/article/b894bb451dbe4a66b5951a4143759d18","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 15, Pp 607-616 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2018f11","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2018f11","pdf_url":"https://annals-csis.org/proceedings/2018/drp/pdf/11.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2893610239.pdf","grobid_xml":"https://content.openalex.org/works/W2893610239.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1536603413","https://openalex.org/W1972940696","https://openalex.org/W1994931937","https://openalex.org/W2095644778","https://openalex.org/W2109216626","https://openalex.org/W2135332490","https://openalex.org/W2199478250","https://openalex.org/W2229662347","https://openalex.org/W2400178892","https://openalex.org/W2594520840","https://openalex.org/W2615082125","https://openalex.org/W2700054830","https://openalex.org/W3123270410","https://openalex.org/W4205962651"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"Cloak-and-Dagger":[0],"attacks":[1],"targeting":[2],"Android":[3],"devices":[4],"can":[5,33,105,123],"completely":[6,48],"hijack":[7,104],"the":[8,41,94,103,110,114,117,136],"UI":[9],"feedback":[10],"loop,":[11],"with":[12],"one":[13],"possible":[14],"consequence":[15],"being":[16],"that":[17,31,51,112],"of":[18,27,96],"hijacking":[19],"SMS":[20,38],"functionality":[21],"for":[22,102],"cybercrime":[23],"purposes.":[24],"What":[25],"is":[26,30],"particular":[28],"concern":[29],"attackers":[32],"decouple":[34],"stealth":[35],"activities":[36],"from":[37,60],"hijacking.":[39],"Consequently":[40],"latter":[42],"could":[43],"be":[44,106,124],"pulled":[45],"off":[46],"using":[47,130],"legitimate":[49],"apps":[50],"normally":[52],"would":[53],"allow":[54],"users":[55],"to":[56,82,92],"manage":[57],"text":[58],"messages":[59],"their":[61],"personal":[62],"computers":[63],"(SMSonPC),":[64],"but":[65],"this":[66],"time":[67],"all":[68],"hidden":[69],"away":[70],"under":[71],"attacker":[72],"control.":[73],"This":[74],"work":[75],"proposes":[76],"a":[77,131],"digital":[78],"investigation":[79],"process":[80],"aiming":[81],"uncover":[83],"SMS-hijacked":[84],"devices.":[85],"It":[86],"uses":[87],"bytecode":[88],"instrumentation":[89],"in":[90],"order":[91],"force":[93],"dumping":[95],"volatile":[97],"memory":[98],"areas":[99],"where":[100],"evidence":[101],"located.":[107],"Eventually":[108],"both":[109],"malware":[111],"conceals":[113],"SMS-hijacking":[115],"and":[116],"compromised":[118],"or":[119],"smuggled":[120],"SMSonPC":[121,138],"app":[122],"identified.":[125],"Preliminary":[126],"results":[127],"are":[128],"presented":[129],"case":[132],"study":[133],"based":[134],"on":[135],"popular":[137],"app:":[139],"Pushbullet.":[140]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
