{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1361699995586771200.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1007/978-3-642-18178-8_30"}},{"identifier":{"@type":"URI","@value":"http://link.springer.com/content/pdf/10.1007/978-3-642-18178-8_30"}}],"dc:title":[{"@value":"Privilege Escalation Attacks on Android"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1381699995586771203","@type":"Researcher","foaf:name":[{"@value":"Lucas Davi"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699995586771201","@type":"Researcher","foaf:name":[{"@value":"Alexandra Dmitrienko"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699995586771200","@type":"Researcher","foaf:name":[{"@value":"Ahmad-Reza Sadeghi"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699995586771202","@type":"Researcher","foaf:name":[{"@value":"Marcel Winandy"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"03029743"},{"@type":"EISSN","@value":"16113349"},{"@type":"ISBN","@value":"9783642181771"},{"@type":"ISBN","@value":"9783642181788"}],"prism:publicationName":[{"@value":"Lecture Notes in Computer Science"}],"dc:publisher":[{"@value":"Springer Berlin Heidelberg"}],"prism:publicationDate":"2011","prism:startingPage":"346","prism:endingPage":"360"},"reviewed":"false","dc:rights":["http://www.springer.com/tdm"],"url":[{"@id":"http://link.springer.com/content/pdf/10.1007/978-3-642-18178-8_30"}],"createdAt":"2011-01-15","modifiedAt":"2019-06-07","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360004230296789120","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"PaddyFrog: systematically detecting confused deputy vulnerability in Android applications"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1007/978-3-642-18178-8_30"},{"@type":"CROSSREF","@value":"10.1002/sec.1179_references_DOI_KSqKUfFdd3eAtdz03fNroynOWmO"}]}