{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:17:13Z","timestamp":1743052633652,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030975319"},{"type":"electronic","value":"9783030975326"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97532-6_2","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T06:03:46Z","timestamp":1645509826000},"page":"23-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DyPolDroid: Protecting Users and\u00a0Organizations from\u00a0Permission-Abuse Attacks in\u00a0Android"],"prefix":"10.1007","author":[{"given":"Carlos E.","family":"Rubio-Medrano","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Luis M.","family":"Claramunt","sequence":"additional","affiliation":[]},{"given":"Jaejong","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"2_CR1","unstructured":"ZDNet: Play store identified as main distribution vector for most android malware (2020). https:\/\/www.zdnet.com\/article\/play-store-identified-as-main-distribution-vector-for-most-android-malware\/"},{"key":"2_CR2","unstructured":"The New York Times: The Lesson We\u2019re Learning From TikTok? It\u2019s All About Our Data (2020). https:\/\/www.nytimes.com\/2020\/08\/26\/technology\/personaltech\/tiktok-data-apps.html"},{"key":"2_CR3","unstructured":"Wired: A barcode scanner app with millions of downloads goes rogue (2020). https:\/\/www.wired.com\/story\/barcode-scanner-app-millions-downloads-goes-rogue\/"},{"key":"2_CR4","unstructured":"Android Authority: Report: Hundreds of apps have hidden tracking software used by the government (2020). https:\/\/www.androidauthority.com\/government-tracking-apps-1145989\/"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Shao, Y., Ott, J., Chen, Q.A., Qian, Z., Mao, Z.: Kratos: discovering inconsistent security policy enforcement in the android framework. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), January 2016","DOI":"10.14722\/ndss.2016.23046"},{"key":"2_CR6","unstructured":"Sunday Express: Android\u2019s biggest issue is far worse than we ever imagined, new research proves (2020). https:\/\/www.express.co.uk\/life-style\/science-technology\/1362551\/Android-Google-Play-Store-malware-problem-researc"},{"key":"2_CR7","unstructured":"PC Magazine: Android Users Need to Manually Remove These 16 Infected Apps (2020). https:\/\/www.pcmag.com\/news\/android-users-need-to-manually-remove-these-17-infected-apps"},{"key":"2_CR8","unstructured":"Google: Android Enterprise (2021). https:\/\/www.android.com\/enterprise\/"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TIFS.2019.2950134","volume":"15","author":"A Arora","year":"2020","unstructured":"Arora, A., Peddoju, S.K., Conti, M.: PermPair: android malware detection using permission pairs. IEEE Trans. Inf. Forensics Secur. 15, 1968\u20131982 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR10","unstructured":"Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: a survey of current android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, Series WOOT 2011. USENIX Association, USA, p. 10 (2011)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Zachariah, R., Akash, K., Yousef, M.S., Chacko, A.M.: Android malware detection a survey. In: 2017 IEEE International Conference on Circuits and Systems (ICCS), pp. 238\u2013244 (2017)","DOI":"10.1109\/ICCS1.2017.8325997"},{"key":"2_CR12","unstructured":"Hill, M., Rubio-Medrano, C.E.: DyPolDroid Github Repository (2021). https:\/\/github.com\/sefcom\/DyPolDroid"},{"key":"2_CR13","unstructured":"IEEE: The 6th IEEE European symposium on security and privacy (2021). http:\/\/www.ieee-security.org\/TC\/EuroSP2021\/"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Series CCS 2011, pp. 627\u2013638. ACM, New York (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, New York (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ramachandran, S., et al.: Understanding and granting android permissions: a user survey. In: 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136 (2017)","DOI":"10.1109\/CCST.2017.8167834"},{"key":"2_CR17","unstructured":"Google: Permissions on android (2021). https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Enck, W.: Analysis of access control enforcement in android. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, Series SACMAT 2020, pp. 117\u2013118. ACM, New York (2020)","DOI":"10.1145\/3381991.3395396"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Permission evolution in the android ecosystem. In: Proceedings of the 28th Annual Computer Security Applications Conference, Series ACSAC 2012, pp. 31\u201340. ACM, New York (2012)","DOI":"10.1145\/2420950.2420956"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Wang, H., Guo, Y., Tang, Z., Bai, G., Chen, X.: Reevaluating android permission gaps with static and dynamic analysis. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417621"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Calciati, P., Gorla, A.: How do apps evolve in their permission requests? a preliminary study. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 37\u201341 (2017)","DOI":"10.1109\/MSR.2017.64"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Wu, S., Liu, J.: Overprivileged permission detection for android applications. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2019)","DOI":"10.1109\/ICC.2019.8761572"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., Massacci, F.: Stadyna: addressing the problem of dynamic code updates in the security analysis of android applications. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 37\u201348. ACM, New York (2015)","DOI":"10.1145\/2699026.2699105"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Vetting undesirable behaviors in android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, Series CCS 2013, pp. 611\u2013622. ACM, New York (2013)","DOI":"10.1145\/2508859.2516689"},{"key":"2_CR25","unstructured":"OASIS Standard: eXtensible Access Control Markup Language (XACML) Version 3.0, 22 January 2013. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1945023.1945039","volume":"45","author":"DY Zhu","year":"2011","unstructured":"Zhu, D.Y., Jung, J., Song, D., Kohno, T., Wetherall, D.: TaintEraser: protecting sensitive data leaks using application-level taint tracking. SIGOPS Oper. Syst. Rev. 45(1), 142\u2013154 (2011)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Series PLDI 2014, pp. 259\u2013269. ACM, New York (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Slavin, R., et al.: Toward a framework for detecting privacy policy violations in android application code. In: Proceedings of the 38th International Conference on Software Engineering, Series ICSE 2016, pp. 25\u201336, New York (2016)","DOI":"10.1145\/2884781.2884855"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Dawoud, A., Bugiel, S.: DroidCap: OS support for capability-based permissions in android. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23398"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Zungur, O., Suarez-Tangil, G., Stringhini, G., Egele, M.: BorderPatrol: securing BYOD using fine-grained contextual information. In: 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2019)","DOI":"10.1109\/DSN.2019.00054"},{"key":"2_CR31","unstructured":"Drupal: Xposed Module Repository (2021). https:\/\/repo.xposed.info\/"},{"key":"2_CR32","unstructured":"Gasparis, I., Qian, Z., Song, C., Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: 26th USENIX Security Symposium. Vancouver, BC: USENIX Association, pp. 1129\u20131144, August 2017. https:\/\/www.usenix.org\/Conf.\/usenixsecurity17\/technical-sessions\/presentation\/gasparis"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Diamantaris, M., Papadopoulos, E.P., Markatos, E.P., Ioannidis, S., Polakis, J.: REAPER: real-time app analysis for augmenting the android permission system, Series CODASPY 2019, pp. 37\u201348. ACM, New York (2019)","DOI":"10.1145\/3292006.3300027"},{"key":"2_CR34","unstructured":"Backes, M., Bugiel, S., Derr, E., McDaniel, P., Octeau, D., Weisgerber, S.: On demystifying the android application framework: Re-visiting android permission specification analysis. In: Proceedings of the 25th USENIX Conference on Security Symposium, Series SEC 2016, pp. 1101\u20131118 (2016)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: PScout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, Series CCS 2012, pp. 217\u2013228, New York (2012)","DOI":"10.1145\/2382196.2382222"}],"container-title":["Communications in Computer and Information Science","Secure Knowledge Management In The Artificial Intelligence Era"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97532-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T06:04:07Z","timestamp":1645509847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97532-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030975319","9783030975326"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97532-6_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SKM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Secure Knowledge Management In Artificial Intelligence Era","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Antonio, TX","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"skm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.secure-km.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}