{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004581,"version":"3.40.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_3","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:46:15Z","timestamp":1736149575000},"page":"43-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps"],"prefix":"10.1007","author":[{"given":"Chen","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"3_CR1","unstructured":"42matters, Top 20 backend and cloud SDKs used in Android apps on Google Play, Zurich, Switzerland (42matters.com\/sdk-analysis\/top-backend-and-cloud-sdks), 2024."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, vol. 11(3), pp. 201\u2013213, 2014.","DOI":"10.1016\/j.diin.2014.04.003"},{"key":"3_CR3","unstructured":"AppBrain, AirPush: A push-notification mobile ad network, AppTornado, Zurich, Switzerland (www.appbrain.com\/stats\/libraries\/details\/airpush\/airpush), 2024."},{"key":"3_CR4","unstructured":"AppBrain, Welcome to AppBrain, AppTornado, Zurich, Switzerland (www.appbrain.com), 2024."},{"key":"3_CR5","unstructured":"S. Arzt, S. Rasthofer and E. Bodden, SuSi: A Tool for the Fully-Automated Classification of Android Sources and Sinks, Technical Report TUD-CS-2013-0114, Department of Computer Science, Technical University Darmstadt, Darmstadt, Germany, 2013."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau and P. McDaniel, FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps, ACM SIGPLAN Notices, vol. 49(6), pp. 259\u2013269, 2014.","DOI":"10.1145\/2666356.2594299"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"M. Backes, S. Bugiel, E. Derr, S. Gerling and C. Hammer, R-Droid: Leveraging Android app analysis with static slice optimization, Proceedings of the Eleventh ACM Asia Conference on Computer and Communications Security, pp. 129\u2013140, 2016.","DOI":"10.1145\/2897845.2897927"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"S. Calzavara, I. Grishchenko and M. Maffei, HornDroid: Practical and sound static analysis of Android applications by SMT solving, Proceedings of the IEEE European Symposium on Security and Privacy, pp. 47\u201362, 2016.","DOI":"10.1109\/EuroSP.2016.16"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"C. Cheng, C. Shi, N. Gong and Y. Guan, EviHunter: Identifying digital evidence in the permanent storage of Android devices via static analysis, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1338\u20131350, 2018.","DOI":"10.1145\/3243734.3243808"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. Cox, J. Jung, P. McDaniel and A. Sheth, TaintDroid: An information-flow tracking system for realtime privacy monitoring of smartphones, ACM Transactions on Computer Systems, vol. 32(3), article no. 5, 2014.","DOI":"10.1145\/2619091"},{"key":"3_CR11","unstructured":"W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri, A study of Android application security, Proceedings of the Twentieth USENIX Security Symposium, 2011."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"A. Feal, J. Gamba, N. Vallina-Rodriguez, P. Wijesekera, J. Reardon, S. Egelman and J. Tapiador, Don\u2019t accept candy from strangers: An analysis of third-party mobile SDKs, Proceedings of the Computers, Privacy and Data Protection Conference, pp. 1\u201327, 2021.","DOI":"10.5040\/9781509941780.ch-001"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"C. Gibler, J. Crussell, J. Erickson and H. Chen, AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale, Proceedings of the Fifth International Conference on Trust and Trustworthy Computing, pp. 291\u2013307, 2012.","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"3_CR14","unstructured":"Google Developers, UI\/Application Exerciser Monkey, Mountain View, California (developer.android.com\/studio\/test\/other-testing-tools\/monkey), 2022."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"M. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen and M. Rinard, Information flow analysis of Android applications in DroidSafe, Proceedings of the Twenty-Second Annual Network and Distributed System Security Symposium, 2015.","DOI":"10.14722\/ndss.2015.23089"},{"key":"3_CR16","unstructured":"International Data Corporation, Smartphone market insights, Needham, Massachusetts (www.idc.com\/prodserv\/smartphone-os-market-share.jsp), January 16, 2024."},{"key":"3_CR17","unstructured":"K. Kalleberg, Frida: Putting the open back into closed software, presented at the Open Source Developers Conference, 2015."},{"key":"3_CR18","unstructured":"J. Kim, Y. Yoon, K. Yi and J. Shin, ScanDal: Static analyzer for detecting privacy leaks in Android applications, poster presented at the Workshop on Mobile Security Technologies, 2012."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"L. Li, A. Bartel, T. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau and P. McDaniel, IccTA: Detecting inter-component privacy leaks in Android apps, Proceedings of the Thirty-Seventh IEEE\/ACM International Conference on Software Engineering, pp. 280\u2013291, 2015.","DOI":"10.1109\/ICSE.2015.48"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"M. Li, W. Wang, P. Wang, S. Wang, D. Wu, J. Liu, R. Xue and W. Huo, LibD: Scalable and precise third-party library detection in Android markets, Proceedings of the Thirty-Ninth IEEE\/ACM International Conference on Software Engineering, pp. 335\u2013346, 2017.","DOI":"10.1109\/ICSE.2017.38"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"X. Lin, T. Chen, T. Zhu, K. Yang and F. Wei, Automated forensic analysis of mobile applications on Android devices, Digital Investigation, vol. 26(S), pp. S59\u2013S66, 2018.","DOI":"10.1016\/j.diin.2018.04.012"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"L. Lu, Z. Li, Z. Wu, W. Lee and G. Jiang, CHEX: Statically vetting Android apps for component hijacking vulnerabilities, Proceedings of the ACM Conference on Computer and Communications Security, pp. 229\u2013240, 2012.","DOI":"10.1145\/2382196.2382223"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Z. Ma, H. Wang, Y. Guo and X. Chen, LibRadar: Fast and accurate detection of third-party libraries in Android apps, Proceedings of the Thirty-Eighth IEEE\/ACM International Conference on Software Engineering, pp. 653\u2013656, 2016.","DOI":"10.1145\/2889160.2889178"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"C. Shi, C. Cheng and Y. Guan, LibDroid: Summarizing information flow of Android native libraries via static analysis, Forensic Science International: Digital Investigation, vol. 42(S), article no. 301405, 2022.","DOI":"10.1016\/j.fsidi.2022.301405"},{"key":"3_CR25","unstructured":"R. Stevens, C. Gibler, J. Crussell, J. Erickson and H. Chen, Investigating user privacy in Android ad libraries, Proceedings of the Workshop on Mobile Security Technologies, pp. 195\u2013197, 2012."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"M. Sun, T. Wei and J. Lui, TaintART: A practical multi-level information flow tracking system for Android RunTime, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 331\u2013342, 2016.","DOI":"10.1145\/2976749.2978343"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"F. Wei, S. Roy, X. Ou and Robby, Amandroid: A precise and general inter-component data flow analysis framework for security vetting of Android apps, ACM Transactions on Privacy and Security, vol. 21(3), article no. 14, 2018.","DOI":"10.1145\/3183575"},{"key":"3_CR28","unstructured":"L. Xue, Y. Zhou, T. Chen, X. Luo and G. Gu, Malton: Towards on-device non-invasive mobile malware analysis for ART, Proceedings of the Twenty-Sixth USENIX Security Symposium, pp. 289\u2013306, 2017."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Z. Yang and M. Yang, LeakMiner: Detecting information leakage on Android with static taint analysis, Proceedings of the Third World Congress on Software Engineering, pp. 101\u2013104, 2012.","DOI":"10.1109\/WCSE.2012.26"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning and X. Wang, AppIntent: Analyzing sensitive data transmission in Android for privacy leakage detection, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1043\u20131054, 2013.","DOI":"10.1145\/2508859.2516676"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"J. Zhang, A. Beresford and S. Kollmann, LibID: Reliable identification of obfuscated third-party Android libraries, Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 55\u201365, 2019.","DOI":"10.1145\/3293882.3330563"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:15:08Z","timestamp":1745320508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}