{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:31:47Z","timestamp":1763641907324,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319175324"},{"type":"electronic","value":"9783319175331"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17533-1_26","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T12:50:20Z","timestamp":1428497420000},"page":"378-392","source":"Crossref","is-referenced-by-count":5,"title":["IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication"],"prefix":"10.1007","author":[{"given":"Zhejun","family":"Fang","sequence":"first","affiliation":[]},{"given":"Qixu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Category:input validation on owasp, \n                        https:\/\/www.owasp.org\/index.php\/Category:Input_Validation"},{"key":"26_CR2","unstructured":"Grace, M., Zhou, Y., Wang, Z., et al.: Systematic detection of capability leaks in stock Android smartphones. In: NDSS (2012)"},{"key":"26_CR3","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., et al.: Permission Re-Delegation: Attacks and Defenses. USENIX Security Symposium (2011)"},{"key":"26_CR4","unstructured":"Zhou, Y., Jiang, X.: Detecting Passive Content Leaks and Pollution in Android Applications. In: NDSS (2013)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., et al.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 229\u2013240 (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yin, H.: AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. In: Proceedings of the 21th Annual Network and Distributed System Security Symposium, NDSS 2014 (2014)","DOI":"10.14722\/ndss.2014.23255"},{"key":"26_CR7","unstructured":"Enck, W., Octeau, D., McDaniel, P., et al.: A Study of Android Application Security. In: USENIX security symposium (2011)"},{"key":"26_CR8","unstructured":"SDL Process: Implementation, \n                        http:\/\/www.microsoft.com\/security\/sdl\/process\/implementation.aspx"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Yang, K., Zhuge, J., Wang, Y., et al.: IntentFuzzer: detecting capability leaks of android applications. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 531\u2013536. ACM (2014)","DOI":"10.1145\/2590296.2590316"},{"key":"26_CR10","unstructured":"CVE-2013-6271: Security Advisory Curesec Research Team, \n                        http:\/\/dl.packetstormsecurity.net\/1311-advisories\/CURE-2013-1011.txt"},{"key":"26_CR11","unstructured":"Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: Automated security certification of Android applications Manuscript, Univ. of Maryland. Citeseer (2009), \n                        http:\/\/www.cs.umd.edu\/avik\/projects\/scandroidascaa"},{"key":"26_CR12","unstructured":"Mustafa, T., Sohr, K.: Understanding the Implemented Access Control Policy of Android System Services with Slicing and Extended Static Checking. Technical report, University of Bremen (2012)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"issue":"3","key":"26_CR14","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1002\/sec.747","volume":"7","author":"Z. Fang","year":"2014","unstructured":"Fang, Z., Zhang, Y., Kong, Y., et al.: Static detection of logic vulnerabilities in Java web applications Security and Communication Networks. Security and Communication Networks\u00a07(3), 519\u2013531 (2014)","journal-title":"Security and Communication Networks"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security & Privacy\u00a07, 50\u201357 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., et al.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228 (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., et al.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Berger, B.J., Sohr, K., Koschke, R.: Extracting and Analyzing the Implemented Security Architecture of Business Applications. In: 17th European Conference on Software Maintenance and Reengineering (CSMR), pp. 285\u2013294 (2013)","DOI":"10.1109\/CSMR.2013.37"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17533-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T07:27:29Z","timestamp":1676446049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17533-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319175324","9783319175331"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17533-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}