{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:06:26Z","timestamp":1748577986905,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_34","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"379-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System"],"prefix":"10.1007","author":[{"given":"Shancang","family":"Li","sequence":"first","affiliation":[]},{"given":"Junhua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Spyridopoulos","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Andriotis","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Ludwiniak","sequence":"additional","affiliation":[]},{"given":"Gordon","family":"Russell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"34_CR1","unstructured":"Chen, J.: Realtime monitoring of private data abuses in android system. M.Sc. Thesis, University of Bristol, September 2014"},{"key":"34_CR2","unstructured":"Ong, J.: Report: android reached record 85% smartphone market share in Q2 (2014). Xiaomi now fifth-largest vendor. http:\/\/thenextweb.com\/google\/2014\/07\/31\/android-reached-record-85-smartphone-market-share-q2-2014-report\/ (2014). Accessed 4 August 2014"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Singh, K., Jiang, X.: Owner-centric protection of unstructured data on smartphones. In: Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST 2014), Crete, Greece, June 2014","DOI":"10.1007\/978-3-319-08593-7_4"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, W., Wang, Z., Zhou, Y., Jiang, X.: DIVILAR: diversifying intermediate language for anti-repackaging on android platform. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), San Antonio, TX, March 2014","DOI":"10.1145\/2557547.2557558"},{"key":"34_CR5","unstructured":"Kelly, J.: Report: 97% Of mobile malware is on android. This is the easy way you stay safe. http:\/\/www.forbes.com\/sites\/gordonkelly\/2014\/03\/24\/report-97-of-mobile-malware-is-on-android-this-is-the-easy-way-you-stay-safe\/ (2014). Accessed 4 August 2014"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Tang, W., Jin, G., He, J., Jiang, X.: Extending android security enforcement with a security distance model. In: IEEE 2011 International Conference on Internet Technology and Applications (iTAP), pp. 1\u20134 (2011)","DOI":"10.1109\/ITAP.2011.6006288"},{"key":"34_CR7","unstructured":"Google play: clueful privacy advisor. Available from: https:\/\/play.google.com\/store\/apps\/ (2014). Accessed 22 July 2014"},{"key":"34_CR8","unstructured":"Google play.: privacy scanner (Antispy) free. Available from: https:\/\/play.google.com\/store\/apps\/details?id=net.hobbyapplications.privacyscanner (2014). Accessed 24 July 2014"},{"key":"34_CR9","unstructured":"Androids permissions system is broken and google just made it worse. Available from: http:\/\/www.howtogeek.com\/177904\/androids-permissions-system-is-broken-and-google-just-made-it-worse\/ (2015). Accessed 15 February 2015"},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TDSC.2013.58","volume":"11","author":"CS Gates","year":"2014","unstructured":"Gates, C.S., Chen, J., Li, N., Proctor, R.W.: Effective risk communication for android apps. IEEE Trans. Dependable Secur. Comput. 11(3), 252\u2013265 (2014)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"34_CR11","unstructured":"Mobile safe. Available from: https:\/\/play.google.com\/store\/apps\/details?id=com.qihoo360.mobilesafe (2014). Accessed 1 September 2014"},{"key":"34_CR12","unstructured":"Gargenta, A.: Deep Dive into android IPC binder framework at android builders summit. Available from: http:\/\/events.linuxfoundation.org\/images\/stories\/slides\/abs2013_gargentas.pdf (2013). Accessed 26 April 2014"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Jiang, D., Fu, X., Song, M., Cui, Y: A security assessment method for android applications based on permission model. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), vol. 2, pp. 701\u2013705 (2012)","DOI":"10.1109\/CCIS.2012.6664265"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Kuzuno, H., Tonami, S.: Signature generation for sensitive information leakage in android applications. In: 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp. 112\u2013119 (2013)","DOI":"10.1109\/ICDEW.2013.6547438"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Wei, T.E., Jeng, A.B., Lee, H.M., Chen, C.H., Tien, C.W.: Android privacy. In: 2012 IEEE International Conference onIn Machine Learning and Cybernetics (ICMLC), vol. 5, pp. 1830\u20131837 (2012)","DOI":"10.1109\/ICMLC.2012.6359654"},{"issue":"3","key":"34_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2014.6766089","volume":"52","author":"L Wu","year":"2014","unstructured":"Wu, L., Du, X., Fu, X.: Security threats to mobile multimedia applications: camera-based attacks on mobile phones. IEEE Commun. Mag. 52(3), 80\u201387 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"34_CR17","unstructured":"Cannon, T: Android data stealing vulnerability. Available from: http:\/\/thomascannon.net\/blog\/2010\/11\/android-data-stealing-vulnerability\/ (2010). Accessed 11 April 2014"},{"key":"34_CR18","unstructured":"Jiang, X.: Android 2.3 (Gingerbread) data stealing vulnerability. Available from: http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/nexuss.html (2011). Accessed 11 April 2014"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:23:49Z","timestamp":1748521429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}