{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:28Z","timestamp":1759332628822,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_45","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"506-516","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hobson\u2019s Choice: Security and Privacy Permissions in Android and iOS Devices"],"prefix":"10.1007","author":[{"given":"John","family":"Haggerty","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Hughes-Roberts","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Hegarty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"45_CR1","unstructured":"Apvrille, A., Nigam, R.: Obfuscation in Android malware, and how to fight back. Virus Bull. pp. 1\u201310 (2014)"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Batyuk, L., Herpich, M., Camtepe, S.A., Raddatz, K., Schmidt, A.D., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In: Proceedings of the 6th International Conference on Malicious and Unwanted Software, 18\u201319 Oct 2011, Fajardo, Puerto Rico, pp. 66\u201372 (2011)","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"45_CR3","unstructured":"Delac, G., Silic, M., Krolo, J.: Emerging security threats for mobile platforms. In: Proceedings of MIPRO 2011, 23\u201327 May 2011, Opatija, Croatia, pp. 1468\u20131473 (2011)"},{"key":"45_CR4","unstructured":"Erturk, E.: A Case study in open source software security and privacy: android adware. In: Proceedings of the World Congress on Internet Security, 10\u201312 June 2012, Ontario, Canada, pp. 189\u2013191 (2012)"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Fazeen, M., Dantu, R.: Another free app: does it have the right intentions? In: Proceedings of the 12th Annual Conference on Privacy, Security and Trust, 23\u201324 July 2014, Toronto, Canada, pp. 283\u2013289 (2014)","DOI":"10.1109\/PST.2014.6890950"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Frank, M., Dong, B., Porter Felt, A., Song, D.: Mining permission request patterns from android and facebook applications. In: Proceedings of the 12th International Conference on Data Mining, 10\u201313 Dec 2012, Brussels, Belgium, pp. 870\u2013875 (2012)","DOI":"10.1109\/ICDM.2012.86"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, D., Joshi, A., Finin, T., Jagtap, P.: Privacy control in smart phones using semantically rich reasoning and context modeling. In: Proceedings of the Symposium on Security and Privacy Workshops, 24\u201325 May 2012, San Francisco, CA, USA, pp. 82\u201385 (2012)","DOI":"10.1109\/SPW.2012.27"},{"key":"45_CR8","unstructured":"Google: Using OAuth 2.0 for server to server applications. https:\/\/developers.google.com\/accounts\/docs\/OAuth2ServiceAccount (Accessed on Feb 10, 2015)"},{"key":"45_CR9","unstructured":"IDC (International Data Corporation): Smartphone OS Market Share, Q3 2014. (2015) http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp (Accessed on Feb 10, 2015)"},{"key":"45_CR10","unstructured":"Madden, D.: BBC internet blog - BBC iPlayer android app update. (2012) http:\/\/www.bbc.co.uk\/blogs\/legacy\/bbcinternet\/2012\/02\/bbc_iplayer_android_update.html (Accessed Feb 10, 2015)"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: Smartphone security evaluation the malware attack case. In: Proceedings of the International Conference on Security and Cryptography, 18\u201321 July 2011, Seville, Spain, pp. 25\u201336 (2011)","DOI":"10.5220\/0003446800250036"},{"key":"45_CR12","unstructured":"Felt, P.A., Egelman, S., Finifter, M., Akhawe, D., Wagner, D.: How to Ask for Permission. In: Proceedings of HotSec \u201812, 7 Aug 2012, Bellevue, WA, USA (2012)"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Felt, AP., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 17\u201321 Oct 2011, Chicago, IL, USA, pp. 3\u201314 (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"45_CR14","unstructured":"Luo, Y., Gu, D., Li, J.: Toward active and efficient privacy protection for android. In: Proceedings of the International Conference on Information Science and Technology, 23\u201325 March, 2013, Yangzhou, Jiangsu, China, pp. 925\u2013929 (2013)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:23:35Z","timestamp":1748521415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}