{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:08:48Z","timestamp":1748664528049,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243689"},{"type":"electronic","value":"9783319243696"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24369-6_1","type":"book-chapter","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T22:46:37Z","timestamp":1441925197000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis"],"prefix":"10.1007","author":[{"given":"Gianluca","family":"Barbon","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Ferrara","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[]},{"given":"Omer","family":"Tripp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,30]]},"reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. SIGPLAN Not. 49(6), 259\u2013269 (2014)","journal-title":"SIGPLAN Not."},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1571-0661(04)00290-7","volume":"59","author":"D Clark","year":"2002","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59(3), 1\u201314 (2002). Quantitative Aspects of Programming Languages (Satellite Event for PLI 2001)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.entcs.2004.01.018","volume":"112","author":"D Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. Electr. Notes Theor. Comput. Sci. 112, 149\u2013166 (2005)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-662-46081-8_4","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"A Cortesi","year":"2015","unstructured":"Cortesi, A., Ferrara, P., Pistoia, M., Tripp, O.: Datacentric semantics for verification of privacy policy compliance by mobile applications. In: D\u2019Souza, D., Lal, A., Larsen, K.G. (eds.) VMCAI 2015. LNCS, vol. 8931, pp. 61\u201379. Springer, Heidelberg (2015)"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cl.2010.09.001","volume":"37","author":"A Cortesi","year":"2011","unstructured":"Cortesi, A., Zanioli, M.: Widening and narrowing operators for abstract interpretation. Computer Languages, Systems & Structures 37(1), 24\u201342 (2011)","journal-title":"Computer Languages, Systems & Structures"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Conference Record of the Fourth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 238\u2013252. ACM Press (1977)","DOI":"10.1145\/512950.512973"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM 19, 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"5:1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 5:1\u20135:29 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"1_CR9","unstructured":"Enck, W., Octeau, D., Mcdaniel, P., Chaudhuri, S.: A study of android application security. In: Proc. USENIX Security Symposium (2011)"},{"key":"1_CR10","unstructured":"Fritz, C., Arzt, S., et al.: Highly precise taint analysis for android application. Technical report, EC SPRIDE Technical Report TUD-CS-2013-0113 (2013). http:\/\/www.bodden.de\/pubs\/TUD-CS-2013-0113.pdf"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security 8, 399\u2013422 (2009)","journal-title":"International Journal of Information Security"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications. In: Proc. 18th ACM Conf. on Computer and Communications Security, pp. 639\u2013652. ACM, New York (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"1_CR13","unstructured":"International Data Corporation. Worldwide Quarterly Mobile Phone Tracker 3q14. http:\/\/www.idc.com\/tracker\/showproductinfo.jsp?prod-id=37 (accessed January 2015)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Quantifying information flow In: Proc. IEEE Computer Security Foundations Workshop, pp. 18\u201331 (2002)","DOI":"10.1109\/CSFW.2002.1021804"},{"key":"1_CR15","unstructured":"McAfee Labs. Threats Report. http:\/\/www.mcafee.com\/ca\/resources\/reports\/rp-quarterly-threat-q3-2014.pdf (accessed December 2014)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Mccamant, S., Ernst, M.D.: A simulation-based proof technique fordynamic information flow (2007)","DOI":"10.1145\/1255329.1255336"},{"issue":"6","key":"1_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1379022.1375606","volume":"43","author":"S McCamant","year":"2008","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. SIGPLAN Not. 43(6), 193\u2013205 (2008)","journal-title":"SIGPLAN Not."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Lovat, E., Bodden, E.: Droidforce: enforcing complex, data-centric, system-wide policies in android. In: Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES). IEEE, September 2014","DOI":"10.1109\/ARES.2014.13"},{"key":"1_CR19","unstructured":"Russo, A., Sabelfeld, A., Li, K.: Implicit flows in malicious and nonmalicious code. In: Logics and Languages for Reliability and Security. NATO Science for Peace and Security Series, vol. 25, pp. 301\u2013322. IOS Press (2010)"},{"key":"1_CR20","unstructured":"Secure Software Engineering Group - Ec Spride. DroidBench. http:\/\/sseblog.ec-spride.de\/tools\/droidbench\/ (accessed February 2015)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Smith, G.: Principles of secure information flow analysis. In: Christodorescu, M., et al. (eds.) Malware Detection. Advances in Information Security, vol. 27, pp. 291\u2013307. Springer (2007)","DOI":"10.1007\/978-0-387-44599-1_13"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Sridharan, M., Artzi, S., Pistoia, M., Guarnieri, S., Tripp, O., Berg, R.: F4f: taint analysis of framework-based web applications. In: OOPSLA. ACM (2011)","DOI":"10.1145\/2048066.2048145"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Tripp, O., Ferrara, P., Pistoia, M.: Hybrid security analysis of web javascript code via dynamic partial evaluation. In: Proc. of the 2014 Int. Symposium on Software Testing and Analysis, ISSTA 2014, pp. 49\u201359. ACM, New York (2014)","DOI":"10.1145\/2610384.2610385"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: Taj: effective taint analysis of web applications. In: ACM PLDI, pp. 87\u201397. ACM (2009)","DOI":"10.1145\/1543135.1542486"},{"key":"1_CR25","unstructured":"Tripp, O., Rubin, J.: A bayesian approach to privacy enforcement in smartphones. In: USENIX Security (2014)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24369-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:08:52Z","timestamp":1748617732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24369-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243689","9783319243696"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24369-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}