{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:18Z","timestamp":1725845658633},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_24","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"341-353","source":"Crossref","is-referenced-by-count":1,"title":["DroidTest: Testing Android Applications for Leakage of Private Information"],"prefix":"10.1007","author":[{"given":"Sarker T.","family":"Ahmed Rumee","sequence":"first","affiliation":[]},{"given":"Donggang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"24_CR1","unstructured":"Analysis of appverification tool from google. \n                      http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/appverify\/"},{"key":"24_CR2","unstructured":"Contagio mobile malware mini dump. \n                      http:\/\/contagiominidump.blogspot.com\/"},{"key":"24_CR3","unstructured":"Junit. \n                      http:\/\/junit.sourceforge.net\/"},{"key":"24_CR4","unstructured":"Malware data set. \n                      http:\/\/www.malgenomeproject.org\/policy.html"},{"key":"24_CR5","unstructured":"Official android marketplace: Google play. \n                      https:\/\/play.google.com\/"},{"key":"24_CR6","unstructured":"Robotium. \n                      http:\/\/code.google.com\/p\/robotium\/"},{"key":"24_CR7","unstructured":"Survey on smartphone users. \n                      http:\/\/www.engadget.com\/2012\/05\/07\/nielsen-smartphone-share-march-2012\/"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Beresford, A., Rice, A., Skehin, N., Sohan, R.: Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pp. 49\u201354. ACM (2011)","DOI":"10.1145\/2184489.2184500"},{"key":"24_CR9","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: Pios: detecting privacy leaks in ios applications. In: Proceedings of the Network and Distributed System Security Symposium (2011)"},{"key":"24_CR10","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136 (2010)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 3. ACM (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"24_CR14","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Procedings of the USENIX Conference on Web Application Development (2011)"},{"key":"24_CR15","unstructured":"Fuchs, A., Chaudhuri, A., Foster, J.: Scandroid: automated security certification of android applications. Manuscript, Univ. of Maryland (2009). \n                      http:\/\/www.cs.umd.edu\/~avik\/projects\/scandroidascaa"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: ACM Sigplan Notices, vol. 40, pp. 213\u2013223. ACM (2005)","DOI":"10.1145\/1064978.1065036"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 639\u2013652. ACM (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Hu, C., Neamtiu, I.: Automating gui testing for android applications. In: Proceedings of the 6th International Workshop on Automation of Software Test, pp. 77\u201383. ACM (2011)","DOI":"10.1145\/1982595.1982612"},{"key":"24_CR20","unstructured":"Kim, J., Yoon, Y., Yi, K., Shin, J., Center, S.: Scandal: static analyzer for detecting privacy leaks in android applications. In Proc. of the MoST (2012)"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"K. Sen, D. Marinov, G. Agha.: CUTE: a concolic unit testing engine for C. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, vol. 30, pp. 263-272 (2005)","DOI":"10.1145\/1081706.1081750"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"24_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","volume-title":"Trust and Trustworthy Computing","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93\u2013107. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:38:34Z","timestamp":1559356714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}