{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:39:26Z","timestamp":1743125966567,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_14","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"256-276","source":"Crossref","is-referenced-by-count":17,"title":["Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android"],"prefix":"10.1007","author":[{"given":"Vaibhav","family":"Rastogi","sequence":"first","affiliation":[]},{"given":"Zhengyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Jedidiah","family":"McClurg","sequence":"additional","affiliation":[]},{"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Apktool. Android-apktool: A tool for reengineering Android apk files. \n                    http:\/\/code.google.com\/p\/android-apktool\/"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: ACM PLDI (2014)","DOI":"10.1145\/2594291.2594299"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Balebako, R., Jung, J., Lu, W., Cranor, L.F., Nguyen, C.: Little brothers watching you: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 12. ACM (2013)","DOI":"10.1145\/2501604.2501616"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bell, J., Kaiser, G.E.: Phosphor: illuminating dynamic data flow in the jvm. In: OOPSLA (2014)","DOI":"10.1145\/2660193.2660212"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Beresford, A., Rice, A., Skehin, N., Sohan, R.: Mockdroid: trading privacy for application functionality on smartphones. In: HotMobile (2011)","DOI":"10.1145\/2184489.2184500"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Garner, R., Hoffmann, C., Khang, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D. Frampton, S.Z., Guyer, et al. :The dacapo benchmarks: Java benchmarking development and analysis. In: ACM Sigplan Notices, vol. 41, pp. 169\u2013190. ACM (2006)","DOI":"10.1145\/1167515.1167488"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Y., Fratantonio, Y., Bianchi, A., Egele, M., Kruegel, C., Vigna, G., Chen, Y.: Edgeminer: automatically detecting implicit control flow transitions through the android framework. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23140"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: ACSAC (2007)","DOI":"10.1109\/ACSAC.2007.37"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Davis, B., Chen, H.: Retroskeleton: retrofitting android apps. In: Mobisys (2013)","DOI":"10.1145\/2462456.2464462"},{"key":"14_CR10","unstructured":"Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic spyware analysis. In: Usenix ATC (2007)"},{"key":"14_CR11","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: Pios: detecting privacy leaks in ios applications. In: NDSS (2011)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: ACSAC (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"14_CR13","unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2010)"},{"key":"14_CR14","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: USENIX Security (2011)"},{"key":"14_CR15","unstructured":"Fuchs, A., Chaudhuri, A., Foster, J.: Scandroid: Automated security certification of android applications. Manuscript, Univ. of Maryland (2009). \n                    http:\/\/www.cs.umd.edu\/~avik\/projects\/scandroidascaa"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012)"},{"key":"14_CR17","unstructured":"Good. Mobile app containerization. \n                    http:\/\/www1.good.com\/secure-mobility-solution\/mobile-application-containerization"},{"key":"14_CR18","unstructured":"Haldar, V., Chandra, D., Franz, M.: Dynamic taint propagation for java. In: 21st Annual Computer Security Applications Conference (ACSAC). IEEE (2005)"},{"key":"14_CR19","unstructured":"Kang, M., McCamant, S., Poosankam, P., Song, D.: Dta++: dynamic taint analysis with targeted control-flow propagation. In: Proc. of NDSS (2011)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 501\u2013510. ACM (2012)","DOI":"10.1145\/2370216.2370290"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: CHEX: statically vetting android apps for component hijacking vulnerabilities. In: ACM CCS (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"14_CR22","unstructured":"MobileIron. Appconnect. \n                    http:\/\/www.mobileiron.com\/en\/products\/appconnect"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: ASIACCS (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"14_CR24","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: NDSS (2005)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H., Zhou, Y., Wu, Y.: Lift: a low-overhead practical information flow tracking system for detecting security attacks. In: IEEE MICRO (2006)","DOI":"10.1109\/MICRO.2006.29"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of ACM CODASPY (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Rosen, S., Qian, Z., Mao, Z.M.: Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 221\u2013232. ACM (2013)","DOI":"10.1145\/2435349.2435380"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Saxena, P., Sekar, R., Puranik, V.: Efficient fine-grained binary instrumentationwith applications to taint-tracking. In: IEEE\/ACM CGO (2008)","DOI":"10.1145\/1356058.1356069"},{"key":"14_CR29","unstructured":"Schlegel, R., Zhang, K., Zhou, X.-Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: NDSS, vol. 11, pp. 17\u201333 (2011)"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Schwartz, E., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: IEEE SP (2010)","DOI":"10.1109\/SP.2010.26"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Automatic reverse engineering of malware emulators. In: 2009 30th IEEE Symposium on Security and Privacy (2009)","DOI":"10.1109\/SP.2009.27"},{"key":"14_CR32","unstructured":"smali. Smali: An assembler\/disassembler for Android\u2019s dex format. \n                    http:\/\/code.google.com\/p\/smali\/"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Suh, G., Lee, J., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: ACM SIGPLAN Notices, vol. 39, pp. 85\u201396 (2004)","DOI":"10.1145\/1037187.1024404"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Xia, M., Gong, L., Lyu, Y., Qi, Z., Liu, X.: Effective real-time android application auditing. In: IEEE S&P (2015)","DOI":"10.1109\/SP.2015.60"},{"key":"14_CR35","unstructured":"Xu, R., Sa\u0131di, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: Proceedings of the 21st USENIX conference on Security (2012)"},{"key":"14_CR36","unstructured":"Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In: USENIX Security (2006)"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: ACM CCS (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yin, H.: Appsealer: automatic generation of vulnerability-specific patches for preventing component hijacking attacks in android applications. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23255"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yin, H.: Efficient, context-aware privacy leakage confinement for android applications without firmware modding. In: ASIACCS (2014)","DOI":"10.1145\/2590296.2590312"},{"key":"14_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-21599-5_7","volume-title":"Trust and Trustworthy Computing","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93\u2013107. Springer, Heidelberg (2011)"},{"issue":"1","key":"14_CR41","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1945023.1945039","volume":"45","author":"D Zhu","year":"2011","unstructured":"Zhu, D., Jung, J., Song, D., Kohno, T., Wetherall, D.: Tainteraser: protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Operating Systems Review 45(1), 142\u2013154 (2011)","journal-title":"ACM SIGOPS Operating Systems Review"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:22:24Z","timestamp":1559373744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}