{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:11:27Z","timestamp":1743055887432,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420912"},{"type":"electronic","value":"9783319420929"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42092-9_10","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T06:02:55Z","timestamp":1467266575000},"page":"115-128","source":"Crossref","is-referenced-by-count":3,"title":["A Type System for Android Applications"],"prefix":"10.1007","author":[{"given":"Mohamed A.","family":"El-Zawawy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"10_CR1","unstructured":"Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html . Accessed 1 Feb 2016"},{"key":"10_CR2","unstructured":"Dalvik docs mirror. http:\/\/www.statista.com\/topics\/840\/smartphones\/ . Accessed Feb 2016"},{"key":"10_CR3","unstructured":"Dalvik docs mirror. http:\/\/www.milk.com\/kodebase\/dalvik-docs-mirror\/ . Accessed Feb 2016"},{"key":"10_CR4","unstructured":"Gartner, Inc.: Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phoneshipments. www.gartner.com\/newsroom\/id\/2692318"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Amalfitano, D., Fasolino, A.R., Tramontana, P., De Carmine, S., Memon, A.M.: Using GUI ripping for automated testing of android applications. In: Proceedings of 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 258\u2013261. ACM (2012)","DOI":"10.1145\/2351676.2351717"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-38592-6_20","volume-title":"Formal Techniques for Distributed Systems","author":"M Bugliesi","year":"2013","unstructured":"Bugliesi, M., Calzavara, S., Span\u00f2, A.: Lintent: towards security type-checking of android applications. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 289\u2013304. Springer, Heidelberg (2013)"},{"issue":"1","key":"10_CR7","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/234313.234418","volume":"28","author":"L Cardelli","year":"1996","unstructured":"Cardelli, L.: Type systems. ACM Comput. Surv. 28(1), 263\u2013264 (1996)","journal-title":"ACM Comput. Surv."},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-319-25527-9_14","volume-title":"Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday","author":"G Costa","year":"2015","unstructured":"Costa, G.: Securing Android with local policies. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday. LNCS, vol. 9465, pp. 202\u2013218. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25527-9_14"},{"key":"10_CR9","volume-title":"Program Flow Analysis : Theory and Applications","author":"P Cousot","year":"1981","unstructured":"Cousot, P.: Semantic foundations of program analysis. In: Muchnick, S., Jones, N. (eds.) Program Flow Analysis : Theory and Applications. Prentice Hall, Englewood Cliffs (1981)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"El-Zawawy, M.A.: An operational semantics for Android applications. In: Computational Science and Its Applications-ICCSA (2016)","DOI":"10.1007\/978-3-319-42092-9_9"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1007\/978-3-642-31137-6_45","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"MA El-Zawawy","year":"2012","unstructured":"El-Zawawy, M.A.: Heap slicing using type systems. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A.C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2012, Part III. LNCS, vol. 7335, pp. 592\u2013606. Springer, Heidelberg (2012)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.joems.2012.08.009","volume":"20","author":"MA El-Zawawy","year":"2012","unstructured":"El-Zawawy, M.A.: Recognition of logically related regions based heap abstraction. J. Egypt. Math. Soci. 20(2), 64\u201371 (2012)","journal-title":"J. Egypt. Math. Soci."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Gunadi, H.: Formal certification of non-interferent Android bytecode (DEX bytecode). In: 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 202\u2013205. IEEE (2015)","DOI":"10.1109\/ICECCS.2015.36"},{"key":"10_CR14","unstructured":"Karlsen, H.S., Wognsen, E.R.: Static analysis of Dalvik bytecode and reflection in Android. Master\u2019s thesis, Aalborg University, June 2012"},{"key":"10_CR15","unstructured":"Cuixiong, H., Neamtiu, I.: Automating gui testing for Android applications. In: Proceedings of 6th International Workshop on Automation of Software Test, pp. 77\u201383. ACM (2011)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Huang, W., Dong, Y., Milanova, A., Dolby, J.: Scalable and precise taint analysis for Android. In: Proceedings of 2015 International Symposium on Software Testing and Analysis, pp. 106\u2013117. ACM (2015)","DOI":"10.1145\/2771783.2771803"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Just, R., Ernst, M.D., Millstein, S.: Collaborative verification of information flow for a high-assurance app store. Softw. Eng. Manag. 77 (2015)","DOI":"10.1145\/2660267.2660343"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Machiry, A., Tahiliani, R., Naik, M.: Dynodroid: an input generation system for Android apps. In: Proceedings of 2013 9th Joint Meeting on Foundations of Software Engineering, pp. 224\u2013234. ACM (2013)","DOI":"10.1145\/2491411.2491450"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Mann, C., Starostin, A.: A framework for static detection of privacy leaks in android applications. In: Proceedings of 27th Annual ACM Symposium on Applied Computing, pp. 1457\u20131462. ACM (2012)","DOI":"10.1145\/2245276.2232009"},{"key":"10_CR20","volume-title":"Programming Android","author":"Z Mednieks","year":"2012","unstructured":"Mednieks, Z., Dornin, L., Meike, G.B., Nakamura, M.: Programming Android. O\u2019Reilly Media Inc, Sebastopol (2012)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-319-24177-7_26","volume-title":"Computer Security \u2013 ESORICS 2015","author":"K Micinski","year":"2015","unstructured":"Micinski, K., Fetter-Degges, J., Jeon, J., Foster, J.S., Clarkson, M.R.: Checking interaction-based declassification policies for Android using symbolic execution. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 520\u2013538. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24177-7_26"},{"key":"10_CR22","volume-title":"Professional Android Sensor Programming","author":"G Milette","year":"2012","unstructured":"Milette, G., Stroud, A.: Professional Android Sensor Programming. Wiley, New York (2012)"},{"key":"10_CR23","unstructured":"Mohr, M., Graf, J., Hecker, M.: JoDroid: adding android support to a static information flow control tool. In: Software Engineering (Workshops), pp. 140\u2013145 (2015)"},{"key":"10_CR24","doi-asserted-by":"crossref","DOI":"10.1002\/9781119171386","volume-title":"Handbook of Practical Program Evaluation","author":"KE Newcomer","year":"2015","unstructured":"Newcomer, K.E., Hatry, H.P., Wholey, J.S.: Handbook of Practical Program Evaluation. Wiley, New York (2015)"},{"key":"10_CR25","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"2015","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (2015)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Octeau, D., Jha, S., McDaniel, P.: Retargeting Android applications to Java bytecode. In: Proceedings of ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, p. 6. ACM (2012)","DOI":"10.1145\/2393596.2393600"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Payet, \u00c9., Spoto, F.: An operational semantics for android activities. In: Chin, W.-N., Hage, J. (eds.) Proceedings of ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation, PEPM, San Diego, California, USA, pp. 121\u2013132. ACM, 20\u201321 January 2014","DOI":"10.1145\/2543728.2543748"},{"key":"10_CR28","unstructured":"Reddy, N., Jeon, J., Vaughan, J., Millstein, T., Foster, J.: Application-centric security policies on unmodified Android. UCLA Computer Science Department, Technical report 110017 (2011)"},{"key":"10_CR29","volume-title":"Android Application Development: Programming with the Google SDK","author":"R Rogers","year":"2009","unstructured":"Rogers, R., Lombardo, J., Mednieks, Z., Meike, B.: Android Application Development: Programming with the Google SDK. O\u2019Reilly Media Inc., Sebastopol (2009)"},{"key":"10_CR30","volume-title":"Object-Oriented Type Systems","author":"MI Schwartzbach","year":"1994","unstructured":"Schwartzbach, M.I., Palsberg, J.: Object-Oriented Type Systems. Wiley, New York (1994)"},{"issue":"9","key":"10_CR31","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1145\/361002.361016","volume":"18","author":"B Wegbreit","year":"1975","unstructured":"Wegbreit, B.: Mechanical program analysis. Commun. ACM 18(9), 528\u2013539 (1975)","journal-title":"Commun. ACM"},{"key":"10_CR32","unstructured":"Rubin, X., Sa\u00efdi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. Paper presented at the Part of 21st USENIX Security Symposium (USENIX Security 12), pp. 539\u2013552 (2012)"},{"key":"10_CR33","unstructured":"Yang, S.: Static analyses of GUI behavior in Android applications. Ph.D. thesis, The Ohio State University (2015)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42092-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T08:45:47Z","timestamp":1568105147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42092-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420912","9783319420929"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42092-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}