{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:25:09Z","timestamp":1742995509652,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420912"},{"type":"electronic","value":"9783319420929"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42092-9_9","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T06:02:55Z","timestamp":1467266575000},"page":"100-114","source":"Crossref","is-referenced-by-count":4,"title":["An Operational Semantics for Android Applications"],"prefix":"10.1007","author":[{"given":"Mohamed A.","family":"El-Zawawy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"9_CR1","unstructured":"Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html . Accessed 1 Feb 2016"},{"key":"9_CR2","unstructured":"Dalvik docs mirror. http:\/\/www.milk.com\/kodebase\/dalvik-docs-mirror\/ . Accessed Feb 2016"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-28891-3_18","volume-title":"NASA Formal Methods","author":"A Bauer","year":"2012","unstructured":"Bauer, A., K\u00fcster, J.-C., Vegliach, G.: Runtime verification meets android security. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 174\u2013180. Springer, Heidelberg (2012)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chaudhuri, A.: Language-based security on android. In: Proceedings of ACM SIGPLAN 4th Workshop on Programming Languages and Analysis for Security, pp. 1\u20137. ACM (2009)","DOI":"10.1145\/1554339.1554341"},{"key":"9_CR5","volume-title":"Program Flow Analysis: Theory and Application","author":"P Cousot","year":"1981","unstructured":"Cousot, P.: Semantic foundations of program analysis. In: Muchnick, S.S., Jones, N. (eds.) Program Flow Analysis: Theory and Application. Prentice Hall, Englewood Cliffs (1981)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Crussell, J., Gibler, C., Chen, H.: Scalable semantics-based detection of similar android applications. In: Proceedings of ESORICS, vol. 13. Citeseer (2013)","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"El-Zawawy, M.A.: A type system for Android applications. In: Computational Science and Its Applications-ICCSA (2016)","DOI":"10.1007\/978-3-319-42092-9_10"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-642-31128-4_7","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"MA El-Zawawy","year":"2012","unstructured":"El-Zawawy, M.A.: Abstraction analysis and certified flow and context sensitive points-to relation for distributed programs. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A.C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2012, Part IV. LNCS, vol. 7336, pp. 83\u201399. Springer, Heidelberg (2012)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","first-page":"597","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2015","author":"MA El-Zawawy","year":"2012","unstructured":"El-Zawawy, M.A.: Novel designs for memory checkers using semantics and digital sequential circuits. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A.C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2015. LNCS, vol. 9158, pp. 597\u2013611. Springer, Heidelberg (2012)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: Proceedings of 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576\u2013587. ACM (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"9_CR11","unstructured":"Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android (2009)"},{"key":"9_CR12","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: ICLP\/SLP, vol. 88, pp. 1070\u20131080 (1988)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of android applications in droidsafe. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23089"},{"key":"9_CR14","volume-title":"Semantics in Generative Grammar","author":"I Heim","year":"1998","unstructured":"Heim, I., Kratzer, A.: Semantics in Generative Grammar, vol. 13. Blackwell, Oxford (1998)"},{"key":"9_CR15","unstructured":"Karlsen, H.S., Wognsen, E.R.: Static analysis of Dalvik bytecode and reflection in android. Master\u2019s thesis, Aalborg University, June 2012"},{"key":"9_CR16","unstructured":"Yuanyang, H.: Proof-of-concepts of distributed detection with privacy (2014)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Maiya, P., Kanade, A., Majumdar, R.: Race detection for android applications. In: ACM SIGPLAN Notices, vol. 49, pp. 316\u2013325. ACM (2014)","DOI":"10.1145\/2666356.2594311"},{"key":"9_CR18","volume-title":"Programming Android","author":"Z Mednieks","year":"2012","unstructured":"Mednieks, Z., Laird Dornin, B., Nakamura, M.: Programming Android. O\u2019Reilly Media, Inc., Sebastopol (2012)"},{"key":"9_CR19","volume-title":"Professional Android Sensor Programming","author":"G Milette","year":"2012","unstructured":"Milette, G., Stroud, A.: Professional Android Sensor Programming. Wiley, New York (2012)"},{"key":"9_CR20","doi-asserted-by":"crossref","DOI":"10.1002\/9781119171386","volume-title":"Handbook of Practical Program Evaluation","author":"KE Newcomer","year":"2015","unstructured":"Newcomer, K.E., Hatry, H.P., Wholey, J.S.: Handbook of Practical Program Evaluation. Wiley, New York (2015)"},{"key":"9_CR21","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (2015)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Payet, \u00c9., Spoto, F.: An operational semantics for android activities. In: Chin, W.-N., Hage, J. (eds.) Proceedings of ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation, PEPM, San Diego, California, USA, pp. 121\u2013132. ACM, 20\u201321 January 2014","DOI":"10.1145\/2543728.2543748"},{"key":"9_CR23","unstructured":"Rasthofer, S., Arzt, S., Miltenberger, M., Bodden, E.: Harvesting runtime data in android applications for identifying malware and enhancing code analysis. Technical report, TUD-CS-2015-0031, EC SPRIDE (2015)"},{"key":"9_CR24","volume-title":"Android Application Development: Programming with the Google SDK","author":"R Rogers","year":"2009","unstructured":"Rogers, R., Lombardo, J., Mednieks, Z., Meike, B.: Android Application Development: Programming with the Google SDK. O\u2019Reilly Media Inc., Sebastopol (2009)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Rountev, A., Yan, D.: Static reference analysis for GUI objects in android software. In Proceedings of Annual IEEE\/ACM International Symposium on Code Generation and Optimization, p. 143. ACM (2014)","DOI":"10.1145\/2581122.2544159"},{"key":"9_CR26","unstructured":"Schmidt, D.A.: Denotational semantics. A methodology for language development (1997)"},{"key":"9_CR27","volume-title":"Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory","author":"JE Stoy","year":"1977","unstructured":"Stoy, J.E.: Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory. MIT Press, Cambridge (1977)"},{"issue":"9","key":"9_CR28","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1145\/361002.361016","volume":"18","author":"B Wegbreit","year":"1975","unstructured":"Wegbreit, B.: Mechanical program analysis. Commun. ACM 18(9), 528\u2013539 (1975)","journal-title":"Commun. ACM"},{"key":"9_CR29","unstructured":"Wognsen, E.R., Karlsen, H.S.: Static analysis of Dalvik bytecode and reflection in android. Master\u2019s thesis, Department of Computer Science, Aalborg University, Aalborg, Denmark (2012)"},{"key":"9_CR30","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.scico.2013.11.037","volume":"92","author":"ER Wognsen","year":"2014","unstructured":"Wognsen, E.R., Karlsen, H.S., Olesen, M.C., Hansen, R.R.: Formalisation and analysis of Dalvik bytecode. Sci. Comput. Program. 92, 25\u201355 (2014)","journal-title":"Sci. Comput. Program."},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Yang, S., Yan, D., Haowei, W., Wang, Y., Rountev, A.: Static control-flow analysis of user-driven callbacks in android applications. In: Proceedings of 37th International Conference on Software Engineering, vol. 1, pp. 89\u201399. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.31"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"You, W., Liang, B., Li, J., Shi, W., Zhang, X.: Android implicit information flow demystified. In: Proceedings of 10th ACM Symposium on Information, Computer and Communications Security, pp. 585\u2013590. ACM (2015)","DOI":"10.1145\/2714576.2714604"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware android Malware classification using weighted contextual API dependency graphs. In: Proceedings of 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1105\u20131116. ACM (2014)","DOI":"10.1145\/2660267.2660359"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yang, M., Bingquan, X., Yang, Z., Guofei, G., Peng Ning, X., Wang, S., Zang, B.: Vetting undesirable behaviors in android apps with permission use analysis. In: Proceedings of 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 611\u2013622. ACM (2013)","DOI":"10.1145\/2508859.2516689"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42092-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T08:45:43Z","timestamp":1568105143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42092-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420912","9783319420929"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42092-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}