{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:56Z","timestamp":1725871916375},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_31","type":"book-chapter","created":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:19:03Z","timestamp":1558329543000},"page":"521-531","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detection of SQLite Database Vulnerabilities in Android Apps"],"prefix":"10.1007","author":[{"given":"Vineeta","family":"Jain","sequence":"first","affiliation":[]},{"given":"M. S.","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Laxmi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Mosbah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"31_CR1","unstructured":"CWE-312: Cleartext Storage of Sensitive Information. \n                      https:\/\/cwe.mitre.org\/data\/definitions\/312.html\n                      \n                    . Accessed 23 Jan 2016"},{"key":"31_CR2","unstructured":"Storage Options. \n                      https:\/\/developer.android.com\/guide\/topics\/data\/data-storage.html\n                      \n                    . Accessed 1 Mar 2016"},{"key":"31_CR3","unstructured":"Application Threat Modeling. \n                      https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling\n                      \n                    . Accessed 4 Mar 2016"},{"key":"31_CR4","unstructured":"OWASP Mobile Checklist Final 2016. \n                      https:\/\/drive.google.com\/file\/d\/0BxOPagp1jPHWYmg3Y3BfLVhMcmc\/view\n                      \n                    . Accessed 02 Mar 2016"},{"key":"31_CR5","unstructured":"McCormick, Z., Schmidt, D.C.: Data synchronization patterns in mobile application design. In: Proceedings of the 19th Conference on Pattern Languages of Programs, p. 12. The Hillside Group (2012)"},{"key":"31_CR6","unstructured":"Transferring Data Using Sync Adapters. \n                      https:\/\/developer.android.com\/training\/sync-adapters\/index.html\n                      \n                    . Accessed 28 Dec 2015"},{"key":"31_CR7","unstructured":"Jain, V., Sahu, D.R., Tomar, D.S.: Session hijacking: threat analysis and countermeasures"},{"key":"31_CR8","unstructured":"A tool for reverse engineering Android apk files. \n                      https:\/\/ibotpeaches.github.io\/Apktool\/\n                      \n                    . Accessed 10 Jan 2016"},{"key":"31_CR9","unstructured":"dex2jar. \n                      https:\/\/github.com\/pxb1988\/dex2jar\n                      \n                    . Accessed 11 Feb 2016"},{"key":"31_CR10","unstructured":"Threat Risk Modeling. \n                      https:\/\/www.owasp.org\/index.php\/Threat_Risk_Modeling\n                      \n                    . Accessed 14 Apr 2016"},{"key":"31_CR11","unstructured":"OWASP Risk Rating Methodology. \n                      https:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology\n                      \n                    . Accessed 25 Apr 2016"},{"key":"31_CR12","unstructured":"LINE: Free Calls Messages. \n                      https:\/\/play.google.com\/store\/apps\/details?id=jp.naver.line.android&hl=en\n                      \n                    . Accessed 11 Feb 2016"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252. ACM (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"1","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 1, 50\u201357 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyande, T., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: Iccta: detecting inter-component privacy leaks in android apps. In: IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE) (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Lu, K., Li, Z., Kemerlis, V.P., Wu, Z., Lu, L., Zheng, C., Qian, Z., Lee, W., Jiang, G.: Checking more, alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23287"},{"key":"31_CR17","unstructured":"Jiang, Y.Z.X.: Detecting passive content leaks and pollution in android applications. In: Proceedings of the 20th Network and Distributed System Security Symposium (NDSS) (2013)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:39:21Z","timestamp":1558330761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}