{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:18Z","timestamp":1725889878353},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_19","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"317-333","source":"Crossref","is-referenced-by-count":0,"title":["IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage"],"prefix":"10.1007","author":[{"given":"Tianjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuexiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L., Arzt, S.: IccTA: detecting inter-component privacy leaks in android apps. In: International Conference on Software Engineering, pp. 280\u2013291 (2015)","key":"19_CR1","DOI":"10.1109\/ICSE.2015.48"},{"doi-asserted-by":"crossref","unstructured":"Klieber, W., Flynn, L., Bhosale, A., Jia, L., Bauer, L.: Android taint flow analysis for app sets. In: International Workshop on the State of the Art in Java Program Analysis, pp. 1\u20136 (2014)","key":"19_CR2","DOI":"10.1145\/2614628.2614633"},{"issue":"6","key":"19_CR3","first-page":"6","volume":"41","author":"H Bagheri","year":"2015","unstructured":"Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: Covert: compositional analysis of android inter-app permission leakage. IEEE Trans. Softw. Eng. 41(6), 6\u201337 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"19_CR4","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C.: FlowDroid. ACM SIGPLAN Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Not."},{"unstructured":"Android documentation. http:\/\/developer.android.com\/guide\/components\/intents-filters.html#Resolution","key":"19_CR5"},{"doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M., Zhang, Y.: AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 1043\u20131054 (2013)","key":"19_CR6","DOI":"10.1145\/2508859.2516676"},{"doi-asserted-by":"crossref","unstructured":"Schutte, J., Fedler, R., Titze, D.: ConDroid: targeted dynamic analysis of android applications. In: IEEE Conference on Advanced Information Networking and Applications, pp. 571\u2013578 (2015)","key":"19_CR7","DOI":"10.1109\/AINA.2015.238"},{"doi-asserted-by":"crossref","unstructured":"Anand, S., Naik, M., Harrold, M.J.: Automated concolic testing of smartphone apps. In: International Symposium on the Foundations of Software Engineering, pp. 1\u201311 (2012)","key":"19_CR8","DOI":"10.1145\/2393596.2393666"},{"unstructured":"Wong, M.Y.Y.: Targeted dynamic analysis for android malware. Dissertations & Theses Gradworks (2015)","key":"19_CR9"},{"doi-asserted-by":"crossref","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: IEEE Symposium on Security and Privacy, vol. 7, pp. 317\u2013331 (2010)","key":"19_CR10","DOI":"10.1109\/SP.2010.26"},{"unstructured":"Android Debug Bridge. http:\/\/developer.android.com\/tools\/help\/adb.html","key":"19_CR11"},{"unstructured":"UI\/Application Exerciser Monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html","key":"19_CR12"},{"unstructured":"Android Activity Manager. http:\/\/developer.android.com\/android\/app\/ActivityManager.html","key":"19_CR13"},{"unstructured":"Android instrumentationtestrunner. http:\/\/developer.android.com\/reference\/android\/test\/InstrumentationTestRunner.html","key":"19_CR14"},{"unstructured":"Soot analysis framework. http:\/\/www.sable.mcgill.ca\/soot\/","key":"19_CR15"},{"unstructured":"IC3. https:\/\/github.com\/siis\/ic3","key":"19_CR16"},{"unstructured":"ApkCombiner. https:\/\/github.com\/lilicoding\/ApkCombiner","key":"19_CR17"},{"issue":"11","key":"19_CR18","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/CC.2013.6674209","volume":"10","author":"J He","year":"2013","unstructured":"He, J., Yang, Y.X., Qiao, Y.: Accurate classification of P2P traffic by clustering flows. China Commun. 10(11), 42\u201351 (2013)","journal-title":"China Commun."},{"issue":"12","key":"19_CR19","doi-asserted-by":"crossref","first-page":"3328","DOI":"10.1109\/TPDS.2014.7","volume":"25","author":"ZN Zhang","year":"2014","unstructured":"Zhang, Z.N., Li, D.S., Wu, K.: VMThunder: fast provisioning of large-scale virtual machine clusters. IEEE Trans. Parallel Distrib. Syst. 25(12), 3328\u20133338 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"19_CR20","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s11704-015-4420-7","volume":"10","author":"ZN Zhang","year":"2016","unstructured":"Zhang, Z.N., Li, D.S., Wu, K.: Large-scale virtual machines provisioning in clouds: challenges and approaches. Front. Comput. Sci. 10(1), 2\u201318 (2016)","journal-title":"Front. Comput. Sci."},{"unstructured":"Kirat, D., Vigna, G., Kruegel, C.: Barecloud: bare-metal analysis-based evasive malware detection. Malware Detection (2014)","key":"19_CR21"},{"unstructured":"DroidBench Benchmarks. https:\/\/github.com\/secure-software-engineering\/DroidBench","key":"19_CR22"},{"unstructured":"ICC-Bench. https:\/\/github.com\/fgwei\/ICC-Bench","key":"19_CR23"},{"unstructured":"Google play market. http:\/\/play.google.com\/store\/apps\/","key":"19_CR24"},{"unstructured":"F-Droid. https:\/\/f-droid.org\/","key":"19_CR25"},{"unstructured":"Bazaar. https:\/\/cafebazaar.ir\/","key":"19_CR26"},{"unstructured":"MalGenome. http:\/\/www.malgenomeproject.org","key":"19_CR27"},{"doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: ACM Conference on Computer and Communications Security, pp. 627\u2013638 (2011)","key":"19_CR28","DOI":"10.1145\/2046707.2046779"},{"doi-asserted-by":"crossref","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L. P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: USENIX Conference on Operating Systems Design and Implementation, pp. 1\u20136 (2010)","key":"19_CR29","DOI":"10.1145\/2619091"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T12:44:16Z","timestamp":1659098656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}