{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:11:41Z","timestamp":1757542301978},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_36","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"655-672","source":"Crossref","is-referenced-by-count":9,"title":["Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem"],"prefix":"10.1007","author":[{"given":"Xing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"36_CR1","unstructured":"Admob: Admob by Google (2016). https:\/\/www.google.com\/admob\/"},{"key":"36_CR2","unstructured":"Admob: Admob quick start (2016). https:\/\/developers.google.com\/admob\/android\/quick-start?hl=en"},{"key":"36_CR3","unstructured":"Android: Dalvik bytecode (2016). https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html"},{"key":"36_CR4","unstructured":"Android: Monkey runner (2016). https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/index.html"},{"key":"36_CR5","unstructured":"Apktool: Apktool (2016). http:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"36_CR6","unstructured":"Appbrain: Appbrain stats, May 2016. http:\/\/www.appbrain.com\/stats"},{"key":"36_CR7","unstructured":"Appsee: Appsee, 09 March 2016. https:\/\/www.appsee.com"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Balebako, R., Marsh, A., Lin, J., Hong, J.I., Cranor, L.F.: The privacy and security behaviors of smartphone app developers (2014)","DOI":"10.14722\/usec.2014.23006"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Book, T., Wallach, D.S.: A case of collusion: a study of the interface between ad libraries and their apps. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 79\u201386. ACM (2013)","DOI":"10.1145\/2516760.2516762"},{"key":"36_CR10","unstructured":"Book, T., Wallach, D.S.: An empirical study of mobile ad targeting. arXiv preprint arXiv:1502.06577 (2015)"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Chen, T., Ullah, I., Ali Kaafar, M., Boreli, R.: Information leakage through mobile analytics services. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, p. 15. ACM (2014)","DOI":"10.1145\/2565585.2565593"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Demetriou, S., Merrill, W., Yang, W., Zhang, A., Gunter, C.A.: Free for all! Assessing user data exposure to advertising libraries on android. In: NDSS 2016 (2016)","DOI":"10.14722\/ndss.2016.23082"},{"key":"36_CR13","unstructured":"Eguan: Eguan mobile apps top list, March 2016. http:\/\/qianfan.analysys.cn\/user-radar\/view\/ranking\/topRanking.html"},{"key":"36_CR14","unstructured":"Flurry: Custom events with flurry analytics for Android (2016). https:\/\/developer.yahoo.com\/flurry\/docs\/analytics\/gettingstarted\/events\/android\/"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101\u2013112. ACM (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"36_CR16","unstructured":"Han, S., Jung, J., Wetherall, D.: A study of third-party tracking by mobile apps in the wild. Technical report, University of Washington (2012)"},{"key":"36_CR17","unstructured":"JesusFreke: Smali (2016). https:\/\/github.com\/JesusFreke\/smali"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Meng, W., Ding, R., Chung, S.P., Han, S., Lee, W.: The price of free: privacy leakage in personalized mobile in-app ads. In: NDSS Symposium 2016 (2016)","DOI":"10.14722\/ndss.2016.23353"},{"key":"36_CR19","unstructured":"Milano, D.T.: Androidviewclient (2016). https:\/\/github.com\/dtmilano\/AndroidViewClient"},{"key":"36_CR20","unstructured":"Mobyaffiliates: The best app analytics tools list (2015). http:\/\/www.mobyaffiliates.com\/guides\/best-app-analytics-tools-list\/"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Nath, S.: Madscope: characterizing mobile in-app targeted ads. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 59\u201373. ACM (2015)","DOI":"10.1145\/2742647.2742653"},{"key":"36_CR22","unstructured":"LLC SaurikIT: Cydia substrate: the powerful code modification platform behind cydia (2016). http:\/\/www.cydiasubstrate.com\/"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D., Niu, J.: Toward a framework for detecting privacy policy violations in Android application code. In: Proceedings of the 38th International Conference on Software Engineering, pp. 25\u201336. ACM (2016)","DOI":"10.1145\/2884781.2884855"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Spreitzer, R.: Pin skimming: exploiting the ambient-light sensor in mobile devices. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 51\u201362. ACM (2014)","DOI":"10.1145\/2666620.2666622"},{"key":"36_CR25","unstructured":"Talkingdata: Talkingdata (2016). https:\/\/www.talkingdata.com\/"},{"key":"36_CR26","unstructured":"Umeng: Umeng (2016). https:\/\/www.umeng.com\/"},{"key":"36_CR27","unstructured":"UxCam: Uxcam, 09 March 2016. https:\/\/uxcam.com"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"36_CR29","doi-asserted-by":"crossref","unstructured":"Yu, L., Zhang, T., Luo, X., Xue, L.: Autoppg: towards automatic generation of privacy policy for Android applications. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 39\u201350. ACM (2015)","DOI":"10.1145\/2808117.2808125"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T01:02:47Z","timestamp":1569459767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_36","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}