{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:13:50Z","timestamp":1726409630480},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_5","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"80-94","source":"Crossref","is-referenced-by-count":7,"title":["Splitting Third-Party Libraries\u2019 Privileges from Android Apps"],"prefix":"10.1007","author":[{"given":"Jiawei","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Quan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaozhuo","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yuewu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yingjiao","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"5_CR1","unstructured":"android-mapviewballoons. https:\/\/github.com\/jgilfelt\/android-mapviewballoons"},{"key":"5_CR2","unstructured":"jmonkeyengine. http:\/\/code.google.com\/p\/jmonkeyengine\/"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app. advertisements. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"5_CR4","unstructured":"Opencv for android. http:\/\/billmccord.github.com\/OpenCV-Android\/"},{"key":"5_CR5","unstructured":"android-wheel. http:\/\/code.google.com\/p\/android-wheel\/"},{"key":"5_CR6","unstructured":"Android permissions. https:\/\/developer.android.com\/guide\/topics\/security\/permissions.html"},{"key":"5_CR7","unstructured":"Shekhar, S., Dietz, M., Wallach, D.S.: Adsplit: separating smartphone advertising from applications. In: Presented as part of the 21st USENIX Security Symposium (2012)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Sun, M., Tan, G.: Nativeguard: protecting android applications from third-party native libraries. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks (2014)","DOI":"10.1145\/2627393.2627396"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Seo, J., Kim, D., Cho, D., Kim, T., Shin, I.: Flexdroid: enforcing in-app. privilege separation in android. In: Proceedings of Annual Network & Distributed System Security Symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23485"},{"key":"5_CR10","unstructured":"Android platform versions, February 2017. https:\/\/developer.android.com\/about\/dashboards\/index.html"},{"key":"5_CR11","unstructured":"Google play. https:\/\/play.google.com\/store"},{"key":"5_CR12","unstructured":"Monkey. https:\/\/developer.android.com\/studio\/test\/monkey.html"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Wang, Y., Hariharan, S., Zhao, C., Liu, J., Du, W.: Compac: enforce component-level access control in android. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (2014)","DOI":"10.1145\/2557547.2557560"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: Addroid: privilege separation for applications and advertisers in android. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (2012)","DOI":"10.1145\/2414456.2414498"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ahlawat, A., Du, W.: Aframe: isolating advertisements from mobile applications in android. In: Proceedings of the 29th Annual Computer Security Applications Conference (2013)","DOI":"10.1145\/2523649.2523652"},{"key":"5_CR16","unstructured":"Roesner, F., Kohno, T.: Securing embedded user interfaces: android and beyond. In: Presented as part of the 22nd USENIX Security Symposium (2013)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS) (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: Proceedings of the 2009 Annual Computer Security Applications Conference (ACSA) (2009)","DOI":"10.1109\/ACSAC.2009.39"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Roesner, F., Kohno, T., Moshchuk, A., Parno, B.: User-driven access control: Rethinking permission granting in modern operating systems. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.24"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Conti, M., Nguyen, V.T.N., Crispo, B.: Crepe: context-related policy enforcement for android. In: Proceedings of the 13th International Conference on Information Security (2010)","DOI":"10.1007\/978-3-642-18178-8_29"},{"key":"5_CR22","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks (2011)"},{"key":"5_CR23","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: Proceedings of Annual Network & Distributed System Security Symposium, vol. 130(130), pp. 346\u2013360 (2012)"},{"key":"5_CR24","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: lightweight provenance for smart phone operating systems. Dissertations & Theses - Gradworks, p. 23 (2011)"},{"key":"5_CR25","unstructured":"Smalley, S., Craig, R.: Security enhanced (se) android: bringing flexible mac to android. In: Proceedings of 20th Annual Network & Distributed System Security Symposium ( NDSS) (2013)"},{"key":"5_CR26","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Towards a framework for android security modules: Extending se android type enforcement to android middleware. Technical report, Center for Advanced Security Research Darmstadt (2012)"},{"key":"5_CR27","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Usenix Conference on Security, pp. 131\u2013146 (2013)"},{"key":"5_CR28","unstructured":"Bousquet, A., Briffaut, J., Clvy, L., Toinard, C., Venelle, B., Bousquet, A., Clvy, L., Venelle, B.: Mandatory access control for the android dalvik virtual machine. In: The Workshop on Usenix Federated Conferences (2013)"},{"key":"5_CR29","unstructured":"acl, linux man page. http:\/\/linux.die.net\/man\/5\/acl"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T02:49:55Z","timestamp":1569379795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}