{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:31:46Z","timestamp":1751455906964},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319624037"},{"type":"electronic","value":"9783319624044"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62404-4_46","type":"book-chapter","created":{"date-parts":[[2017,7,14]],"date-time":"2017-07-14T07:17:03Z","timestamp":1500016623000},"page":"620-634","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Android Fragments and Activities Life Cycles Coordination"],"prefix":"10.1007","author":[{"given":"Mohamed A.","family":"El-Zawawy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,15]]},"reference":[{"unstructured":"Android developers. \nhttp:\/\/developer.android.com","key":"46_CR1"},{"issue":"6","key":"46_CR2","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not. 49(6), 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Not."},{"doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326. ACM (2011)","key":"46_CR3","DOI":"10.1145\/2046614.2046619"},{"doi-asserted-by":"crossref","unstructured":"Chaudhuri, A.: Language-based security on android. In: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, pp. 1\u20137. ACM (2009)","key":"46_CR4","DOI":"10.1145\/1554339.1554341"},{"unstructured":"Android Developers. What is android (2011)","key":"46_CR5"},{"key":"46_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-319-42092-9_9","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2016","author":"MA El-Zawawy","year":"2016","unstructured":"El-Zawawy, M.A.: An operational semantics for android applications. In: Gervasi, O., et al. (eds.) ICCSA 2016, Part V. LNCS, vol. 9790, pp. 100\u2013114. Springer, Cham (2016). doi:\n10.1007\/978-3-319-42092-9_9"},{"key":"46_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-42092-9_10","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2016","author":"MA El-Zawawy","year":"2016","unstructured":"El-Zawawy, M.A.: A type system for android applications. In: Gervasi, O., et al. (eds.) ICCSA 2016, Part V. LNCS, vol. 9790, pp. 115\u2013128. Springer, Cham (2016). doi:\n10.1007\/978-3-319-42092-9_10"},{"issue":"2","key":"46_CR8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"1","key":"46_CR9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50\u201357 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"46_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-540-27813-9_46","volume-title":"Computer Aided Verification","author":"A Farzan","year":"2004","unstructured":"Farzan, A., Chen, F., Meseguer, J., Ro\u015fu, G.: Formal analysis of java programs in JavaFAN. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 501\u2013505. Springer, Heidelberg (2004). doi:\n10.1007\/978-3-540-27813-9_46"},{"doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM (2011)","key":"46_CR11","DOI":"10.1145\/2046707.2046779"},{"key":"46_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-30921-2_17"},{"unstructured":"Jeon, J., Micinski, K.K., Foster, J.S.: Symdroid: Symbolic execution for dalvik bytecode. Technical report (2012)","key":"46_CR13"},{"doi-asserted-by":"crossref","unstructured":"Payet, E., Spoto, F.: An operational semantics for android activities. In: Proceedings of the ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation, pp. 121\u2013132. ACM (2014)","key":"46_CR14","DOI":"10.1145\/2543728.2543748"},{"doi-asserted-by":"crossref","unstructured":"Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T., Hoffmann, J.: Mobile-sandbox: having a deeper look into android applications. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1808\u20131815. ACM (2013)","key":"46_CR15","DOI":"10.1145\/2480362.2480701"},{"doi-asserted-by":"crossref","unstructured":"Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: Droidmat: android malware detection through manifest and API calls tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62\u201369. IEEE (2012)","key":"46_CR16","DOI":"10.1109\/AsiaJCIS.2012.18"},{"unstructured":"Yan, L.-K., Yin, H.: Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: USENIX Security Symposium, pp. 569\u2013584 (2012)","key":"46_CR17"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62404-4_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,14]],"date-time":"2017-07-14T07:32:13Z","timestamp":1500017533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62404-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319624037","9783319624044"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62404-4_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}