{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:27:01Z","timestamp":1725906421030},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_13","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T04:56:55Z","timestamp":1500958615000},"page":"169-183","source":"Crossref","is-referenced-by-count":3,"title":["An Android Vulnerability Detection System"],"prefix":"10.1007","author":[{"given":"Jiayuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yao","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xiaoqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Gaofei","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"13_CR1","unstructured":"Wikipedia: Android version history, http:\/\/en.wikipedia.org\/wiki\/-Android , version history 13 Apr 2016"},{"key":"13_CR2","unstructured":"Mitre: Common Vulnerabilities and Exposures, https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-2060 , 08 Mar 2017"},{"key":"13_CR3","unstructured":"Minterest: Qualcomm Source Vulnerability Vulnerable to Hacker Attacks lead to Android, http:\/\/www.minterest.co\/15065 , 07 May 2016"},{"key":"13_CR4","unstructured":"NetMarketShare: Market share for Android mobile, https:\/\/www.net-marketshare.com\/ , 17 Apr 2017"},{"issue":"10","key":"13_CR5","first-page":"1335","volume":"52","author":"J Liu","year":"2012","unstructured":"Liu, J., Sun, K., Wang, S.: Vulnerability analysis of the Android operating system code based on control flow mining. J. Tsinghua Univ. Sci. Technol. 52(10), 1335\u20131339 (2012)","journal-title":"J. Tsinghua Univ. Sci. Technol."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Kim, S.H., Han, D., Lee, D.H.: Predictability of android open-SSL\u2019s pseudo random number generator. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 659\u2013668 (2013)","DOI":"10.1145\/2508859.2516706"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Sounthiraraj, D., Sahs, J., Greenwood, G., Lin, Z., Khan, L.: SMV-Hunter: large scale, automated detection of SSL\/TLS man-in-the-middle vulnerabilities in android apps. In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 2014) (2014)","DOI":"10.14722\/ndss.2014.23205"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 1043\u20131054 (2013)","DOI":"10.1145\/2508859.2516676"},{"key":"13_CR9","unstructured":"Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: USENIX Security Symposium, pp. 569\u2013584 (2012)"},{"issue":"12","key":"13_CR10","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Chan, P.P., Hui, L.C., Yiu, S.M.: Droidchecker: analyzing android applications for capability leak. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 125\u2013136 (2012)","DOI":"10.1145\/2185448.2185466"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 229\u2013240 (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Egele, M., Brumley, D., Fratantonio, Y., Kruegel, C.: An empirical study of cryptographic misuse in android applications. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 73\u201384 (2013)","DOI":"10.1145\/2508859.2516693"},{"key":"13_CR15","unstructured":"Jiang, Y.Z.X., Xuxian, Z.: Detecting passive content leaks and pollution in android applications. In: Proceedings of the 20th Network and Distributed System Security Symposium (NDSS) (2013)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.Jean, Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-30921-2_17"},{"key":"13_CR17","unstructured":"Grace, M.C., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock android smartphones. In: NDSS 2012 (2012)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Guri, M., Poliak, Y., Shapira, B., Elovici, Y.: JoKER: trusted detection of kernel rootkits in android devices via JTAG interface. In: Trustcom-\/BigDataSE\/ISPA, pp. 65\u201373 (2015)","DOI":"10.1109\/Trustcom.2015.358"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Wu, T., Yang, Y.: Crafting intents to detect ICC vulnerabilities of android apps. In Computational Intelligence and Security (CIS 2016), pp. 557\u2013560 (2016)","DOI":"10.1109\/CIS.2016.0136"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Demissie, B.F., Ghio, D., Ceccato, M., Avancini, A.: Identifying Android inter app communication vulnerabilities using static and dynamic analysis. In: Proceedings of the International Workshop on Mobile Software Engineering and Systems, pp. 255\u2013266 (2016)","DOI":"10.1145\/2897073.2897082"},{"issue":"1","key":"13_CR21","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MM.2015.25","volume":"35","author":"C Qian","year":"2015","unstructured":"Qian, C., Luo, X., Le, Y., Gu, G.: Vulhunter: toward discovering vulnerabilities in android applications. IEEE Micro 35(1), 44\u201353 (2015)","journal-title":"IEEE Micro"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Xing, L., Pan, X., Wang, R., Yuan, K., Wang, X.: Upgrading your android, elevating my malware: Privilege escalation through mobile os updating. In: IEEE Symposium on Security and Privacy (S&P), pp. 393\u2013408 (2014)","DOI":"10.1109\/SP.2014.32"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: IEEE Symposium on Security and Privacy (S&P), pp. 590\u2013604 (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Thomas, D.R., Beresford, A.R., Rice, A.: Security metrics for the android ecosystem. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 87\u201398 (2015)","DOI":"10.1145\/2808117.2808118"},{"key":"13_CR25","unstructured":"Deng, X., et al.: A general attack model based on Android system vulnerability. Telecommun. Sci. (2016)"},{"issue":"1","key":"13_CR26","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50\u201357 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"13_CR27","volume-title":"Android hacker\u2019s handbook","author":"JJ Drake","year":"2014","unstructured":"Drake, J.J., Lanier, Z., Mulliner, C., Fora, P.O., Ridley, S.A., Wicherski, G.: Android hacker\u2019s handbook. Wiley, New York (2014)"},{"key":"13_CR28","unstructured":"Carnegie mellon university software engineering institute: Android secure coding standard, [Online]. Available: https:\/\/www.securecoding.cert.org\/confluence-\/pages\/viewpage.action?pageId=111509535 , 2016\/04\/13"},{"key":"13_CR29","unstructured":"JSSEC: Android application secure design\/secure coding guidebook, Report (2014)"},{"issue":"4","key":"13_CR30","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s10207-014-0260-y","volume":"14","author":"T Mustafa","year":"2015","unstructured":"Mustafa, T., Sohr, K.: Understanding the implemented access control policy of android system services with slicing and extended static checking. Int. J. Inf. Secur. 14(4), 347\u2013366 (2015)","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"13_CR31","first-page":"384","volume":"32","author":"X Li","year":"2015","unstructured":"Li, X., Liu, Q., Zhang, Q.: Kernel privilege escalation vulnerabilities automatically exploiting system based on imitating attack. J. Univ. Chin. Acad. Sci. 32(3), 384\u2013390 (2015)","journal-title":"J. Univ. Chin. Acad. Sci."},{"key":"13_CR32","unstructured":"Microsoft: Microsoft exploitability index, https:\/\/technet.micro-soft.com\/en-us\/security\/cc998259 , 13 Apr 2016"},{"key":"13_CR33","unstructured":"Lua team: Lua, http:\/\/www.lua.org\/ , 13 Apr 2016"},{"key":"13_CR34","unstructured":"Xuxian, J.: Smishing vulnerability in multiple android platforms, https:\/\/www.csc2.ncsu.edu\/faculty\/xjiang4\/smishing.html , 13 June 2017"},{"key":"13_CR35","unstructured":"Cannon, T., Android sms spoofer, https:\/\/github.com\/thomascannon\/android-sms-spoof , 13 June 2017"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yuksel, K.A., Albayrak, S.: Static analysis of executables for collaborative malware detection on android. In: IEEE International Conference on Communications (ICC 2009), pp. 1\u20135 (2009)","DOI":"10.1109\/ICC.2009.5199486"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:13:10Z","timestamp":1569928390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}