{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:40:35Z","timestamp":1743050435109,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_2","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:03:44Z","timestamp":1508493824000},"page":"16-31","source":"Crossref","is-referenced-by-count":5,"title":["Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications"],"prefix":"10.1007","author":[{"given":"Bin","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Guangli","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Du","sequence":"additional","affiliation":[]},{"given":"Jing","family":"He","sequence":"additional","affiliation":[]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: International Conference on Mobile Systems, pp. 239\u2013252. ACM (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"2_CR2","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: USENIX Security, vol. 2, p. 21 (2011)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Gallingani, D.: Static detection and automatic exploitation of intent message vulnerabilities in android applications (2014)","DOI":"10.1145\/2699026.2699132"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: IccTA: detecting inter-component privacy leaks in android apps. In: International Conference on Software Engineering, vol. 1, pp. 280\u2013291. IEEE (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"2_CR5","unstructured":"Li, L., Bartel, A., Klein, J., Traon, Y.L., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., Mcdaniel, P.: I know what leaked in your pocket: uncovering privacy leaks on android apps with static taint analysis. Computer Science (2014)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: ACM Conference on Computer and Communications Security, pp. 229\u2013240. ACM (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Maji, A.K., Arshad, F.A., Bagchi, S., Rellermeyer, J.S.: An empirical study of the robustness of inter-component communication in android. In: The 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/DSN.2012.6263963"},{"key":"2_CR8","unstructured":"Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis. In: USENIX Security, pp. 543\u2013558 (2013)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0304-3975(96)00072-2","volume":"167","author":"M Sagiv","year":"1996","unstructured":"Sagiv, M., Reps, T., Horwitz, S.: Precise interprocedural dataflow analysis with applications to constant propagation. Theor. Comput. Sci. 167(1), 131\u2013170 (1996)","journal-title":"Theor. Comput. Sci."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Sasnauskas, R., Regehr, J.: Intent fuzzer: crafting intents of death. In: Joint International Workshop on Dynamic Analysis, pp. 1\u20135. ACM (2014)","DOI":"10.1145\/2632168.2632169"},{"key":"2_CR11","unstructured":"Singapati, S.: Inter process communication in android (2012). https:\/\/dspace.cc.tut.fi\/dpub\/bitstream\/handle\/123456789\/21105\/singapati.pdf"},{"key":"2_CR12","unstructured":"Soot[eb\/ol], G.: https:\/\/sable.github.io\/soot\/"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Wang, R., Xing, L., Wang, X., Chen, S.: Unauthorized origin crossing on mobile platforms: threats and mitigation. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 635\u2013646. ACM (2013)","DOI":"10.1145\/2508859.2516727"},{"key":"2_CR14","first-page":"2167","volume":"52","author":"Z Yuqing","year":"2015","unstructured":"Yuqing, Z., Zhejun, F., Kai, W., Zhiqiang, W., Hongzhou, Y., Qixu, L.: Survey of android vulnerability detection. Comput. Res. Dev. 52, 2167\u20132177 (2015)","journal-title":"Comput. Res. Dev."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., Massacci, F.: Stadyna: addressing the problem of dynamic code updates in the security analysis of android applications. In: ACM Conference on Data and Application Security and Privacy, pp. 37\u201348. ACM (2015)","DOI":"10.1145\/2699026.2699105"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T19:35:41Z","timestamp":1570217741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69471-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69471-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}