{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T05:43:27Z","timestamp":1749879807603,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694825"},{"type":"electronic","value":"9783319694832"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69483-2_10","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T07:34:48Z","timestamp":1508139288000},"page":"164-180","source":"Crossref","is-referenced-by-count":4,"title":["AndroidLeaker: A Hybrid Checker for Collusive Leak in Android Applications"],"prefix":"10.1007","author":[{"given":"Zipeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI 2014, pp. 259\u2013269 (2014)","DOI":"10.1145\/2666356.2594299"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Bodden, E.: Inter-procedural data-flow analysis with IFDS\/IDE and soot. In: SOAP 2012, pp. 3\u20138 (2012)","DOI":"10.1145\/2259051.2259052"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"10_CR4","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI 2010, pp. 1\u20136 (2010)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-30921-2_17"},{"key":"10_CR6","unstructured":"Kim, J., Yoon, Y., Yi, K., Shin, J.: SCANDAL: static analyzer for detecting privacy leaks in android applications. In: MoST 2012 (2012)"},{"issue":"1","key":"10_CR7","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/357062.357071","volume":"1","author":"T Lengauer","year":"1979","unstructured":"Lengauer, T., Tarjan, R.E.: A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst. 1(1), 121\u2013141 (1979)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: CHEX: statically vetting android apps for component hijacking vulnerabilities. In: CCS 2012, pp. 229\u2013240 (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Mann, C., Starostin, A.: A framework for static detection of privacy leaks in android applications. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012, pp. 1457\u20131462 (2012)","DOI":"10.1145\/2245276.2232009"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Nadkarni, A., Enck, W.: Preventing accidental data disclosure in modern operating systems. In: CCS 2013, pp. 1029\u20131042 (2013)","DOI":"10.1145\/2508859.2516677"},{"key":"10_CR11","unstructured":"Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with Epicc: an essential step towards holistic security analysis. In: SEC 2013, pp. 543\u2013558 (2013)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: POPL 1995, pp. 49\u201361 (1995)","DOI":"10.1145\/199448.199462"},{"key":"10_CR13","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-94-007-6738-6_31","volume-title":"Multimedia and Ubiquitous Engineering","author":"S Sakamoto","year":"2013","unstructured":"Sakamoto, S., Okuda, K., Nakatsuka, R., Yamauchi, T.: DroidTrack: tracking information diffusion and preventing information leakage on android. In: Park, J.J.J.H., Ng, J.K.-Y., Jeong, H.Y., Waluyo, B. (eds.) Multimedia and Ubiquitous Engineering. LNEE, vol. 240, pp. 243\u2013251. Springer, Dordrecht (2013). doi:\n10.1007\/978-94-007-6738-6_31"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Sun, M., Wei, T., Lui, J.C.: TaintART: a practical multi-level information-flow tracking system for android runtime. In: CCS 2016, pp. 331\u2013342 (2016)","DOI":"10.1145\/2976749.2978343"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot: a java bytecode optimization framework. In: CASCON 2010, pp. 214\u2013224 (2010)","DOI":"10.1145\/1925805.1925818"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Xia, M., Gong, L., Lyu, Y., Qi, Z., Liu, X.: Effective real-time android application auditing. In: S&P 2015, pp. 899\u2013914 (2015)","DOI":"10.1109\/SP.2015.60"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tillmann, N., Fahndrich, M., de Halleux, J., Moskal, M.: User-aware privacy control via extended static-information-flow analysis. In: ASE 2012, pp. 80\u201389 (2012)","DOI":"10.1145\/2351676.2351689"},{"key":"10_CR18","unstructured":"Xu, R., Sa\u00efdi, H., Anderson, R.: Aurasium: Practical policy enforcement for android applications. In: Security 2012, pp. 27\u201327 (2012)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M.: LeakMiner: detect information leakage on android with static taint analysis. In: WCSE 2012, pp. 101\u2013104 (2012)","DOI":"10.1109\/WCSE.2012.26"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In: CCS 2013, pp. 1043\u20131054 (2013)","DOI":"10.1145\/2508859.2516676"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Osorio, F.C.C.: TrustDroid: preventing the use of smartphones for information leaking in corporate networks through the used of static analysis taint tracking. In: MALWARE 2012, pp. 135\u2013143 (2012)","DOI":"10.1109\/MALWARE.2012.6461017"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69483-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T07:37:44Z","timestamp":1508139464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69483-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694825","9783319694832"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69483-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}