{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:22:04Z","timestamp":1725974524760},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_15","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:03:21Z","timestamp":1523340201000},"page":"291-311","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection"],"prefix":"10.1007","author":[{"given":"Yi","family":"He","sequence":"first","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"15_CR1","unstructured":"Android Guard: http:\/\/android.app.qq.com\/myapp\/detail.htm?apkName=org.androidbeans.guard"},{"key":"15_CR2","unstructured":"APKPure. https:\/\/apkpure.com\/"},{"key":"15_CR3","unstructured":"Ditty by Zya. https:\/\/play.google.com\/store\/apps\/details?id=com.zya.ditty"},{"key":"15_CR4","unstructured":"F-Droid. https:\/\/f-droid.org\/"},{"key":"15_CR5","unstructured":"Google Play. https:\/\/play.google.com"},{"key":"15_CR6","unstructured":"Hiapk. www.hiapk.com\/"},{"key":"15_CR7","unstructured":"Intents and intent filters. http:\/\/developer.android.com\/guide\/components\/intents-filters.html"},{"key":"15_CR8","unstructured":"MongoDB. https:\/\/www.mongodb.org\/"},{"key":"15_CR9","unstructured":"A part of ICC APIs, the defination of Intent. https:\/\/developer.android.com\/reference\/android\/content\/Intent.html"},{"key":"15_CR10","unstructured":"SMS Popup. https:\/\/play.google.com\/store\/apps\/details?id=net.everythingandroid.smspopup"},{"key":"15_CR11","unstructured":"SMSZombie. http:\/\/blog.trustgo.com\/SMSZombie\/"},{"key":"15_CR12","unstructured":"Tencent Markletplace. http:\/\/sj.qq.com\/myapp\/"},{"key":"15_CR13","unstructured":"VirusShare. https:\/\/virusshare.com\/"},{"key":"15_CR14","unstructured":"Vulnerability of Dropbox SDK. http:\/\/www.slideshare.net\/ibmsecurity\/remote-exploitation-of-the-dropbox-sdk-for-android"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Afonso, V., Bianchi, A., Fratantonio, Y., Doup\u00e9, A., Polino, M., de Geus, P., Kruegel, C., Vigna, G.: Going native: using a large-scale analysis of android apps to create a practical native-code sandboxing policy. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23384"},{"issue":"6","key":"15_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"Steven Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI, vol. 49, no. 6, pp. 259\u2013269 (2014)","journal-title":"ACM SIGPLAN Notices"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: PScout: analyzing the android permission specification. In: CCS, pp. 217\u2013228 (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Bartel, A., Klein, J., Le Traon, Y., Monperrus, M.: Dexpler: converting android dalvik bytecode to jimple for static analysis with soot. In: SOAP, pp. 27\u201338 (2012)","DOI":"10.1145\/2259051.2259056"},{"issue":"6","key":"15_CR19","first-page":"617","volume":"40","author":"A Bartel","year":"2014","unstructured":"Bartel, A., Klein, J., Monperrus, M., Le Traon, Y.: Static analysis for extracting permission checks of a large scale framework: the challenges and solutions for analyzing Android. TSE 40(6), 617\u2013632 (2014)","journal-title":"TSE"},{"key":"15_CR20","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universit\u00e4t Darmstadt, Technical Report TR-2011-04 (2011)"},{"key":"15_CR21","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: NDSS (2012)"},{"key":"15_CR22","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.-R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: USENIX Security, pp. 131\u2013146 (2013)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: MobiSys, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"Information Security","author":"L Davi","year":"2011","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346\u2013360. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18178-8_30"},{"key":"15_CR25","unstructured":"Elish, K.O., Yao, D., Ryder, B.G.: On the need of precise inter-app ICC classification for detecting android malware collusions. In: MoST (2015)"},{"key":"15_CR26","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: OSDI (2011)"},{"key":"15_CR27","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defenses. In: USENIX Security, vol. 30 (2011)"},{"key":"15_CR28","unstructured":"Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android. Technical report, University of Maryland (2009)"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of android applications in DroidSafe. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23089"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app advertisements. In: WISEC, pp. 101\u2013112 (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"15_CR31","unstructured":"Grace, M.C., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock android smartphones. In: NDSS (2012)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Holavanalli, S., Manuel, D., Nanjundaswamy, V., Rosenberg, B., Shen, F., Ko, S.Y., Ziarek, L.: Flow permissions for android. In: ASE, pp. 652\u2013657 (2013)","DOI":"10.1109\/ASE.2013.6693128"},{"key":"15_CR33","unstructured":"Kim, J., Yoon, Y., Yi, K., Shin, J., Center, S.: Scandal: static analyzer for detecting privacy leaks in android applications. In: MoST 12 (2012)"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Klieber, W., Flynn, L., Bhosale, A., Jia, L., Bauer, L.: Android taint flow analysis for app sets. In: SOAP, pp. 1\u20136 (2014)","DOI":"10.1145\/2614628.2614633"},{"key":"15_CR35","unstructured":"Lam, P., Bodden, E., Lhot\u00e1k, O., Hendren, L.: The soot framework for Java program analysis: a retrospective. In: CETUS 2011 (2011)"},{"key":"15_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","volume-title":"Compiler Construction","author":"O Lhot\u00e1k","year":"2003","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling Java points-to analysis using Spark. In: Hedin, G. (ed.) CC 2003. LNCS, vol. 2622, pp. 153\u2013169. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36579-6_12"},{"key":"15_CR37","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-18467-8_34","volume-title":"ICT Systems Security and Privacy Protection","author":"L Li","year":"2015","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: ApkCombiner: combining multiple android apps to support inter-app analysis. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 513\u2013527. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_34"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: IccTA: detecting inter-component privacy leaks in android apps. In: ICSE, pp. 280\u2013291 (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Klein, J., Le Traon, Y.: Detecting privacy leaks in android apps. In: ESSoS-DS (2014)","DOI":"10.1109\/ICSE.2015.48"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Klein, J., Le Traon, Y.: Automatically exploiting potential component leaks in android applications. In: TrustCom, pp. 388\u2013397 (2014)","DOI":"10.1109\/TrustCom.2014.50"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: CHEX: statically vetting android apps for component hijacking vulnerabilities. In: CCS, pp. 229\u2013240 (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Marforio, C., Ritzdorf, H., Francillon, A., Capkun, S.: Analysis of the communication between colluding applications on modern smartphones. In: ACSAC, pp. 51\u201360 (2012)","DOI":"10.1145\/2420950.2420958"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing android sources and sinks. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23039"},{"key":"15_CR44","unstructured":"Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors. In: EuroSec, April 2013"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: POPL, pp. 49\u201361. ACM (1995)","DOI":"10.1145\/199448.199462"},{"issue":"2","key":"15_CR46","first-page":"55","volume":"4","author":"S Sakamoto","year":"2014","unstructured":"Sakamoto, S., Okuda, K., Nakatsuka, R., Yamauchi, T.: DroidTrack: tracking and visualizing information diffusion for preventing information leakage on android. JISIS 4(2), 55\u201369 (2014)","journal-title":"JISIS"},{"key":"15_CR47","unstructured":"Schlegel, R., Zhang, K., Zhou, X.-Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: NDSS, vol. 11, pp. 17\u201333 (2011)"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Seo, J., Kim, D., Cho, D., Kim, T., Shin, I.: FLEXDROID: enforcing in-app privilege separation in android. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23485"},{"key":"15_CR49","doi-asserted-by":"crossref","unstructured":"Shen, F., Vishnubhotla, N., Todarka, C., Arora, M., Dhandapani, B., Lehner, E.J., Ko, S.Y., Ziarek, L.: Information flows as a permission mechanism. In: ASE, pp. 515\u2013526 (2014)","DOI":"10.1145\/2642937.2643018"},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"15_CR51","unstructured":"Tripp, O., Rubin, J.: A bayesian approach to privacy enforcement in smartphones. In: USENIX Security, pp. 175\u2013190 (2014)"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Wei, F., Roy, S., Ou, X., et al.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. In: CCS, pp. 1329\u20131341. ACM (2014)","DOI":"10.1145\/2660267.2660357"},{"key":"15_CR53","doi-asserted-by":"crossref","unstructured":"Yang, K., Zhuge, J., Wang, Y., Zhou, L., Duan, H.: IntentFuzzer: detecting capability leaks of android applications. In: ASIACCS, pp. 531\u2013536 (2014)","DOI":"10.1145\/2590296.2590316"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M.: Leakminer: detect information leakage on android with static taint analysis. In: WCSE, pp. 101\u2013104 (2012)","DOI":"10.1109\/WCSE.2012.26"},{"key":"15_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yin, H.: AppSealer: automatic generation of vulnerability-specific patches for preventing component hijacking attacks in android applications. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23255"},{"key":"15_CR56","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T17:53:37Z","timestamp":1571075617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}