{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:26:16Z","timestamp":1725899176645},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642348976"},{"type":"electronic","value":"9783642348983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34898-3_5","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T06:05:26Z","timestamp":1352959526000},"page":"65-80","source":"Crossref","is-referenced-by-count":5,"title":["PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems"],"prefix":"10.1007","author":[{"given":"Eric","family":"Struse","sequence":"first","affiliation":[]},{"given":"Julian","family":"Seifert","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"\u00dcllenbeck","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Rukzio","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Amer, T.S., Maris, J.B.: Signal words and signal icons in application control and information technology exception messages \u2013 hazard matching and habituation effects. Working Paper Series 06-05, Norther Arizona University (2006)"},{"key":"5_CR2","unstructured":"Anderson, J., Bonneau, J., Stajano, F.: Inglorious installers: Security in the application marketplace (2010)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: CCS 2010, pp. 73\u201384. ACM (2010)","DOI":"10.1145\/1866307.1866317"},{"key":"5_CR4","first-page":"96","volume-title":"SP 2011","author":"M. Becher","year":"2011","unstructured":"Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In: SP 2011, pp. 96\u2013111. IEEE, Washington, DC (2011)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.I.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI 2008, pp. 1065\u20131074. ACM (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"5_CR6","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: 20th USENIX Security Symposium (2011)"},{"key":"5_CR7","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Mitigating android software misuse before it happens. Technical report, Pennsylvania State University (2008)"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1145\/1653662.1653691","volume-title":"CCS 2009","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, pp. 235\u2013245. ACM, New York (2009)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security and Privacy\u00a07, 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: CCS 2011, pp. 627\u2013638. ACM (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"5_CR11","first-page":"7","volume-title":"WebApps 2011","author":"A.P. Felt","year":"2011","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: WebApps 2011, p. 7. USENIX Association, Berkeley (2011)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. Technical Report UCB\/EECS-2012-26, University of California at Berkeley (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"5_CR13","unstructured":"Google Inc. Security and permissions (2011), \n                    \n                      http:\/\/developer.android.com\/guide\/topics\/security\/security.html\n                    \n                    \n                   (last access June 20, 2012)"},{"key":"5_CR14","unstructured":"Hogben, G., Dekker, M.: Smartphones: Information security risks, opportunities and recommendations for users. Technical report, ENISA (2010)"},{"key":"5_CR15","first-page":"89","volume":"8","author":"B. Li","year":"2011","unstructured":"Li, B., Im, E.G.: Smartphone, promising battlefield for hackers. Journal of Security Engineering\u00a08, 89\u2013110 (2011) ISSN : 1738-7531","journal-title":"Journal of Security Engineering"},{"key":"5_CR16","unstructured":"Microsoft Corporation. Microsoft security intelligence report, vol. 11 (2011), \n                    \n                      http:\/\/www.microsoft.com\/security\/sir\/default.aspx\n                    \n                    \n                   (last access June 20, 2012)"},{"key":"5_CR17","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: NDSS 2011, San Diego, CA, pp. 17\u201333 (February 2011)"},{"key":"5_CR18","first-page":"87","volume-title":"ICWMC 2009","author":"W. Shin","year":"2009","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: Towards formal analysis of the permission-based security model for android. In: ICWMC 2009, pp. 87\u201392. IEEE, Washington, DC (2009)"},{"key":"5_CR19","first-page":"944","volume-title":"SOCIALCOM 2010","author":"W. Shin","year":"2010","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the android framework. In: SOCIALCOM 2010, pp. 944\u2013951. IEEE, Washington, DC (2010)"}],"container-title":["Lecture Notes in Computer Science","Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34898-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T18:52:09Z","timestamp":1557341529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34898-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642348976","9783642348983"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34898-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}