{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T19:50:45Z","timestamp":1672775445412},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,7,31]],"date-time":"2011-07-31T00:00:00Z","timestamp":1312070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s00779-011-0437-6","type":"journal-article","created":{"date-parts":[[2011,7,29]],"date-time":"2011-07-29T22:18:59Z","timestamp":1311977939000},"page":"631-641","source":"Crossref","is-referenced-by-count":15,"title":["An Android runtime security policy enforcement framework"],"prefix":"10.1007","volume":"16","author":[{"given":"Hammad","family":"Banuri","sequence":"first","affiliation":[]},{"given":"Masoom","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Shahryar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Jawad","family":"Manzoor","sequence":"additional","affiliation":[]},{"given":"Bahar","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Yasar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohsin","family":"Yaseen","sequence":"additional","affiliation":[]},{"given":"Mir Nauman","family":"Tahir","sequence":"additional","affiliation":[]},{"given":"Tamleek","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Quratulain","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,31]]},"reference":[{"key":"437_CR1","doi-asserted-by":"crossref","unstructured":"Enck W, Ongtang M, McDaniel P (2009) On lightweight mobile phone application certification. In: Proceedings of the 16th acm conference on computer and communications security acm, pp 235\u2013245","DOI":"10.1145\/1653662.1653691"},{"key":"437_CR2","doi-asserted-by":"crossref","unstructured":"Jamaluddin J, Zotou N, Coulton P (2004) Mobile phone vulnerabilities: a new generation of malware. In: 2004, ieee international symposium on consumer electronics, 1\u20133 Sept, pp 199\u2013202","DOI":"10.1109\/ISCE.2004.1375935"},{"key":"437_CR3","unstructured":"Apple App Store Approval Process (2007) Available at: http:\/\/en.wikipedia.org\/wiki\/App . Store#Approval process, 5 March 2007"},{"key":"437_CR4","unstructured":"Khan S, Khan S, Banuri H (2009) Analysis of Dalvik virtual machine and class path library. Available at: http:\/\/imsciences.edu.pk\/serg\/wp-content\/uploads\/2009\/07\/Analysis-of-Dalvik-vm.pdf . Nov 2009"},{"key":"437_CR5","unstructured":"Android reference: security and permissions. Available at: http:\/\/developer.android.com\/guide\/topics\/security\/security.html"},{"issue":"1","key":"437_CR6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck W, Ongtang M, McDaniel P (2009) Understanding android security. IEEE Sec Privacy 7(1):50\u201357","journal-title":"IEEE Sec Privacy"},{"key":"437_CR7","unstructured":"Android reference: manifest. Available at: http:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro.html"},{"key":"437_CR8","doi-asserted-by":"crossref","unstructured":"Ongtang M, McLaughlin S, Enck W, McDaniel P (2009) Semantically rich application-centric security in android. ieee: Ann Comput Sec Appl Conf 22:340\u2013349","DOI":"10.1109\/ACSAC.2009.39"},{"key":"437_CR9","unstructured":"Android Application\u2014sms Replier 1.61a. Available at: http:\/\/developer.android.com\/guide\/topics\/security\/security.html"},{"key":"437_CR10","unstructured":"Reto M (2008) Professional android application development, by Wrox. ISBN:978-0-470-34471-2, pp 68\u201373"},{"key":"437_CR11","unstructured":"Android reference: class context. Available at: http:\/\/developer.android.com\/reference\/android\/content\/Context.html"},{"key":"437_CR12","unstructured":"Security Engineering Research Group\u2014serg reference. Available at: http:\/\/imsciences.edu.pk\/serg\/projects\/easip\/android-runtime-security-policy-enforcement-framework\/"},{"key":"437_CR13","unstructured":"Android reference: android 2.2 platform highlights. Available at: http:\/\/developer.android.com\/sdk\/android-2.2-highlights.html"},{"key":"437_CR14","unstructured":"Shankar U, Jaeger T, Sailer R (2006) Toward automated information-flow integrity verification for security-critical applications. In: Proceedings of the 13th annual network and sistributed systems security symposium. Internet Society, 2006"},{"key":"437_CR15","unstructured":"Enck W, Ongtang M, McDaniel P (2008) Mitigating android software misuse before it happens. Technical report nas-tr-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, pa, usa, November"},{"key":"437_CR16","doi-asserted-by":"crossref","unstructured":"Chaudhuri A (2009) Language-based security on android. In: Proceedings of the acm sigplan fourth workshop on programming languages and analysis for security, pp 1\u20137","DOI":"10.1145\/1554339.1554341"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0437-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0437-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0437-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T11:49:21Z","timestamp":1560426561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0437-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,31]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["437"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0437-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,31]]}}}