{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:54:16Z","timestamp":1768521256570,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11219-024-09684-2","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T10:02:15Z","timestamp":1719482535000},"page":"1175-1202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system"],"prefix":"10.1007","volume":"32","author":[{"given":"Jiaqi","family":"Yin","sequence":"first","affiliation":[]},{"given":"Sini","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yixiao","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Huibiao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"9684_CR1","doi-asserted-by":"publisher","first-page":"216671","DOI":"10.1109\/ACCESS.2020.3041432","volume":"8","author":"IM Almomani","year":"2020","unstructured":"Almomani, I. M., & Al Khayer, A. (2020). A comprehensive analysis of the android permissions system. IEEE access, 8, 216671\u2013216688.","journal-title":"IEEE access"},{"key":"9684_CR2","doi-asserted-by":"crossref","unstructured":"Au, K. W. Y., Zhou, Y. F., Huang, Z., & Lie, D. (2012). Pscout: Analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 217\u2013228).","DOI":"10.1145\/2382196.2382222"},{"key":"9684_CR3","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.cose.2017.07.002","volume":"70","author":"S Bhandari","year":"2017","unstructured":"Bhandari, S., Jaballah, W. B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M. S., Mosbah, M., & Conti, M. (2017). Android inter-app communication threats and detection techniques. Computers & Security, 70, 392\u2013421.","journal-title":"Computers & Security"},{"key":"9684_CR4","unstructured":"Biswas, S., Sohel, M., Sajal, M. M., Afrin, T., Bhuiyan, T., & Hassan, M. M. (2018). A study on remote code execution vulnerability in web applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018)\u00a0(pp. 50\u201357)."},{"key":"9684_CR5","first-page":"19","volume":"17","author":"S Bugiel","year":"2012","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A. R., & Shastry, B. (2012). Towards taming privilege-escalation attacks on android. In NDSS, 17, 19.","journal-title":"In NDSS"},{"key":"9684_CR6","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A. P., Greenwood, K., Wagner, D. (2011). Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services\u00a0(pp. 239\u2013252).","DOI":"10.1145\/1999995.2000018"},{"key":"9684_CR7","doi-asserted-by":"crossref","unstructured":"da Costa, F. H., Medeiros, I., Menezes, T., da Silva, J. V., da Silva, I. L., Bonif\u00e1cio, R., Narasimhan, K., & Ribeiro, M. (2022). Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification. Journal of Systems and Software, 183, 111092.","DOI":"10.1016\/j.jss.2021.111092"},{"key":"9684_CR8","unstructured":"Developers A. Developer guides: Intents and intent filters. https:\/\/developer.android.com\/guide\/components\/intents-filters.html. Accessed in 2023."},{"key":"9684_CR9","unstructured":"DiMarzio, J. F. (2008). Android\u2122 A Programmer\u2019s Guide."},{"key":"9684_CR10","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.cose.2014.02.007","volume":"43","author":"Z Fang","year":"2014","unstructured":"Fang, Z., Han, W., & Li, Y. (2014). Permission based android security: Issues and countermeasures. Computers & Security, 43, 205\u2013218.","journal-title":"Computers & Security"},{"issue":"5","key":"9684_CR11","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.1007\/s10664-018-9673-y","volume":"24","author":"P Gadient","year":"2019","unstructured":"Gadient, P., Ghafari, M., Frischknecht, P., & Nierstrasz, O. (2019). Security code smells in android icc. Empirical Software Engineering, 24(5), 3046\u20133076.","journal-title":"Empirical Software Engineering"},{"key":"9684_CR12","volume-title":"Communicating Sequential Processes","author":"CAR Hoare","year":"1985","unstructured":"Hoare, C. A. R. (1985). Communicating Sequential Processes. Prentice-Hall."},{"issue":"10","key":"9684_CR13","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/32.637148","volume":"23","author":"G Lowe","year":"1997","unstructured":"Lowe, G., & Roscoe, B. (1997). Using csp to detect errors in the tmn protocol. IEEE Transactions on Software Engineering, 23(10), 659\u2013669. https:\/\/doi.org\/10.1109\/32.637148","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9684_CR14","doi-asserted-by":"crossref","unstructured":"Lv, Y., Yin, J., Chen, S., & Zhu, H. (2023). Formalization and verification of the icc mechanism in android system using csp. In 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW)\u00a0(pp. 89\u201395). IEEE.","DOI":"10.1109\/ISSREW60843.2023.00053"},{"key":"9684_CR15","unstructured":"Neuner, S., Vander Veen, V., Lindorfer, M., Huber, M., Merzdovnik, G., Mulazzani, M., & Weippl, E. (2014). Enter sandbox: Android sandbox comparison. Preprint retrieved from http:\/\/arxiv.org\/abs\/1410.7749"},{"key":"9684_CR16","doi-asserted-by":"publisher","unstructured":"Samhi, J., Bartel, A., Bissyand\u00e9, T. F., & Klein, J. (2021). Raicc: Revealing atypical inter-component communication in android apps. In IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)\u00a0(pp. 1398\u20131409). https:\/\/doi.org\/10.1109\/ICSE43902.2021.00126","DOI":"10.1109\/ICSE43902.2021.00126"},{"issue":"POPL","key":"9684_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3371100","volume":"4","author":"M Sammler","year":"2019","unstructured":"Sammler, M., Garg, D., Dreyer, D., & Litak, T. (2019). The high-level benefits of low-level sandboxing. Proceedings of the ACM on Programming Languages, 4(POPL), 1\u201332.","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"9684_CR18","doi-asserted-by":"crossref","unstructured":"Vasilescu, M., Gheorghe, L., & Tapus, N. (2014). Practical malware analysis based on sandboxing. In 2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/RoEduNet-RENAM.2014.6955304"},{"key":"9684_CR19","doi-asserted-by":"crossref","unstructured":"Xu, J., Yin, J., Zhu, H., & Xiao, L. (2021). Modeling and verifying producer-consumer communication in kafka using CSP. 7th Conference on the Engineering of Computer Based Systems.","DOI":"10.1145\/3459960.3459961"},{"key":"9684_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., & Nahrstedt, K. (2013) Identity, location, disease and more: Inferring your secrets from android public resources. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security\u00a0(pp. 1017\u20131028)","DOI":"10.1145\/2508859.2516661"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-024-09684-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-024-09684-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-024-09684-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T11:30:35Z","timestamp":1721647835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-024-09684-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,27]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["9684"],"URL":"https:\/\/doi.org\/10.1007\/s11219-024-09684-2","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,27]]},"assertion":[{"value":"30 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}