{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:02Z","timestamp":1772042402844,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,1,5]],"date-time":"2014-01-05T00:00:00Z","timestamp":1388880000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11416-013-0197-0","type":"journal-article","created":{"date-parts":[[2014,1,27]],"date-time":"2014-01-27T04:51:22Z","timestamp":1390798282000},"page":"229-238","source":"Crossref","is-referenced-by-count":4,"title":["Detecting privacy leaks in the RATP App: how we proceeded and what we found"],"prefix":"10.1007","volume":"10","author":[{"given":"Jagdish Prasad","family":"Achara","sequence":"first","affiliation":[]},{"given":"James-Douglass","family":"Lefruit","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,5]]},"reference":[{"key":"197_CR1","unstructured":"Smartphone OS market share. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24108913"},{"key":"197_CR2","unstructured":"MobileSubstrate. http:\/\/iphonedevwiki.net\/index.php\/MobileSubstrate"},{"key":"197_CR3","unstructured":"iOS Sandboxing: Apple documentation. http:\/\/developer.apple.com\/library\/ios\/#documentation\/iphone\/conceptual\/iphoneosprogrammingguide\/TheiOSEnvironment\/TheiOSEnvironment.html"},{"key":"197_CR4","unstructured":"Apple documentation on sysctl function. http:\/\/developer.apple.com\/library\/ios\/#documentation\/system\/conceptual\/manpages_iphoneos\/man3\/sysctl.3.html"},{"key":"197_CR5","unstructured":"A guide on how to decrypt iOS App binaries. http:\/\/rce64.wordpress.com\/2013\/01\/27\/private-decrypting-apps-on-ios-6-multiple-architectures-and-pie\/"},{"key":"197_CR6","unstructured":"Apple documentation on UIApplication class. http:\/\/developer.apple.com\/library\/ios\/#DOCUMENTATION\/UIKit\/Reference\/UIApplication_Class\/Reference\/Reference.html"},{"key":"197_CR7","unstructured":"Apple documentation on URLScheme. http:\/\/developer.apple.com\/library\/ios\/#featuredarticles\/iPhoneURLScheme_Reference\/Introduction\/Introduction.html#\/apple_ref\/doc\/uid\/TP40007891-SW1"},{"key":"197_CR8","unstructured":"Adgoji: A mobile analytics company. http:\/\/www.adgoji.com\/"},{"key":"197_CR9","unstructured":"IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml"},{"key":"197_CR10","unstructured":"Classdumpz: http:\/\/code.google.com\/p\/networkpx\/wiki\/class_dump_z"},{"key":"197_CR11","unstructured":"Sofialys. http:\/\/www.sofialys.com\/en\/"},{"key":"197_CR12","unstructured":"Whois service. http:\/\/en.wikipedia.org\/wiki\/Whois"},{"key":"197_CR13","unstructured":"Infosniper IP geolocalisation service. http:\/\/www.infosniper.net\/"},{"key":"197_CR14","unstructured":"Dshield tools. https:\/\/secure.dshield.org\/tools\/"},{"key":"197_CR15","unstructured":"Sofialys icon. http:\/\/88.190.216.131\/favicon.ico"},{"key":"197_CR16","unstructured":"Apple: iOS 7 returns the same value of MAC address. https:\/\/developer.apple.com\/news\/?id=8222013a"},{"key":"197_CR17","unstructured":"UIPasteboard Apple documentation. http:\/\/developer.apple.com\/library\/ios\/#documentation\/uikit\/reference\/UIPasteboard_Class\/Reference.html"},{"key":"197_CR18","unstructured":"Flurry: An analytics company. http:\/\/www.flurry.com\/flurry-analytics.html"},{"key":"197_CR19","unstructured":"OpenUDID: Alternative to UDID on iPhone. http:\/\/www.flurry.com\/flurry-analytics.html"},{"key":"197_CR20","unstructured":"iOS 6 privacy extension package. http:\/\/planete.inrialpes.fr\/~achara\/mobilitics\/iOS6PrivacyExtension.html"},{"key":"197_CR21","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the USENIX symposium on operating systems design and implementation (OSDI), Vancouver, Canada, October 2010"},{"key":"197_CR22","unstructured":"Sarwar, G., Mehani, O., Boreli, R., Kaafar, D.: On the effectiveness of dynamic Taint analysis for protecting against private information leaks on android-based devices. In: SECRYPT 2013, 10th international conference on security and cryptography, July 2013"},{"key":"197_CR23","unstructured":"Blog: RATP Android App leaking private data in clear. http:\/\/www.rfc1149.net\/blog\/2012\/03\/20\/a-qui-la-ratp-vend-elle-nos-informations-personnelles\/"},{"key":"197_CR24","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner D.: Android permissions demystified. In: Proceedings of the 18th ACM conference on computer and communications security (CCS) (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"197_CR25","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS : detecting privacy leaks in iOS applications. In: NDSS 2011, 18th Annual Network and Distributed System Security Symposium. San Diego, CA, USA, February 2011"},{"key":"197_CR26","unstructured":"Han, J., Yan, Q., Gao, D., Zhou, J., Deng, R. H.: Comparing mobile privacy protection through cross-platform applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2013"},{"key":"197_CR27","unstructured":"Androguard: http:\/\/code.google.com\/p\/androguard\/"},{"key":"197_CR28","unstructured":"MobileScope. http:\/\/www.evidon.com\/mobilescope"},{"key":"197_CR29","doi-asserted-by":"crossref","unstructured":"Agarwal, Y., Hall, M.: ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In: Proceedings of the ACM International Conference on Mobile Systems, Applications and Services (MobiSys), Taipei, June 2013","DOI":"10.1145\/2462456.2464460"},{"key":"197_CR30","doi-asserted-by":"crossref","unstructured":"Werthmann, T., Hund, R., Davi, L., Sadeghi, A.-R., Holz, T.: PSiOS: bring your own privacy & security to iOS devices. In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2013","DOI":"10.1145\/2484313.2484316"},{"key":"197_CR31","unstructured":"RATP blog, Privatics team, Inria. http:\/\/goo.gl\/dyurp"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0197-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-013-0197-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0197-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T22:07:53Z","timestamp":1565129273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-013-0197-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,5]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["197"],"URL":"https:\/\/doi.org\/10.1007\/s11416-013-0197-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,5]]}}}