{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:10:55Z","timestamp":1740179455665,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T00:00:00Z","timestamp":1551052800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s42044-019-00032-3","type":"journal-article","created":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T02:58:12Z","timestamp":1551063492000},"page":"113-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A new technique for intent elicitation in Android applications"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5208-124X","authenticated-orcid":false,"given":"Mohamed A.","family":"El-Zawawy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,25]]},"reference":[{"key":"32_CR1","unstructured":"Absar, J.: Programming for the Android Dalvik Virtual Machine, 1st edn. Springer (2017) (ISBN 1461423880, 9781461423881)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., H\u00fcbner, M., Gascon, H., Rieck, K.: Drebin: efficient and explainable detection of android malware in your pocket. In: Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS\u201914) (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Chakradeo, S., Reaves, B., Traynor, P., Enck, W.: Mast: triage for market-scale mobile malware analysis. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2462096.2462100"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252. ACM (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"32_CR5","unstructured":"Desnos, A.: Android\u2013androguard: a full python tool to play with android files. \n                    https:\/\/github.com\/androguard\/androguard\/\n                    \n                   (2011). Accessed 2018"},{"key":"32_CR6","unstructured":"El-Zawawy, M.A.: Android\u2013IntGet: a tool for intent extraction from android applications. \n                    https:\/\/github.com\/maelzawawy\/IntGet\/\n                    \n                   (2018). Accessed Oct 2018"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2016.11.007","volume":"65","author":"A Feizollah","year":"2017","unstructured":"Feizollah, A., Anuar, N.B., Salleh, R., Suarez-Tangil, G., Furnell, S.: Androdialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"32_CR8","volume-title":"Android Programming: Pushing the Limits","author":"E Hellman","year":"2013","unstructured":"Hellman, E.: Android Programming: Pushing the Limits. Wiley, Hoboken (2013)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Kalkov, I., Gurghian, A., Kowalewski, S.: Predictable broadcasting of parallel intents in real-time android. In: Proceedings of the 12th International Workshop on Java Technologies for Real-Time and Embedded Systems, p.\u00a057. ACM (2014)","DOI":"10.1145\/2661020.2661023"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Kantola, D., Chin, E., He, W., Wagner, D.: Reducing attack surfaces for intra-application communication in android. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 69\u201380. ACM (2012)","DOI":"10.1145\/2381934.2381948"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Ko, R., Lee, H.-M., Jeng, A.B., Wei, T.-E.: Vulnerability detection of multiple layer colluding application through intent privilege checking. In: IT Convergence and Security (ICITCS), 2015 5th International Conference on, pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/ICITCS.2015.7293036"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: ApkCombiner: combining multiple android apps to support inter-app analysis. In: IFIP International Information Security Conference, pp. 513\u2013527. Springer (2015)","DOI":"10.1007\/978-3-319-18467-8_34"},{"key":"32_CR13","unstructured":"Richardson, L.: Beautiful soup documentation. \n                    https:\/\/www.crummy.com\/software\/BeautifulSoup\/bs4\/ doc\/\n                    \n                   (2007). Accessed Dec 2017"},{"key":"32_CR14","unstructured":"Salvia, R.: Intent flow analysis in android application. B.S. thesis, Universit\u00e0 Ca\u2019Foscari Venezia, (2016)"},{"key":"32_CR15","volume-title":"The Web Application Hacker\u2019s Handbook: Finding and Exploiting Security Flaws","author":"D Stuttard","year":"2011","unstructured":"Stuttard, D., Pinto, M.: The Web Application Hacker\u2019s Handbook: Finding and Exploiting Security Flaws. Wiley, Hoboken (2011)"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Tang, J., Cui, X., Zhao, Z., Guo, S., Xu, X., Hu, C., Ban, T., Mao, B.: NIVAnalyzer: a tool for automatically detecting and verifying next-intent vulnerabilities in android apps. In: Software Testing, Verification and Validation (ICST), 2017 IEEE International Conference on, pp. 492\u2013499. IEEE (2017)","DOI":"10.1109\/ICST.2017.56"},{"key":"32_CR17","unstructured":"Warren, T.: Android programming for beginners: the simple guide to learning android programming fast!. CreateSpace Independent Publishing Platform, USA (2015) (ISBN 1516998103, 9781516998104)"},{"key":"32_CR18","unstructured":"Winsniewski, R: Android\u2013apktool: a tool for reverse engineering android APK files. \n                    http:\/\/ibotpeaches.github.io\/Apktool\/\n                    \n                   (2012). Accessed Dec 2017"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Wu, D.-J., Mao, C.-H.. Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: android malware detection through manifest and API calls tracing. In: Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on, pp. 62\u201369. IEEE (2012)","DOI":"10.1109\/AsiaJCIS.2012.18"},{"issue":"6","key":"32_CR20","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"32_CR21","unstructured":"Zhang, L., Niu, Y., Wu, X., Wang, Z., Xue, Y.: A3: automatic analysis of android malware. In: International Workshop on Cloud Computing and Information Security (2013)"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-019-00032-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00032-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-019-00032-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,24]],"date-time":"2020-02-24T19:13:50Z","timestamp":1582571630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-019-00032-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,25]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s42044-019-00032-3","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"type":"print","value":"2520-8438"},{"type":"electronic","value":"2520-8446"}],"subject":[],"published":{"date-parts":[[2019,2,25]]},"assertion":[{"value":"19 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}