{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:16:37Z","timestamp":1715040997583},"reference-count":31,"publisher":"Elsevier","isbn-type":[{"value":"9780128046296","type":"print"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1016\/b978-0-12-804629-6.00007-9","type":"book-chapter","created":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T20:07:03Z","timestamp":1474747623000},"page":"155-166","source":"Crossref","is-referenced-by-count":0,"title":["On Discovering Vulnerabilities in Android Applications"],"prefix":"10.1016","author":[{"given":"X.","family":"Li","sequence":"first","affiliation":[]},{"given":"L.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"X.P.","family":"Luo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0065","series-title":"5th annual state of application security report","author":"Arxan, Inc","year":"2016"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0010","series-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), USENIX Association","first-page":"1021","article-title":"Brahmastra: driving apps to test the security of third-party components","author":"Bhoraskar","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0015","series-title":"Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)","article-title":"Edgeminer: automatically detecting implicit control flow transitions through the android framework","author":"Cao","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0020","series-title":"Secure coding standards","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0025","series-title":"Android Hacker\u2019s Handbook","author":"Drake","year":"2014"},{"issue":"1","key":"10.1016\/B978-0-12-804629-6.00007-9_bb0030","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","article-title":"Understanding android security","volume":"7","author":"Enck","year":"2009","journal-title":"IEEE Secur. Privacy"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0035","series-title":"Proceedings of ACM CCS","article-title":"Why eve and mallory love android: an analysis of android SSL insecurity","author":"Fahl","year":"2012"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0040","series-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","article-title":"Information-flow analysis of android applications in droidsafe","author":"Gordon","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0045","series-title":"Proceedings of NDSS","article-title":"Systematic detection of capability leaks in stock android smartphones","author":"Grace","year":"2012"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0050","series-title":"Proceedings of the 2015 International Symposium on Software Testing and Analysis","article-title":"Dynamic detection of inter-application communication vulnerabilities in android","author":"Hay","year":"2015"},{"issue":"3","key":"10.1016\/B978-0-12-804629-6.00007-9_bb0055","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2011.70","article-title":"Vulnerability detection systems: think cyborg, not robot","volume":"9","author":"Heelan","year":"2011","journal-title":"IEEE Secur. Privacy"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0060","series-title":"Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering","first-page":"54","article-title":"Pointer analysis: haven\u2019t we solved this problem yet?","author":"Hind","year":"2001"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0070","series-title":"Proceedings of ACSAC","article-title":"Morpheus: automatically generating heuristics to detect android emulators","author":"Jing","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0075","first-page":"56","article-title":"Implicit flows: can\u2019t live with \u2019em, can\u2019t live without \u2019em","author":"King","year":"2008"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0080","series-title":"Proceedings of CCS","article-title":"Chex: statically vetting android apps for component hijacking vulnerabilities","author":"Lu","year":"2012"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0085","series-title":"Proceedings of NDSS","article-title":"Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting","author":"Lu","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0090","series-title":"OWASP mobile security project","year":"2015"},{"issue":"1","key":"10.1016\/B978-0-12-804629-6.00007-9_bb0095","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MM.2015.25","article-title":"Vulhunter: toward discovering vulnerabilities in android applications","volume":"35","author":"Qian","year":"2015","journal-title":"IEEE Micro"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0100","series-title":"Proceedings of the International Symposium on Code Generation and Optimization","first-page":"143","article-title":"Static reference analysis for GUI objects in Android software","author":"Rountev","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0105","series-title":"Android users have an average of 95 apps installed on their phones, according to yahoo aviate data","author":"Sawers","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0110","series-title":"Proceedings of NDSS","article-title":"Guess who\u2019s texting you? evaluating the security of smartphone messaging applications","author":"Schrittwieser","year":"2012"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0115","series-title":"HP research finds vulnerabilities in 9 of 10 mobile apps","author":"Seltzer","year":"2013"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0120","doi-asserted-by":"crossref","DOI":"10.1145\/2664243.2664275","article-title":"Towards a scalable resource-driven approach for detecting repackaged android applications","author":"Shao","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0125","series-title":"More sound static handling of java reflection","author":"Smaragdakis","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0130","series-title":"Proceedings of NDSS","article-title":"SMV-hunter: large scale, automated detection of SSL\/TLS man-in-the-middle vulnerabilities in android apps","author":"Sounthiraraj","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0135","first-page":"635","article-title":"Unauthorized origin crossing on mobile platforms: threats and mitigation","author":"Wang","year":"2013"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0140","first-page":"1329","article-title":"Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps","author":"Wei","year":"2014"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0145","series-title":"Proceedings of ACM CCS","article-title":"The impact of vendor customizations on android security","author":"Wu","year":"2013"},{"issue":"5","key":"10.1016\/B978-0-12-804629-6.00007-9_bb0150","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1093\/comjnl\/bxv114","article-title":"A literature review of research in bug resolution: tasks, challenges and future directions","volume":"59","author":"Zhang","year":"2015","journal-title":"Comput. J."},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0155","series-title":"Proceedings of ESORICS","article-title":"Dexhunter: toward extracting hidden code from packed android applications","author":"Zhang","year":"2015"},{"key":"10.1016\/B978-0-12-804629-6.00007-9_bb0160","series-title":"Proceedings of NDSS","article-title":"Detecting passive content leaks and pollution in android applications","author":"Zhou","year":"2013"}],"container-title":["Mobile Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128046296000079?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128046296000079?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T04:22:49Z","timestamp":1536380569000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128046296000079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9780128046296"],"references-count":31,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-804629-6.00007-9","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}