{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:56Z","timestamp":1740169076726,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China Project","doi-asserted-by":"publisher","award":["61401038","61702045"],"award-info":[{"award-number":["61401038","61702045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["2015AA017202"],"award-info":[{"award-number":["2015AA017202"]}]},{"DOI":"10.13039\/501100007162","name":"Guangdong Provincial Science and Technology Department Frontier and Key Technology Innovation Project","doi-asserted-by":"publisher","award":["2016B010110002"],"award-info":[{"award-number":["2016B010110002"]}],"id":[{"id":"10.13039\/501100007162","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Grid Corporation of China Key Technology Innovation Project","award":["SGRIXTKJ[2017]265"],"award-info":[{"award-number":["SGRIXTKJ[2017]265"]}]},{"name":"BUPT Youth Research and Innovation Program","award":["2017RC40"],"award-info":[{"award-number":["2017RC40"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2747597","type":"journal-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T18:09:07Z","timestamp":1504202947000},"page":"18004-18015","source":"Crossref","is-referenced-by-count":4,"title":["CRSPR: PageRank for Android Apps"],"prefix":"10.1109","volume":"5","author":[{"given":"Chengze","family":"Li","sequence":"first","affiliation":[]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1699-2270","authenticated-orcid":false,"given":"Junfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianbo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yanhui","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/sec.524"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1248"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"key":"ref32","first-page":"1","article-title":"Permission re-delegation: Attacks and defenses","volume":"30","author":"felt","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"ref37","first-page":"1","article-title":"Detecting passive content leaks and pollution in Android applications","author":"jiang","year":"2013","journal-title":"Proc 20th Annu Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref36","first-page":"2","article-title":"A study of Android application security","volume":"2","author":"enck","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref35","first-page":"1","article-title":"The incident response playbook for Android and iOS","author":"hoog","year":"2016","journal-title":"Proc RSA Conf"},{"key":"ref34","first-page":"19","article-title":"Systematic detection of capability leaks in stock Android smartphones","volume":"14","author":"grace","year":"2012","journal-title":"Proc NDSS"},{"article-title":"Application collusion attack on the permission-based security model and its implications for modern smartphone systems","year":"2011","author":"marforio","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0289"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"article-title":"Lifting inter-app data-flow analysis to large app sets","year":"2015","author":"von rhein","key":"ref16"},{"key":"ref17","first-page":"71","article-title":"Wukong: A scalable and accurate two-phase approach to Android app clone detection","author":"wang","year":"2015","journal-title":"Proc ACM Proc Int Symp Softw Testing Anal"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"article-title":"Android&#x2014;Apktool: A tool for reverse engineering Android APK files","year":"2012","author":"winsniewski","key":"ref19"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1609\/icwsm.v3i1.13937","article-title":"Gephi: An open source software for exploring and manipulating networks","volume":"8","author":"bastian","year":"2009","journal-title":"Proc ICWSM"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/978-3-319-18467-8_34","article-title":"ApkCombiner: Combining multiple Android apps to support inter-app analysis","author":"li","year":"2015","journal-title":"Proc 30th IFIP Int Conf ICT Syst Secur Privacy Protection (SEC)"},{"journal-title":"Wandoujia Market","year":"2017","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098679"},{"key":"ref5","first-page":"819","article-title":"Boosting static analysis of android apps through code instrumentation","author":"li","year":"2016","journal-title":"Proc ACM 38th Int Conf Softw Eng Companion"},{"article-title":"Xmandroid: A new Android evolution to mitigate privilege escalation attacks","year":"2011","author":"bugiel","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2284403"},{"journal-title":"Cumulative Number of APPS Downloaded From the Google Play Store as of May 2016 (in billions)","year":"2016","key":"ref2"},{"key":"ref9","first-page":"19","article-title":"Towards taming privilege-escalation attacks on Android","volume":"17","author":"bugiel","year":"2012","journal-title":"Proc NDSS"},{"journal-title":"Number of available applications in the google play store","year":"2017","key":"ref1"},{"article-title":"Android inter-component communication analysis with the coal constant propagation language","year":"2014","author":"octeau","key":"ref20"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2666356.2594299","article-title":"Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps","volume":"49","author":"arzt","year":"2014","journal-title":"Proc SIGPLAN"},{"article-title":"The pagerank citation ranking: Bringing order to the Web","year":"1999","author":"page","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052645"},{"key":"ref42","first-page":"1","article-title":"Effective inter-component communication mapping in Android: An essential step towards holistic security analysis","author":"octeau","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/srep00113"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511513"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.50"},{"journal-title":"Myapp Market","year":"2017","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689705"},{"journal-title":"Bdsuite Android Market","year":"2017","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08023739.pdf?arnumber=8023739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T10:31:37Z","timestamp":1692959497000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8023739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2747597","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}