{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:05:16Z","timestamp":1758704716991,"version":"3.37.3"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Spanish Government-Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["TIN2017-83494-R"],"award-info":[{"award-number":["TIN2017-83494-R"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3097152","type":"journal-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T22:28:11Z","timestamp":1627338491000},"page":"101321-101334","source":"Crossref","is-referenced-by-count":9,"title":["ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8235-7366","authenticated-orcid":false,"given":"J. A.","family":"Gomez-Hernandez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9804-8122","authenticated-orcid":false,"given":"J.","family":"Camacho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8031-1276","authenticated-orcid":false,"given":"J. A.","family":"Holgado-Terriza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6766-1936","authenticated-orcid":false,"given":"P.","family":"Garcia-Teodoro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9256-453X","authenticated-orcid":false,"given":"G.","family":"Macia-Fernandez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387469"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2015.02.016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1002\/cem.1405"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320731"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101693"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844349"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897121"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12385-7_61"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.11.12.1224-1230"},{"key":"ref35","first-page":"499","article-title":"Android permissions remystified: A field study on contextual integrity","author":"wijesekera","year":"2015","journal-title":"Proc 24th USENIX Conf Secur Symp"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433190"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"journal-title":"NetGuard A simple way to block access to the internet per application","year":"2021","author":"bokhorst","key":"ref62"},{"key":"ref61","first-page":"31","article-title":"AMon: A monitoring multidimensional feature application to secure Android environments","author":"g\u00f3mez-hern\u00e1ndez","year":"2021","journal-title":"Proc IEEE Secur Privacy Workshops (SPW)"},{"key":"ref63","first-page":"795","article-title":"Feature selection and evaluation of permission-based Android malware detection","author":"santosh","year":"2020","journal-title":"Proc 4th Int Conf Trends Electron Informat (ICOEI)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019INI0003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref27","first-page":"1","article-title":"Mobile malware detection: A survey","volume":"17","author":"hamed","year":"2019","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_16"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2019.03.004"},{"key":"ref29","first-page":"393","article-title":"TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc 5th USENIX Conf Operating Syst Design Implementation"},{"journal-title":"The STRIDE Threat Model","year":"2009","key":"ref67"},{"year":"2018","author":"shevchenko","key":"ref68"},{"key":"ref69","first-page":"1","article-title":"Experiences threat modeling at Microsoft","author":"shostack","year":"2008","journal-title":"Proc MODSEC MoDELS"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 20122017 Cisco White Paper","year":"2019","key":"ref2"},{"journal-title":"The Mobile Economy 2020 GSMA Report","year":"2020","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006358"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/09720073.2014.11891412"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022661"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070262"},{"key":"ref23","first-page":"133","article-title":"A secure screen and app lock system for Android smart phones using face recognition","author":"stoleriu","year":"2020","journal-title":"Proc 13th Int Conf Commun (COMM)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/wcne2016\/5088"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2843845"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01214-w"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.014"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918139"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060942"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0053-2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/app9020277"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1675-7_2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5220\/0007248701830192"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2018.00012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.103"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.008"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.081005"},{"journal-title":"IT Threat Evolution Q2 2020 Mobile Statistics","year":"2020","key":"ref13"},{"journal-title":"Mobile Malware and APT Espionage Prolific Pervasive and Cross-Platform","year":"2020","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.223"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070426"},{"journal-title":"Study on Mobile Device Security","year":"2017","key":"ref18"},{"journal-title":"Mobile Device Security Corporate-Owned Personally-Enabled (COPE)","year":"2019","key":"ref19"},{"journal-title":"Smartphone Market Share IDC Report","year":"2020","key":"ref4"},{"journal-title":"2020 Cyber ThreatScape Report","year":"2020","key":"ref3"},{"journal-title":"Android Mobile Security Threats","year":"2021","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006143"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102087"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/265132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01984-x"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS47731.2019.8942499"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/fi12060103"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0065-4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5232846"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1750"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09483931.pdf?arnumber=9483931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:02Z","timestamp":1639771022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9483931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3097152","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}