{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:29:31Z","timestamp":1767338971289,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"Korean Government","doi-asserted-by":"publisher","award":["NRF-2021R1A2B5B03002118"],"award-info":[{"award-number":["NRF-2021R1A2B5B03002118"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT (MSIT), South Korea, under the Information Technology Research Center (ITRC) Support Program","doi-asserted-by":"publisher","award":["IITP-2021-0-01835"],"award-info":[{"award-number":["IITP-2021-0-01835"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3142345","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T20:55:14Z","timestamp":1643057714000},"page":"7973-7988","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Protection Framework for Android"],"prefix":"10.1109","volume":"10","author":[{"given":"Bharavi","family":"Mishra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1801-0023","authenticated-orcid":false,"given":"Aastha","family":"Agarwal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5479-4545","authenticated-orcid":false,"given":"Ayush","family":"Goel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9732-4137","authenticated-orcid":false,"given":"Aman Ahmad","family":"Ansari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9466-7417","authenticated-orcid":false,"given":"Pramod","family":"Gaur","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6475-4491","authenticated-orcid":false,"given":"Dilbag","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8528-5778","authenticated-orcid":false,"given":"Heung-No","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume-title":"Mobile Operating System Market Share Worldwide | StatCounter Global Stats","year":"2020","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9538-9"},{"volume-title":"Android Security 2017 Year in Review 2","year":"2020","key":"ref4"},{"volume-title":"Android Security 2018 Year in Review 2","year":"2020","key":"ref5"},{"volume-title":"Biggest App Stores in the World 2020 | Statista","year":"2020","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046626"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3081616"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-020-00739-8"},{"volume-title":"Android Architecture | Android Open Source Project","year":"2020","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2018.1505327"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418501328"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664265"},{"key":"ref14","first-page":"1005","article-title":"ASM: A programmable interface for extending Android security","volume-title":"Proc. 23rd USENIX Secur. Symp. (USENIX Security)","author":"Heuser"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.74"},{"volume-title":"Android Platform | Android Developers","year":"2020","key":"ref16"},{"volume-title":"Mobile & Tablet Android Version Market Share Worldwide | StatCounter Global Stats","year":"2020","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_30"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509549"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.07.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2017.7925347"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180172"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"ref24","article-title":"Obfuscation-resilient Android malware analysis based on contrastive learning","volume-title":"arXiv:2107.03799","author":"Wu","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041432"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375746"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102696"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3039472"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110533"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967139"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3119980"},{"volume-title":"HLPSL Tutorial: A Beginner\u2019s Guide to Modelling and Analysing Internet Security Protocols","year":"2006","key":"ref32"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09678364.pdf?arnumber=9678364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:20:56Z","timestamp":1705184456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3142345","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}