{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:47:48Z","timestamp":1747284468063,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115638","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T17:03:57Z","timestamp":1511456637000},"page":"252-262","source":"Crossref","is-referenced-by-count":9,"title":["All about activity injection: Threats, semantics, and detection"],"prefix":"10.1109","author":[{"given":"Sungho","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sungjae","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Sukyoung","family":"Ryu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Addroid: Privilege separation for applications and advertisers in Android","author":"pearce","year":"2012","journal-title":"Proceedings of the 7th ACM Symposium on Information Computer and Communications Security"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23323"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660323"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660302"},{"key":"ref30","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"Sec"},{"key":"ref37","article-title":"Systematic detection of capability leaks in stock Android smartphones","author":"grace","year":"2012","journal-title":"NDSS"},{"key":"ref36","article-title":"The peril of frag-mentation: Security hazards in Android device driver customizations","author":"zhou","year":"2014","journal-title":"S&P"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1145\/1999995.2000018","article-title":"Analyzing interapplication communication in Android","author":"chin","year":"2011","journal-title":"Proceedings of the 2nd international conference on Mobile systems applications and services"},{"journal-title":"Csipsimple","year":"2017","key":"ref27"},{"key":"ref29","article-title":"Detecting passive content leaks and pollution in Android applications","author":"zhou","year":"2013","journal-title":"NDSS"},{"journal-title":"Android Activity","year":"0","key":"ref2"},{"journal-title":"U S Smartphone Use in 2015","year":"2015","author":"smith","key":"ref1"},{"journal-title":"Startapp","year":"2017","key":"ref20"},{"journal-title":"Applift","year":"2017","key":"ref22"},{"journal-title":"Appodeal","year":"2017","key":"ref21"},{"journal-title":"Apache Cordova","year":"2017","key":"ref24"},{"journal-title":"igexin","year":"2017","key":"ref23"},{"journal-title":"3c toolbox","year":"2017","key":"ref26"},{"journal-title":"Homebase sdk","year":"2017","key":"ref25"},{"key":"ref50","first-page":"543","article-title":"Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis","author":"octeau","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref54","article-title":"On the need of precise inter-app icc classification for detecting android malware collusions","author":"elish","year":"2015","journal-title":"Proceedings of IEEE Mobile Security Technologies (MoST) in conjunction with the IEEE Symposium on Security and Privacy"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref10","article-title":"Peeking into your app without actually seeing it: UI state inference and novel android attacks","author":"chen","year":"2014","journal-title":"Sec"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"journal-title":"T J Watson Libraries for Analysis","year":"2006","key":"ref14"},{"journal-title":"Apktool","year":"2010","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49538-X_5"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2666356.2594299","article-title":"Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps","volume":"49","author":"arzt","year":"2014","journal-title":"ACM SIGPLAN Notices"},{"journal-title":"activity element","year":"2017","author":"developer","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"ref4","article-title":"Towards discovering and understanding task hijacking in Android","author":"ren","year":"2015","journal-title":"Sec"},{"journal-title":"Task and back stack","year":"0","key":"ref3"},{"journal-title":"Introduction to Android","year":"0","key":"ref6"},{"journal-title":"The Android Developers Reference","year":"0","key":"ref5"},{"journal-title":"Android Intents","year":"0","key":"ref8"},{"journal-title":"Overview screen","year":"0","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"journal-title":"Operational semantics for the android activity activation mechanism","year":"2017","author":"lee","key":"ref9"},{"key":"ref46","article-title":"Phishing on mobile devices","author":"felt","year":"2011","journal-title":"Proc Workshop Web 2 0 Security & Privacy (W2SP)"},{"key":"ref45","article-title":"Touchjacking attacks on web in Android, iOS, and windows phone","author":"luo","year":"2012","journal-title":"Proceedings of the 5th International Symposium on Foundations and Practice of Security (FPS)"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1999995.2000018","article-title":"Analyzing interapplication communication in android","author":"chin","year":"2011","journal-title":"Proceedings of the 9th International Conference on Mobile Systems Applications and Services"},{"key":"ref47","article-title":"SCanDroid: Automated security certification of Android applications","author":"fuchs","year":"2009","journal-title":"Tech Rep CS-TR-4991"},{"key":"ref42","article-title":"Securing embedded user interfaces: Android and beyond","author":"roesner","year":"2013","journal-title":"Sec"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1145\/2714576.2714638","article-title":"Bittersweet adb: Attacks and defenses","author":"hwang","year":"2015","journal-title":"Proceedings of the 10th ACM Symposium on Information Computer and Communications Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.4108\/ue.1.4.e1"},{"key":"ref43","article-title":"UI redressing attacks on Android devices","author":"niemietz","year":"2012","journal-title":"Black Hat Abu Dhabi"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2017,10,30]]},"location":"Urbana, IL","end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115638.pdf?arnumber=8115638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T01:55:43Z","timestamp":1659923743000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115638","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}