{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T11:52:55Z","timestamp":1767181975572,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115642","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:03:57Z","timestamp":1511474637000},"page":"286-296","source":"Crossref","is-referenced-by-count":9,"title":["UI driven Android application reduction"],"prefix":"10.1109","author":[{"given":"Jianjun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yousra","family":"Aafer","sequence":"additional","affiliation":[]},{"given":"David","family":"Perry","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2804345.2804356"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786847"},{"key":"ref31","article-title":"Selectively taming background Android apps to improve battery lifetime","author":"martins","year":"2015","journal-title":"Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference USENIX ATC '15"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892218"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950348"},{"key":"ref36","article-title":"Uipicker: User-input privacy identification in mobile applications","author":"nan","year":"2015","journal-title":"Proceedings of 24th USENIX Security Symposium on USENIX Security Symposium"},{"key":"ref35","article-title":"Supor: Precise and scalable sensitive user input detection for Android apps","author":"huang","year":"2015","journal-title":"Proceedings of 24th USENIX Security Symposium on USENIX Security Symposium"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"journal-title":"Soot A framework for analyzing and transforming Java and Android Applications","year":"0","key":"ref10"},{"journal-title":"Why people block ads (and what it means for marketers and advertisers)","year":"0","author":"an","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2931021.2931026"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/2931037.2931044","article-title":"Droidra: Taming reflection to support whole-program analysis of Android apps","author":"li","year":"2016","journal-title":"Proceedings of the 25th International Symposium on Software Testing and Analysis ser ISSTA"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2017.04.001","article-title":"Static analysis of Android apps","volume":"88","author":"li","year":"2017","journal-title":"Inf Softw Technol"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref16","article-title":"Longitudinal analysis of Android ad library permissions","volume":"abs 1303 857","author":"book","year":"2013","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2896967.2896970"},{"key":"ref4","article-title":"PiOS: Detecting privacy leaks in iOS applications","author":"egele","year":"2011","journal-title":"Proceedings of the Symposium on Network and Distributed System Security NDSS-95"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1762"},{"journal-title":"Malicious Android Applications Risks and Exploitation","year":"0","author":"boutet","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23234"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897086"},{"key":"ref5","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation Ser OSDI"},{"journal-title":"Weather by WeatherBug","article-title":"Earth Networks","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.32"},{"journal-title":"Statistics of Android ad networks","year":"0","author":"brain","key":"ref2"},{"journal-title":"Privacy concerns in Android advertising libraries","year":"2013","author":"book","key":"ref9"},{"journal-title":"Mobile Now Exceeds PC The Biggest Shift since the Internet Began","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606624"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882327"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635888"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568287"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.43"},{"key":"ref25","article-title":"Removing energy code smells with reengineering services","author":"gottschalk","year":"2012","journal-title":"Informatik"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2017,10,30]]},"location":"Urbana, IL","end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115642.pdf?arnumber=8115642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T05:53:31Z","timestamp":1659938011000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115642","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}