{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:35:16Z","timestamp":1768426516117,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006100","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"4997-5004","source":"Crossref","is-referenced-by-count":12,"title":["Are We Really Protected? An Investigation into the Play Protect Service"],"prefix":"10.1109","author":[{"given":"Shinelle","family":"Hutchinson","sequence":"first","affiliation":[]},{"given":"Bing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Umit","family":"Karabiyik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","year":"2019","journal-title":"PhpMyAdmin"},{"key":"ref30","year":"2019","journal-title":"WampServer"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"ref11","author":"zhang","year":"2018","journal-title":"Using AI to Hack IA A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones"},{"key":"ref12","article-title":"Forensic Analysis of Spy Applications in Android Devices","author":"hutchinson","year":"2019","journal-title":"ADFSL Conference on Digital Forensics Security and Law"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"ref14","first-page":"71","article-title":"DroidMark &#x2013; A Tool for Android Malware Detection Using Taint Analysis and Bayesian Network","volume":"6","author":"rathi","year":"2018","journal-title":"International Journal on Recent and Innovation Trends in Computing and Communication"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2594291.2594299","article-title":"FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps","volume":"49","author":"arzt","year":"2014","journal-title":"PLDI &#x2019;14 Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"ref17","year":"2019","journal-title":"Introduction to Bayesian networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2940348"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1016\/j.procs.2015.02.148","article-title":"Spyware Detection in Android Using Hybridization of Description Analysis, Permission Mapping and Interface Analysis","volume":"46","author":"kaur","year":"2015","journal-title":"Procedia Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref4","year":"2017","journal-title":"Android Security 2017 Year in Review"},{"key":"ref27","article-title":"Combating Potentially Harmful Applications with Machine Learning at Google: Datasets and Models","author":"yu","year":"2018","journal-title":"Android Developers Blog"},{"key":"ref3","year":"2018","journal-title":"Google Play Protect"},{"key":"ref6","article-title":"Google Detects Android Spyware That Spies on WhatsApp, Skype Calls","author":"kumar","year":"2017","journal-title":"The Hacker News"},{"key":"ref29","year":"2019","journal-title":"Test Google Play Protect 12 9 for Android (190110)"},{"key":"ref5","article-title":"Fake WhatsApp On Google Play Store Downloaded By Over 1 Million Android Users","author":"khandelwal","year":"2017","journal-title":"The Hacker News"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2015.7394406"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.210"},{"key":"ref2","article-title":"Google &#x2018;Bouncer&#x2019; Now Scanning Android Market for Malware","author":"albanesius","year":"2012","journal-title":"PCMAG"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2667658"},{"key":"ref1","year":"2019","journal-title":"Mobile Operating System Market Share Worldwide StatCounter Global Stats"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435516"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00065"},{"key":"ref21","year":"2018","journal-title":"OWASP Fuzzing"},{"key":"ref24","year":"2017","journal-title":"Chapter 2 SVM (Support Vector Machine) &#x2014; Theory"},{"key":"ref23","first-page":"137","article-title":"Feature selection algorithm based on random forest","volume":"44","author":"yao","year":"2014","journal-title":"Journal of Jilin University"},{"key":"ref26","author":"agrawal","year":"2017","journal-title":"Logistic Regression Simplified"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3021460.3021485"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006100.pdf?arnumber=9006100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:11Z","timestamp":1658094491000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006100\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006100","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}