{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:44:25Z","timestamp":1725583465771},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417621","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Reevaluating Android Permission Gaps with Static and Dynamic Analysis"],"prefix":"10.1109","author":[{"given":"Haoyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Xiangqun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1145\/2590296.2590316","article-title":"Intent-Fuzzer: Detecting capability leaks of Android applications","author":"yang","year":"2014","journal-title":"ACM Symposium on Information Computer & Communication Security"},{"year":"0","key":"ref11","article-title":"Ui\/application exerciser monkey"},{"year":"0","key":"ref12","article-title":"uses permission"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483777"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","article-title":"Privilege escalation attacks on android","author":"davi","year":"2011","journal-title":"the 13th Intl Conf on Information security"},{"journal-title":"AppBrain","article-title":"Google play stats","year":"0","key":"ref2"},{"year":"0","key":"ref1","article-title":"1.5 million Android devices activated every day"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480706"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T12:24:17Z","timestamp":1655382257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417621","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}