{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:10:52Z","timestamp":1729635052062,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736456","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T16:27:30Z","timestamp":1478536050000},"page":"85-90","source":"Crossref","is-referenced-by-count":7,"title":["Fine-grained access control for hybrid mobile applications in Android using restricted paths"],"prefix":"10.1109","author":[{"given":"Shahrooz","family":"Pooryousef","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"429","article-title":"Privilege Separation in HTML5 Applications","author":"akhawe","year":"0"},{"journal-title":"A Source-to-source Translator for Securing JavaScript-based Web Content","year":"2008","key":"ref32"},{"journal-title":"ADSafe","year":"2008","author":"crockford","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"journal-title":"PhoneGap Essentials Building Cross-Platform Mobile Apps","year":"2012","author":"wargo","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660275"},{"key":"ref13","first-page":"46","article-title":"An-droid Security Framework: Extensible Multi-layered Access Control on Android","author":"backes","year":"0"},{"key":"ref14","first-page":"19","article-title":"Towards Taming Privilege-Escalation Attacks on Android","volume":"17","author":"bugiel","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"journal-title":"Android Open Source Project","year":"2007","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_15"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-319-26096-9_13","article-title":"The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface","volume":"9379","author":"sutcliffe","year":"2015","journal-title":"Proceedings of the 23rd International Workshop on Security Protocols"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_29"},{"key":"ref28","article-title":"Don't Kill My Ads! Balancing Privacy in an Ad-Supported Mobile Application Market","author":"leontiadis","year":"2012","journal-title":"Proc of the Workshop on Mobile Computing Systems and Applications"},{"key":"ref4","article-title":"(2014) International Data Corporation Says Android Dominated the Smartphone Market with a Share of 82.8","volume":"q2","author":"corporation","year":"2015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobicase.2014.257770"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"journal-title":"The same origin policy","year":"2001","author":"ruderman","key":"ref6"},{"key":"ref29","first-page":"371","article-title":"AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements","author":"ter louw","year":"0"},{"journal-title":"(2007) Gartner Recommends a Hybrid Approach for Business-to-Employee Mobile Apps","year":"0","key":"ref5"},{"key":"ref8","first-page":"138","article-title":"Bifocals: Analyzing Webview Vulnerabilities in Android Applications","author":"chin","year":"2013","journal-title":"Proceedings of Workshop on Information Security Application"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2688412.2688417"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27659-5_22"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23323"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_16"},{"article-title":"Are These Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces","year":"0","author":"rastogi","key":"ref22"},{"journal-title":"XML Security Control information access with XACML","year":"2004","author":"verma","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"ref23","first-page":"553","article-title":"Adsplit: Separating Smart-phone Advertising from Applications","author":"shekhar","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.32"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736456.pdf?arnumber=7736456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T06:29:41Z","timestamp":1568528981000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736456","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}