{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:07:21Z","timestamp":1760044041688,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/msr.2013.6624000","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:46:58Z","timestamp":1382032018000},"page":"31-40","source":"Crossref","is-referenced-by-count":27,"title":["Asking for (and about) permissions used by Android apps"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Stevens","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Ganz","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Filkov","sequence":"additional","affiliation":[]},{"given":"Premkumar","family":"Devanbu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"journal-title":"Platform Versions","year":"2013","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SocialInformatics.2012.67"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1984701.1984706"},{"key":"16","article-title":"Crowd documentation: Exploring the coverage and the dynamics of API discussions on stack overflow","author":"parnin","year":"2012","journal-title":"Georgia Institute of Technology Tech Rep"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22362-4_20"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2180868.2180872"},{"journal-title":"How to Check Your Android Device for Rogue Apps","year":"2011","author":"lightner","key":"11"},{"journal-title":"Photo Theft Security Loophole Found in Android Too","year":"2012","author":"lowensohn","key":"12"},{"key":"21","article-title":"Curbing android permission creep","volume":"2","author":"vidas","year":"2011","journal-title":"Proceedings of Web3D"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"journal-title":"Stowaway","year":"0","key":"20"},{"journal-title":"Anubis Analyzing Unknown Binaries","year":"2013","key":"2"},{"journal-title":"Android Developer Documentation","year":"0","key":"1"},{"journal-title":"Stack Overflow Creative Commons Data Dump","year":"2009","author":"hewgill","key":"10"},{"journal-title":"Researchers Find Privacy and Security Holes in Android Apps with Ads","year":"2012","author":"gallagher","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"5","article-title":"Quire: Lightweight provenance for smart phone operating systems","author":"dietz","year":"2011","journal-title":"20th USENIX Security Symposium"},{"key":"4","article-title":"Towards taming privilege-escalation attacks on android","author":"bugiel","year":"2012","journal-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security"},{"key":"9","article-title":"Systematic detection of capability leaks in stock android smartphones","author":"grace","year":"2012","journal-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security"},{"key":"8","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","article-title":"AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale","author":"gibler","year":"2012","journal-title":"Trust and Trustworthy Computing"}],"event":{"name":"2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)","start":{"date-parts":[[2013,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 10th Working Conference on Mining Software Repositories (MSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597024\/6623991\/06624000.pdf?arnumber=6624000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:05:29Z","timestamp":1498075529000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6624000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/msr.2013.6624000","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}