{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:44:20Z","timestamp":1778694260245,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647851","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:01Z","timestamp":1640102881000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions"],"prefix":"10.1109","author":[{"given":"Pranav","family":"Kotak","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shweta","family":"Bhandari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Akka","family":"Zemmari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jaykrishna","family":"Joshi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2016.92"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.249"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.047"},{"key":"ref14","author":"khan","year":"2021","journal-title":"Mumbai crime Man doesn&#x2019;t share otp yet ends up losing rs 75 000"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00152"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.021"},{"key":"ref17","year":"2021","journal-title":"K-Means Clustering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.002"},{"key":"ref3","year":"2020","journal-title":"G data threat analysis 2020 cyber attacks every second"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00036"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041432"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0095"},{"key":"ref2","author":"akolawala","year":"2017","journal-title":"Malicious apps found on google play charging premium fees for fake services Check point"},{"key":"ref1","year":"2021","journal-title":"Mobile Operating System Market Share Worldwide"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"ref22","year":"2020","journal-title":"sklearn metrics silhouette score"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052990"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949067"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.07.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0238694"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2021,12,13]]},"end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647851.pdf?arnumber=9647851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:51Z","timestamp":1652187591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647851","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}