{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:30Z","timestamp":1759132050046,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National 973 Plan of China","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","award":["MX13C0094F"],"award-info":[{"award-number":["MX13C0094F"]}],"id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014790","name":"Singapore Management University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100014790","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2017,7,1]]},"DOI":"10.1109\/tdsc.2015.2479613","type":"journal-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T06:05:03Z","timestamp":1442556303000},"page":"350-362","source":"Crossref","is-referenced-by-count":8,"title":["A Secure, Usable, and Transparent Middleware for Permission Managers on Android"],"prefix":"10.1109","volume":"14","author":[{"given":"Daibin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haixia","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39"},{"key":"ref38","article-title":"Towards taming privilege-escalation attacks on android","author":"bugiel","year":"0","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref37","article-title":"Quire: Lightweight provenance for smart phone operating systems","author":"dietz","year":"0","journal-title":"Proc 20th USENIX Conf Security"},{"year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351722"},{"year":"0","key":"ref28"},{"year":"0","key":"ref27"},{"year":"0","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-5013-4"},{"journal-title":"Apple Cedes Market Share in Smartphone Operating System Market As Android Surges and Windows Phone Gains","year":"2013","key":"ref1"},{"journal-title":"Android Open Source Project","year":"2014","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"journal-title":"Application Fundamentals","year":"2014","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"},{"year":"0","key":"ref23"},{"journal-title":"SRT AppGuard","year":"2014","author":"appguard","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.50"},{"key":"ref50","first-page":"165","article-title":"Nativeguard: Protecting android applications from Third-party native libraries","author":"sun","year":"0","journal-title":"Proc ACM Conf Security Privacy Wireless Mobile Netw"},{"key":"ref51","first-page":"639","article-title":"These aren&#x2019;t the droids you&#x2019;re looking for:\n Retrofitting android to protect data from imperious applications","author":"hornyack","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Security"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465430"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"ref55","first-page":"27","article-title":"IdentiDroid: Android can finally wear\n its anonymous suit","volume":"7","author":"shebaro","year":"2014","journal-title":"Trans Data Privacy"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref53","first-page":"93","article-title":"Taming information-stealing smartphone\n applications (on android)","author":"zhou","year":"0","journal-title":"Proc 4th Int Conf on Trust and Trustworthy Computing"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"year":"2013","author":"amadeo","key":"ref10"},{"key":"ref11","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"0","journal-title":"Proc 20th USENIX Conf Security"},{"year":"0","key":"ref40"},{"key":"ref12","article-title":"Systematic detection of capability leaks\n in stock android smartphones","author":"grace","year":"0","journal-title":"Proc 19th Annu Netw Distrib Syst Security Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"year":"2012","author":"jiang","key":"ref14"},{"journal-title":"SEND_SMS capability leak in android open source project (AOSP)","year":"2012","author":"jiang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"year":"2014","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"year":"2014","author":"x-team","key":"ref19"},{"journal-title":"LBE","year":"2014","key":"ref4"},{"journal-title":"Understanding privacy and location services on iphone ipad and iPod touch with iOS 8","year":"2014","key":"ref3"},{"year":"2014","author":"bokhorst","key":"ref6"},{"journal-title":"Advanced permission manager","year":"2014","key":"ref5"},{"year":"2014","key":"ref8"},{"year":"2014","key":"ref7"},{"key":"ref49","first-page":"9","article-title":"AFrame:\n Isolating advertisements from mobile applications in android","author":"zhang","year":"0","journal-title":"Proc 29th Annu Comput Security Appl Conf"},{"journal-title":"Huawei Ascend P6","year":"2014","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523676"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320731"},{"key":"ref48","first-page":"553","article-title":"AdSplit: Separating smartphone advertising from applications","author":"shekhar","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"ref42","first-page":"328","article-title":"Apex:\n Extending android permission model and enforcement with User-defined runtime constraints","author":"nauman","year":"0","journal-title":"Proc 5th ACM Symp Inf Comput Commun Security"},{"year":"0","key":"ref41"},{"key":"ref44","first-page":"331","article-title":"Crepe: Context-related policy enforcement for android","author":"conti","year":"0","journal-title":"Proc 13th Int Conf Inf Security"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7971996\/07271055.pdf?arnumber=7271055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:02Z","timestamp":1633919702000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7271055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":59,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2479613","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}