{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:08:20Z","timestamp":1759133300555},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"The Shaanxi Science and Technology Coordination and Innovation Project","award":["2016TZC-G-6-3"],"award-info":[{"award-number":["2016TZC-G-6-3"]}]},{"name":"The Natural Science Basic Research Plan in Shaanxi Province of China","award":["2015JM6351"],"award-info":[{"award-number":["2015JM6351"]}]},{"name":"The Key Program of National Natural Science Foundation of China","award":["U1405255"],"award-info":[{"award-number":["U1405255"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/tdsc.2018.2814999","type":"journal-article","created":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T18:19:44Z","timestamp":1520965184000},"page":"1-1","source":"Crossref","is-referenced-by-count":10,"title":["AdCapsule: Practical Confinement of Advertisements in Android Applications"],"prefix":"10.1109","author":[{"given":"Xiaonan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jinku","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"113","article-title":"Automatic mediation of privacy-sensitive resource access in smartphone applications","author":"livshits","year":"2013","journal-title":"Proc 22nd USENIX Security Symp"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"ref70","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on android for diverse security and privacy policies","author":"bugiel","year":"2013","journal-title":"Proc 22nd USENIX Secur Symp"},{"key":"ref39","year":"2016"},{"key":"ref38","article-title":"Application-centric security policies on unmodified android","author":"reddy","year":"2011"},{"key":"ref33","year":"2013"},{"key":"ref32","year":"2015"},{"key":"ref31","year":"2013"},{"key":"ref30","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_7"},{"key":"ref36","first-page":"639","article-title":"These aren't the Droids you're looking for: Retroffiting android to protect data from imperious applications","author":"hornyack","year":"2011","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref35","year":"2016"},{"key":"ref34","year":"2013"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23323"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052998"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978322"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906413"},{"key":"ref28","year":"2018"},{"key":"ref64","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref66","first-page":"393","article-title":"TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc 9th USENIX Symp Operating Syst Des Implementation"},{"key":"ref29","year":"2016"},{"key":"ref67","first-page":"177","article-title":"PiOS: Detecting privacy leaks in iOS applications","author":"egele","year":"2011","journal-title":"Proc 18th Annu Netw Distrib Syst Secur Symp"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref69","article-title":"myTunes: Semantically linked and user-centric fine-grained privacy control on android","author":"bugiel","year":"2012"},{"key":"ref2","year":"2017"},{"key":"ref1","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.31"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"ref23","year":"2016"},{"key":"ref26","first-page":"1","article-title":"I-ARM-Droid: A rewriting framework for in-app reference monitors for android applications","author":"davis","year":"2012","journal-title":"Proceedings of the Mobile Security Technologies Workshop"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_21"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543819"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23234"},{"key":"ref57","article-title":"Longitudinal analysis of android ad library permissions","author":"book","year":"0"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"ref53","first-page":"691","article-title":"Boxify: Full-fledged app sandboxing for stock android","author":"backes","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref52","first-page":"293","article-title":"Vx32: Lightweight user-level sandboxing on the x86","author":"ford","year":"2008","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774482"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"},{"key":"ref40","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076774"},{"key":"ref13","article-title":"An empirical study of mobile ad targeting","author":"book","year":"2015","journal-title":"CoRR"},{"key":"ref14","article-title":"A study of third-party tracking by mobile apps in the wild","author":"han","year":"2011"},{"key":"ref15","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"ref19","first-page":"28","article-title":"AdSplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"Proc 21st USENIX Conf Security Symp"},{"key":"ref4","year":"2013"},{"key":"ref3","year":"2011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23082"},{"key":"ref5","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref49","author":"shneiderman","year":"2010","journal-title":"Designing the User Interface Strategies for Effective Human-Computer Interaction"},{"key":"ref9","first-page":"11","article-title":"The anatomy of Clickbot.A","author":"daswani","year":"2007","journal-title":"Proc 1st Workshop on Hot Topics in Understanding Botnets"},{"key":"ref46","year":"2016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714598"},{"key":"ref48","year":"2016"},{"key":"ref47","year":"2016"},{"key":"ref42","year":"2017"},{"key":"ref41","year":"2017"},{"key":"ref44","first-page":"27","article-title":"Aurasium: Practical policy enforcement for android applications","author":"xu","year":"2012","journal-title":"Proc 21th USENIX Secur Symp"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/08315109.pdf?arnumber=8315109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:44:24Z","timestamp":1651077864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8315109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2018.2814999","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2018]]}}}