{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:42Z","timestamp":1740141282005,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/tdsc.2019.2937925","type":"journal-article","created":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T20:28:27Z","timestamp":1566937707000},"page":"1751-1761","source":"Crossref","is-referenced-by-count":2,"title":["DPC:A Dynamic Permission Control Mechanism for Android Third-Party Libraries"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-5874","authenticated-orcid":false,"given":"Fu-Hau","family":"Hsu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Central University, Taoyuan City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9921-4110","authenticated-orcid":false,"given":"Nien-Chi","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Central University, Taoyuan City, Taiwan"}]},{"given":"Yan-Ling","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Applied Foreign Languages, Chung Shan Medical University, Taichung City, Taiwan"}]},{"given":"Che-Hao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Central University, Taoyuan City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0739-6891","authenticated-orcid":false,"given":"Chuan-Sheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Central University, Taoyuan City, Taiwan"}]},{"given":"Chang-Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Central University, Taoyuan City, Taiwan"}]}],"member":"263","reference":[{"journal-title":"K9-Mail","year":"2018","key":"ref33"},{"journal-title":"AnTuTu benchmark","first-page":"2010","year":"0","key":"ref32"},{"journal-title":"Google Play Store","year":"2018","key":"ref31"},{"journal-title":"Android Open Source Project","year":"2018","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23210"},{"journal-title":"F-Secure Labs Mobile Threat Report","year":"2013","key":"ref11"},{"journal-title":"Symantec Android Uten writeup","year":"2013","author":"dong","key":"ref12"},{"key":"ref13","article-title":"Investigating user privacy in android ad libraries","volume":"10","author":"stevens","year":"2012","journal-title":"Proc Workshop Mobile Secur Technol"},{"journal-title":"Android Developers Reference Manifest file","year":"2018","key":"ref14"},{"journal-title":"Android Developers Reference ActivityManager","year":"2018","key":"ref15"},{"key":"ref16","first-page":"977","article-title":"Supor: Precise and scalable sensitive user input detection for android apps","author":"huang","year":"2015","journal-title":"Usenix Security Symp"},{"journal-title":"Google Developers AdWords API Client Libraries","year":"2018","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23353"},{"journal-title":"Google Ads Help Targeting your ads","year":"2018","key":"ref19"},{"journal-title":"Android Developers Reference ActivityManager","year":"2018","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"journal-title":"Android Developers Reference ContextWrapper","year":"2018","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref6","first-page":"499","article-title":"Android permissions remystified: A field study on contextual integrity","author":"wijesekera","year":"2015","journal-title":"USENIX Security Symposium"},{"journal-title":"Dex to Java decompiler","year":"2018","key":"ref29"},{"key":"ref5","article-title":"Longitudinal analysis of android ad library permissions","author":"book","year":"2013","journal-title":"arXiv 1303 0857"},{"journal-title":"Android Developers Reference Normal and Dangerous Permissions","year":"2018","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23082"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"journal-title":"Firm Fined for Angry Birds Mobile Billing Scam","year":"2012","author":"mikules","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref20","first-page":"22","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"Proc 20th USENIX Conf Secur"},{"key":"ref22","first-page":"1021","article-title":"Brahmastra: Driving apps to test the security of third-party components","author":"bhoraskar","year":"2014","journal-title":"Proc 23rd Usenix Conf Secur Symp"},{"key":"ref21","first-page":"113","article-title":"Automatic mediation of privacy-sensitive resource access in smartphone applications","author":"livshits","year":"2013","journal-title":"Proc 22nd USENIX Conf Secur"},{"key":"ref24","first-page":"553","article-title":"Adsplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134064"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59870-3_5"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9478312\/08815864.pdf?arnumber=8815864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T03:54:53Z","timestamp":1733889293000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8815864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2937925","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,7,1]]}}}