{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:26Z","timestamp":1775913506327,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1109\/tmc.2018.2889495","type":"journal-article","created":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T19:28:59Z","timestamp":1545679739000},"page":"90-102","source":"Crossref","is-referenced-by-count":36,"title":["Identifying Mobile Inter-App Communication Risks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6060-4090","authenticated-orcid":false,"given":"Karim O.","family":"Elish","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-9970","authenticated-orcid":false,"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Barton","sequence":"additional","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Barbara G.","family":"Ryder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2419611"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref32","article-title":"Soot-a Java bytecode optimization framework","author":"vall","year":"1999","journal-title":"Proc Conf Centre Adv Stud Collaborative Res"},{"key":"ref31","first-page":"1","article-title":"User-centric dependence analysis for identifying malicious mobile apps","author":"elish","year":"2012","journal-title":"Proc IEEE Mobile Secur Technol Workshop Conjunction IEEE Symp Secur Privacy"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_19"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689705"},{"key":"ref36","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies","author":"bugiel","year":"2013","journal-title":"Proc 22nd USENIX Conf Secur"},{"key":"ref35","first-page":"21","article-title":"A study of Android application security","author":"enck","year":"2011","journal-title":"Proc 20th USENIX Secur Symp"},{"key":"ref34","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref15","first-page":"953","article-title":"Measuring the insecurity of mobile deep links of Android","author":"liu","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901762"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.74"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"ref5","first-page":"543","article-title":"Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis","author":"octeau","year":"2013","journal-title":"Proc Usenix Secur Symp"},{"key":"ref8","first-page":"1","article-title":"Towards taming privilege-escalation attacks on Android","author":"bugiel","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref2","first-page":"1","article-title":"On the need of precise inter-app ICC classification for detecting Android malware collusions","author":"elish","year":"2015","journal-title":"Proc IEEE Mobile Secur Technol Workshop Conjunction IEEE Symp Secur Privacy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_34"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2011.6157963"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523657"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.12"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref42","first-page":"22","article-title":"Permission re-delegation: Attacks and defenses","author":"felt","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.31"},{"key":"ref41","first-page":"346","article-title":"Privilege escalation attacks on Android","author":"davi","year":"2010","journal-title":"Proc 13th Int Conf Inf Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197233"},{"key":"ref43","first-page":"23","article-title":"QUIRE: Lightweight provenance for smart phone operating systems","author":"dietz","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.233"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8922833\/08587187.pdf?arnumber=8587187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:36:34Z","timestamp":1651077394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8587187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2018.2889495","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}