{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:17:11Z","timestamp":1730301431552,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/uemcon.2018.8796550","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T23:05:06Z","timestamp":1565910306000},"page":"726-731","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Privilege Escalation Detection in Android"],"prefix":"10.1109","author":[{"given":"Shinelle","family":"Hutchinson","sequence":"first","affiliation":[]},{"given":"Cihan","family":"Varol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512513"},{"key":"ref11","article-title":"DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)","author":"heuser","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395565"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20171205010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.29"},{"key":"ref18","article-title":"Analysing Use of High Privileges in Android Applications","author":"meng","year":"2018","journal-title":"arXiv preprint arXiv 1804 02671"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.002"},{"key":"ref4","article-title":"Google Play: Everything you need to know!","author":"bader","year":"2017","journal-title":"Android Central"},{"journal-title":"Towards Taming Privilege-Escalation Attacks on Android","year":"2012","author":"bugiel","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484359"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.059327"},{"key":"ref8","article-title":"An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks","volume":"2","author":"park","year":"2012","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.21"},{"key":"ref2","article-title":"XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks","author":"bugiel","year":"2011","journal-title":"Center for Advanced Security Research Darmstadt"},{"journal-title":"StatCounter Global Stats","article-title":"Mobile Operating System Market Share Worldwide | StatCounter Global Stats","year":"2018","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515959"},{"journal-title":"Github","article-title":"dialdroid-android","year":"0","key":"ref20"},{"year":"0","key":"ref22","article-title":"X-Ray for Android"},{"year":"0","key":"ref21","article-title":"X-Ray for Android"},{"journal-title":"FUSE Quick Reference - Galois Inc","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689705"}],"event":{"name":"2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2018,11,8]]},"location":"New York City, NY, USA","end":{"date-parts":[[2018,11,10]]}},"container-title":["2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8784356\/8796511\/08796550.pdf?arnumber=8796550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T08:40:56Z","timestamp":1580719256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8796550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2018.8796550","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}