{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T02:24:42Z","timestamp":1725589482490},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT)","doi-asserted-by":"publisher","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/trustcom50675.2020.00086","type":"proceedings-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T04:33:34Z","timestamp":1618374814000},"page":"607-614","source":"Crossref","is-referenced-by-count":0,"title":["Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications"],"prefix":"10.1109","author":[{"given":"Eduardo","family":"Gomes","sequence":"first","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Igor","family":"Zavalyshyn","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal; UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Joao","family":"Silva","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Axel","family":"Legay","sequence":"additional","affiliation":[{"name":"UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref12","first-page":"280","article-title":"IccTA: detecting inter-component privacy leaks in Android apps","author":"li","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115639"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00012"},{"key":"ref17","article-title":"Analyzing the analyzers: Flowdroid\/ic-eta, amandroid, and droidsafe","author":"qiu","year":"0","journal-title":"Proc of isSTA"},{"key":"ref18","article-title":"On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices","author":"babil","year":"0","journal-title":"Proc of SECRYPT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref6","article-title":"A context-aware kernel ipc firewall for android","author":"wu","year":"0","journal-title":"Proc of ShmooCon"},{"key":"ref5","article-title":"ipshield: A framework for enforcing context-aware privacy","author":"chakraborty","year":"0","journal-title":"Proc of NSDI"},{"key":"ref8","article-title":"Appguard: Enforcing user requirements on android apps","author":"backes","year":"0","journal-title":"Proc of TACAS"},{"key":"ref7","article-title":"Aurasium: Practical policy enforcement for android applications","author":"xu","year":"0","journal-title":"Proc USENIX Security07"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330204"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"}],"event":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2020,12,29]]},"location":"Guangzhou, China","end":{"date-parts":[[2021,1,1]]}},"container-title":["2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9342897\/9342964\/09343138.pdf?arnumber=9343138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:52Z","timestamp":1656602332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9343138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/trustcom50675.2020.00086","relation":{},"subject":[],"published":{"date-parts":[[2020,12]]}}}