{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:27Z","timestamp":1763468067971,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2187836.2187879","type":"proceedings-article","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T18:41:27Z","timestamp":1335292887000},"page":"311-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":110,"title":["Is this app safe?"],"prefix":"10.1145","author":[{"given":"Pern Hui","family":"Chia","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology, Trondheim, Norway"}]},{"given":"Yusuke","family":"Yamamoto","sequence":"additional","affiliation":[{"name":"Kyoto University, Kyoto, Japan"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","unstructured":"Android Developer's Guide -- Manifest Permissions. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html.  Android Developer's Guide -- Manifest Permissions. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Market. https:\/\/market.android.com.  Android Market. https:\/\/market.android.com."},{"key":"e_1_3_2_1_4_1","unstructured":"AppBrain. http:\/\/www.appbrain.com.  AppBrain. http:\/\/www.appbrain.com."},{"key":"e_1_3_2_1_5_1","volume-title":"Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report","author":"Barrera D.","year":"2011","unstructured":"D. Barrera , W. Enck , and P. C. van Oorschot . Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report , Carleton University , April 2011 . TR-11-06. D. Barrera, W. Enck, and P. C. van Oorschot. Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, Carleton University, April 2011. TR-11-06."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572569"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27937-9_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_25"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90089-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_13_1","unstructured":"Facebook Developers -- Permissions. https:\/\/developers.facebook.com\/docs\/reference\/api\/permissions\/.  Facebook Developers -- Permissions. https:\/\/developers.facebook.com\/docs\/reference\/api\/permissions\/."},{"key":"e_1_3_2_1_14_1","volume-title":"May","author":"WOT.","year":"2011","unstructured":"Facebook partners with WOT. Article on ArcticStartup website , May 2011 . http:\/\/www.arcticstartup.com\/2011\/05\/12\/facebook-partners-with-wot-to-protect-its-700-million-users. Facebook partners with WOT. Article on ArcticStartup website, May 2011. http:\/\/www.arcticstartup.com\/2011\/05\/12\/facebook-partners-with-wot-to-protect-its-700-million-users."},{"key":"e_1_3_2_1_15_1","unstructured":"A. P. Felt. Personal Communication.  A. P. Felt. Personal Communication."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Chrome Extensions -- Permission Warnings. http:\/\/code.google.com\/chrome\/extensions\/permission_warnings.html.  Google Chrome Extensions -- Permission Warnings. http:\/\/code.google.com\/chrome\/extensions\/permission_warnings.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Google Chrome Web Store -- Extensions. https:\/\/chrome.google.com\/webstore?category=ext.  Google Chrome Web Store -- Extensions. https:\/\/chrome.google.com\/webstore?category=ext."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078843"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943517"},{"issue":"8","key":"e_1_3_2_1_22_1","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein . Binary codes capable of correcting deletions, insertions, and reversals . Soviet Physics Doklady , 10 ( 8 ): 707 -- 710 , 1966 . V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10(8):707--710, 1966.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_1_23_1","volume-title":"April","author":"Marsall M.","year":"2011","unstructured":"M. Marsall . How HTML5 will kill the native app. Article on VentureBeat website , April 2011 . http:\/\/venturebeat.com\/2011\/04\/07\/how-html5-will-kill-the-native-app\/. M. Marsall. How HTML5 will kill the native app. Article on VentureBeat website, April 2011. http:\/\/venturebeat.com\/2011\/04\/07\/how-html5-will-kill-the-native-app\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"e_1_3_2_1_25_1","unstructured":"Our project site. http:\/\/aurora.q2s.ntnu.no\/app.  Our project site. http:\/\/aurora.q2s.ntnu.no\/app."},{"key":"e_1_3_2_1_26_1","unstructured":"Socialbakers -- Applications on Facebook. http:\/\/www.socialbakers.com\/facebook-applications.  Socialbakers -- Applications on Facebook. http:\/\/www.socialbakers.com\/facebook-applications."},{"key":"e_1_3_2_1_27_1","volume-title":"Microsoft Research","author":"Tam J.","year":"2010","unstructured":"J. Tam , R. W. Reeder , and S. Schechter . I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Technical report , Microsoft Research , 2010 . MSR-TR- 2010--54. J. Tam, R. W. Reeder, and S. Schechter. I'm Allowing What? Disclosing the authority applications demand of users as a condition of installation. Technical report, Microsoft Research, 2010. MSR-TR-2010--54."},{"key":"e_1_3_2_1_28_1","unstructured":"Watir -- Web Application Testing in Ruby. http:\/\/watir.com.  Watir -- Web Application Testing in Ruby. http:\/\/watir.com."},{"key":"e_1_3_2_1_29_1","unstructured":"Web of Trust (WOT). http:\/\/www.mywot.com.  Web of Trust (WOT). http:\/\/www.mywot.com."},{"key":"e_1_3_2_1_30_1","unstructured":"WhatApp? A Stanford Center for Internet and Society website. https:\/\/whatapp.org\/.  WhatApp? A Stanford Center for Internet and Society website. https:\/\/whatapp.org\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386837"}],"event":{"name":"WWW 2012: 21st World Wide Web Conference 2012","sponsor":["Univ. de Lyon Universite de Lyon","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Lyon France","acronym":"WWW 2012"},"container-title":["Proceedings of the 21st international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2187836.2187879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:34Z","timestamp":1750241194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187879"}},"subtitle":["a large scale study on application permissions and risk signals"],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":31,"alternative-id":["10.1145\/2187836.2187879","10.1145\/2187836"],"URL":"https:\/\/doi.org\/10.1145\/2187836.2187879","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}