{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:56:21Z","timestamp":1765230981000,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381934.2381938","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":158,"title":["Dr. Android and Mr. Hide"],"prefix":"10.1145","author":[{"given":"Jinseong","family":"Jeon","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Kristopher K.","family":"Micinski","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Jeffrey A.","family":"Vaughan","sequence":"additional","affiliation":[{"name":"LogicBlox, Atlanta, GA, USA"}]},{"given":"Ari","family":"Fogel","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]},{"given":"Nikhilesh","family":"Reddy","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]},{"given":"Jeffrey S.","family":"Foster","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Todd","family":"Millstein","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers: Principles, Techniques and Tools","author":"Aho A. V.","year":"1986","unstructured":"A. V. Aho , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques and Tools . Addison-Wesley , 1986 . A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools. Addison-Wesley, 1986."},{"key":"e_1_3_2_1_2_1","volume-title":"Emails Addresses","author":"Police Android","year":"2011","unstructured":"Android Police . Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS , Emails Addresses , Much More , Oct. 2011 . http:\/\/www.androidpolice.com\/2011\/10\/01\/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more. Android Police. Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails Addresses, Much More, Oct. 2011. http:\/\/www.androidpolice.com\/2011\/10\/01\/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_5_1","volume-title":"19th Annual Network & Distributed System Security Symposium (NDSS)","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on android . In 19th Annual Network & Distributed System Security Symposium (NDSS) , Feb 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), Feb 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949355"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight provenance for smart phone operating systems . In USENIX Security Symposium , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. McDaniel , and S. Chaudhuri . A Study of Android Application Security . In USENIX Security , 2011 . W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In USENIX Security, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security","author":"Felt A.","year":"2011","unstructured":"A. Felt , H. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In USENIX Security , 2011 . A. Felt, H. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011","year":"2011","key":"e_1_3_2_1_16_1","unstructured":"Gartner. Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011 ; Smartphone Sales Increased 42 Percent , Nov. 15 2011 . http:\/\/www.gartner.com\/it\/page.jsp?id=1848514. Gartner. Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent, Nov. 15 2011. http:\/\/www.gartner.com\/it\/page.jsp?id=1848514."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. Tool for reengineering Android apk files. http:\/\/code.google.com\/p\/android-apktool\/.  Google. Tool for reengineering Android apk files. http:\/\/code.google.com\/p\/android-apktool\/."},{"volume-title":"Dec.","year":"2011","key":"e_1_3_2_1_18_1","unstructured":"Google. 10 Billion Android Market Downloads and Counting , Dec. 2011 . http:\/\/android-developers.blogspot.com\/2011\/12\/10-billion-android-market-downloads-and.html. Google. 10 Billion Android Market Downloads and Counting, Dec. 2011. http:\/\/android-developers.blogspot.com\/2011\/12\/10-billion-android-market-downloads-and.html."},{"key":"e_1_3_2_1_19_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In NDSS , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920295"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Rubin Xu H. S.","year":"2012","unstructured":"H. S. Rubin Xu and R. Anderson . Aurasium: Practical policy enforcement for android applications . In Proceedings of the 21st USENIX Security Symposium , 2012 . H. S. Rubin Xu and R. Anderson. Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"e_1_3_2_1_30_1","volume-title":"W2SP","author":"Vidas T.","year":"2011","unstructured":"T. Vidas , N. Christin , and L. F. Cranor . Curbing Android Permission Creep . In W2SP , 2011 . T. Vidas, N. Christin, and L. F. Cranor. Curbing Android Permission Creep. In W2SP, 2011."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis . In Proceedings of the 21st USENIX Security Symposium , 2012 . L. K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. In Proceedings of the 21st USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381934.2381938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:40Z","timestamp":1750239280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381938"}},"subtitle":["fine-grained permissions in android applications"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":31,"alternative-id":["10.1145\/2381934.2381938","10.1145\/2381934"],"URL":"https:\/\/doi.org\/10.1145\/2381934.2381938","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}