{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:53:59Z","timestamp":1770969239815,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381934.2381950","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"93-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":166,"title":["SmartDroid"],"prefix":"10.1145","author":[{"given":"Cong","family":"Zheng","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]},{"given":"Shixiong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]},{"given":"Shuaifu","family":"Dai","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Xiaorui","family":"Gong","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]},{"given":"Xinhui","family":"Han","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Internet Security Technology, Beijing &amp; Peking University, Peking, China"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android market growth. http:\/\/android-developers.blogspot.com\/2011\/12\/closer-look-at-10-billion-downloads.html.  Android market growth. http:\/\/android-developers.blogspot.com\/2011\/12\/closer-look-at-10-billion-downloads.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android snapshot. http:\/\/pastebin.com\/bCieGJVV.  Android snapshot. http:\/\/pastebin.com\/bCieGJVV."},{"key":"e_1_3_2_1_3_1","unstructured":"Antiy corp. ltd. http:\/\/www.antiy.com\/cn\/about\/index.htm.  Antiy corp. ltd. http:\/\/www.antiy.com\/cn\/about\/index.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"Apktool. http:\/\/code.google.com\/p\/android-apktool\/.  Apktool. http:\/\/code.google.com\/p\/android-apktool\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Bouncer. http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html.  Bouncer. http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Contagio. http:\/\/contagiominidump.blogspot.co.il\/search\/label\/Russian.  Contagio. http:\/\/contagiominidump.blogspot.co.il\/search\/label\/Russian."},{"key":"e_1_3_2_1_7_1","unstructured":"The horoscope app. https:\/\/play.google.com\/store\/apps\/details?id=fr.telemaque.horoscope.  The horoscope app. https:\/\/play.google.com\/store\/apps\/details?id=fr.telemaque.horoscope."},{"key":"e_1_3_2_1_8_1","unstructured":"Introducing google play. http:\/\/googleblog.blogspot.com\/2012\/03\/introducing-google-play-all-your.html.  Introducing google play. http:\/\/googleblog.blogspot.com\/2012\/03\/introducing-google-play-all-your.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Jni. http:\/\/developer.android.com\/guide\/practices\/jni.html.  Jni. http:\/\/developer.android.com\/guide\/practices\/jni.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Operaupdater. http:\/\/www.18digi.com\/news\/7361\/tencent-security-laboratory-december-11-mobile-phone-viruses\/.  Operaupdater. http:\/\/www.18digi.com\/news\/7361\/tencent-security-laboratory-december-11-mobile-phone-viruses\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Sensitive apis. http:\/\/www.android-permissions.org\/.  Sensitive apis. http:\/\/www.android-permissions.org\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Mobile Security Technologies 2012, MOST '12. IEEE","author":"Benjamin Davis A. K.","year":"2012","unstructured":"A. K. Benjamin Davis , Ben Sanders and H. Chen . I-arm-droid: A rewriting framework for in-app reference monitors for android applications . In Proceedings of the Mobile Security Technologies 2012, MOST '12. IEEE , 2012 . A. K. Benjamin Davis, Ben Sanders and H. Chen. I-arm-droid: A rewriting framework for in-app reference monitors for android applications. In Proceedings of the Mobile Security Technologies 2012, MOST '12. IEEE, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_16_1","volume-title":"Department of Computer Science","author":"Dienst S.","year":"2011","unstructured":"S. Dienst and T. Berger . Mining interactions of android applications static analysis of dalvik bytecode. Technical report , Department of Computer Science , University of Leipzig , Germany, May 2011 . Technical Note. S. Dienst and T. Berger. Mining interactions of android applications static analysis of dalvik bytecode. Technical report, Department of Computer Science, University of Leipzig, Germany, May 2011. Technical Note."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10 , pages 1 -- 6 , Berkeley, CA, USA , 2010 . USENIX Association. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '11","author":"Manuel E.","year":"2011","unstructured":"E. Manuel , K. Christopher , K. Engin , and V. Giovanni . Pios: Detecting privacy leaks in ios applications . In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '11 , 2011 . E. Manuel, K. Christopher, K. Engin, and V. Giovanni. Pios: Detecting privacy leaks in ios applications. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '11, 2011."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '12","author":"Michael G.","year":"2012","unstructured":"G. Michael , Z. Yajin , W. Zhi , and J. Xuxian . Systematic detection of capability leaks in stock android smartphones . In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '12 , 2012 . G. Michael, Z. Yajin, W. Zhi, and J. Xuxian. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Network and Distributed System Security Symposium, NDSS '12, 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596550.1596592"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393666"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_3_2_1_29_1","first-page":"55","volume-title":"Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, Malware '10","author":"Thomas B.","year":"2012","unstructured":"B. Thomas , B. Leonid , S. Aubrey-Derrick , and A. C. Seyit . An android application sandbox system for suspicious software detection . In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, Malware '10 , pages 55 -- 62 , 2012 . B. Thomas, B. Leonid, S. Aubrey-Derrick, and A. C. Seyit. An android application sandbox system for suspicious software detection. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, Malware '10, pages 55--62, 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA","acronym":"CCS'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381934.2381950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:41Z","timestamp":1750239281000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381934.2381950"}},"subtitle":["an automatic system for revealing UI-based trigger conditions in android applications"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":31,"alternative-id":["10.1145\/2381934.2381950","10.1145\/2381934"],"URL":"https:\/\/doi.org\/10.1145\/2381934.2381950","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}