{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:43:26Z","timestamp":1773816206820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557549","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["RiskMon"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Jing","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Delaware State University, Dover, DE, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"App review - apple developer. https:\/\/developer.apple.com\/support\/appstore\/app-review\/ 2013.  App review - apple developer. https:\/\/developer.apple.com\/support\/appstore\/app-review\/ 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"Carnegie Mellon University","author":"Alberts C.","year":"2003"},{"key":"e_1_3_2_1_3_1","volume-title":"Inc.","author":"Alberts C. J.","year":"2002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Balzarotti D.","year":"2010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_7_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 2013","author":"Bugiel S.","year":"2013"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Z. Chen N. Johnson V. D'Silva S. Dai K. MacNamara T. Magrino E. Wu M. Rinard and D. Song. Contextual policy enforcement in android applications with permission event graphs. 2013.  K. Z. Chen N. Johnson V. D'Silva S. Dai K. MacNamara T. Magrino E. Wu M. Rinard and D. Song. Contextual policy enforcement in android applications with permission event graphs. 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488407"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","author":"Dietz M.","year":"2011"},{"key":"e_1_3_2_1_14_1","first-page":"255","volume-title":"OSDI","volume":"10","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. USENIX Workshop on Hot Topics in Security","author":"Felt A. P.","year":"2012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_21_1","first-page":"115","volume-title":"Advances in Neural Information Processing Systems","author":"Herbrich R.","year":"1999"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1086\/269029"},{"key":"e_1_3_2_1_25_1","unstructured":"H. Lockheimer. Android and security - official google mobile blog. http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html 2012.  H. Lockheimer. Android and security - official google mobile blog. http:\/\/googlemobile.blogspot.com\/2012\/02\/android-and-security.html 2012."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 22nd USENIX conference on Security symposium. USENIX Association","author":"Pandita R.","year":"2013"},{"key":"e_1_3_2_1_27_1","unstructured":"M. Panzarino. Google announces 900 million android activations 48 billion apps downloaded 2013.  M. Panzarino. Google announces 900 million android activations 48 billion apps downloaded 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00158"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_31_1","unstructured":"A. Robertson. Apple passes 50 billion app store downloads 2013.  A. Robertson. Apple passes 50 billion app store downloads 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of the 20th Network and Distributed System Security Symposium (NDSS 2013","author":"Smalley S.","year":"2013"},{"key":"e_1_3_2_1_35_1","unstructured":"G. Stoneburner A. Goguen and A. Feringa. Risk management guide for information technology systems. Nist special publication 800(30):800--30 2002.  G. Stoneburner A. Goguen and A. Feringa. Risk management guide for information technology systems. Nist special publication 800(30):800--30 2002."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_15"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386837"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Xu R.","year":"2012"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Yan L. K.","year":"2012"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Zhou Y.","year":"2012"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557549"}},"subtitle":["continuous and automated risk assessment of mobile applications"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":40,"alternative-id":["10.1145\/2557547.2557549","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557549","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}