{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:02:24Z","timestamp":1763809344473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1054605","1018217"],"award-info":[{"award-number":["1054605","1018217"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590312","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"259-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Efficient, context-aware privacy leakage confinement for android applications without firmware modding"],"prefix":"10.1145","author":[{"given":"Mu","family":"Zhang","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Heng","family":"Yin","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"dex2jar. http:\/\/code.google.com\/p\/dex2jar\/.  dex2jar. http:\/\/code.google.com\/p\/dex2jar\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Privacy blocker. http:\/\/privacytools.xeudoxus.com\/.  Privacy blocker. http:\/\/privacytools.xeudoxus.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Soot: a java optimization framework. http:\/\/www.sable.mcgill.ca\/soot\/.  Soot: a java optimization framework. http:\/\/www.sable.mcgill.ca\/soot\/."},{"key":"e_1_3_2_1_4_1","unstructured":"T.j. watson libraries for analysis. http:\/\/wala.sourceforge.net.  T.j. watson libraries for analysis. http:\/\/wala.sourceforge.net."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS'13)","year":"2013","author":"Chen K. Z.","key":"e_1_3_2_1_7_1"},{"volume-title":"Proceedings of the 13th International Conference on Information Security (ISC'10)","year":"2010","author":"Conti M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949356"},{"volume-title":"Proceedings of the Mobile Security Technologies Workshop (MoST'12)","year":"2012","author":"Davis B.","key":"e_1_3_2_1_10_1"},{"volume-title":"Proceedings of 18th Annual Network and Distributed System Security Symposium (NDSS'11)","year":"2011","author":"Egele M.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)","year":"2010","author":"Enck W.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Felt A. P.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS'12)","year":"2012","author":"Grace M.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_20_1","unstructured":"C. Inc. Hp fortify source code analyzer. http:\/\/www.cigital.com\/training\/elearning\/fortify-source-code-analyzer.  C. Inc. Hp fortify source code analyzer. http:\/\/www.cigital.com\/training\/elearning\/fortify-source-code-analyzer."},{"volume-title":"Proceedings of the Mobile Security Technologies Workshop (MoST'12)","year":"2012","author":"Kim J.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"volume-title":"Proceedings of the 22th Usenix Security Symposium","year":"2013","author":"Livshits B.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232009"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"volume-title":"Proceedings of the 20th Usenix Security Symposium","year":"2012","author":"Shekhar S.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23164"},{"volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","year":"2012","author":"Xu R.","key":"e_1_3_2_1_32_1"},{"volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium","year":"2006","author":"Xu W.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium (NDSS'13)","year":"2013","author":"Zhou Y.","key":"e_1_3_2_1_37_1"},{"volume-title":"Proceedings of 19th Annual Network and Distributed System Security Symposium (NDSS'12)","year":"2012","author":"Zhou Y.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":39,"alternative-id":["10.1145\/2590296.2590312","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590312","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}