{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:14Z","timestamp":1750306634080,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002843","name":"Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["13511504000"],"award-info":[{"award-number":["13511504000"]}],"id":[{"id":"10.13039\/501100002843","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103040"],"award-info":[{"award-number":["61103040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science and Technology Major Projects","award":["2012ZX03002011"],"award-info":[{"award-number":["2012ZX03002011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590314","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"483-494","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["APKLancet"],"prefix":"10.1145","author":[{"given":"Wenbo","family":"Yang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Junliang","family":"Shu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1\n   .2 percent of google play store is thief-ware study shows. http:\/\/tinyurl.com\/kvf7xvc . Online; accessed Nov-2013.  1.2 percent of google play store is thief-ware study shows. http:\/\/tinyurl.com\/kvf7xvc . Online; accessed Nov-2013."},{"key":"e_1_3_2_1_2_1","unstructured":"Ad networks - android library statistics. http:\/\/www.appbrain.com\/stats\/libraries\/ad.  Ad networks - android library statistics. http:\/\/www.appbrain.com\/stats\/libraries\/ad."},{"key":"e_1_3_2_1_3_1","unstructured":"Ad vulna: A vulnaggressive (vulnerable & aggressive) adware threatening millions. http:\/\/tinyurl.com\/pv4wts3. Online; accessed Nov-2013.  Ad vulna: A vulnaggressive (vulnerable & aggressive) adware threatening millions. http:\/\/tinyurl.com\/pv4wts3. Online; accessed Nov-2013."},{"key":"e_1_3_2_1_4_1","unstructured":"android-apktool a tool for reverse engineering android apk files. http:\/\/code.google.com\/p\/android-apktool\/. Online; accessed Nov-2013.  android-apktool a tool for reverse engineering android apk files. http:\/\/code.google.com\/p\/android-apktool\/. Online; accessed Nov-2013."},{"volume-title":"http:\/\/tinyurl.com\/mhfyv3r. Online","year":"2013","key":"e_1_3_2_1_5_1","unstructured":"Android torch app with over 50m downloads silently sent user location and device data to advertisers. http:\/\/tinyurl.com\/mhfyv3r. Online ; accessed Nov- 2013 . Android torch app with over 50m downloads silently sent user location and device data to advertisers. http:\/\/tinyurl.com\/mhfyv3r. Online; accessed Nov-2013."},{"volume-title":"http:\/\/sanddroid.xjtu.edu.cn\/. Online","year":"2013","key":"e_1_3_2_1_6_1","unstructured":"Sanddroid - an automatic android program analysis sandbox. http:\/\/sanddroid.xjtu.edu.cn\/. Online ; accessed Nov- 2013 . Sanddroid - an automatic android program analysis sandbox. http:\/\/sanddroid.xjtu.edu.cn\/. Online; accessed Nov-2013."},{"volume-title":"malware and url scanner. https:\/\/www.virustotal.com\/ note = Online","year":"2013","key":"e_1_3_2_1_7_1","unstructured":"Virustotal - free online virus , malware and url scanner. https:\/\/www.virustotal.com\/ note = Online ; accessed Nov- 2013 ,. Virustotal - free online virus, malware and url scanner. https:\/\/www.virustotal.com\/ note = Online; accessed Nov-2013,."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_10_1","first-page":"2012","author":"Davis B.","year":"2012","unstructured":"B. Davis , B. Sanders , A. Khodaverdian , and H. Chen . I-arm-droid: A rewriting framework for in-app reference monitors for android applications. Mobile Security Technologies , 2012 , 2012 . B. Davis, B. Sanders, A. Khodaverdian, and H. Chen. I-arm-droid: A rewriting framework for in-app reference monitors for android applications. Mobile Security Technologies, 2012, 2012.","journal-title":"Mobile Security Technologies"},{"key":"e_1_3_2_1_11_1","unstructured":"A. Desnos. Androguard: Reverse engineering malware and goodware analysis of android applications... and more (ninja!).  A. Desnos. Androguard: Reverse engineering malware and goodware analysis of android applications... and more (ninja!)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_16_1","unstructured":"K. Kennedy E. Gustafson and H. Chen. Quantifying the effects of removing permissions from android applications.  K. Kennedy E. Gustafson and H. Chen. Quantifying the effects of removing permissions from android applications."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_18_1","volume-title":"Adsplit: Separating smartphone advertising from applications. CoRR, abs\/1202.4030","author":"Shekhar S.","year":"2012","unstructured":"S. Shekhar , M. Dietz , and D. S. Wallach . Adsplit: Separating smartphone advertising from applications. CoRR, abs\/1202.4030 , 2012 . S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. CoRR, abs\/1202.4030, 2012."},{"key":"e_1_3_2_1_19_1","volume-title":"Evolution, detection and analysis of malware for smart devices","author":"Suarez-Tangil G.","year":"2013","unstructured":"G. Suarez-Tangil , J. Tapiador , P. Peris-Lopez , and A. Ribagorda . Evolution, detection and analysis of malware for smart devices . 2013 . G. Suarez-Tangil, J. Tapiador, P. Peris-Lopez, and A. Ribagorda. Evolution, detection and analysis of malware for smart devices. 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Sa\u0131di , and R. Anderson . Aurasium: Practical policy enforcement for android applications . In Proceedings of the 21st USENIX Security Symposium , 2012 . R. Xu, H. Sa\u0131di, and R. Anderson. Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"Aframe: Isolating advertisements from mobile applications in android","author":"Zhang X.","year":"2013","unstructured":"X. Zhang , A. Ahlawat , and W. Du . Aframe: Isolating advertisements from mobile applications in android . 2013 . X. Zhang, A. Ahlawat, and W. Du. Aframe: Isolating advertisements from mobile applications in android. 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets . In Proceedings of the 19th Annual Network and Distributed System Security Symposium , 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590314","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590314"}},"subtitle":["tumor payload diagnosis and purification for android applications"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":25,"alternative-id":["10.1145\/2590296.2590314","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590314","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}