{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:43:29Z","timestamp":1771029809946,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T00:00:00Z","timestamp":1401667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,2]]},"DOI":"10.1145\/2594368.2594390","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"204-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":278,"title":["PUMA"],"prefix":"10.1145","author":[{"given":"Shuai","family":"Hao","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Suman","family":"Nath","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"William G.J.","family":"Halfond","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android hierarchyviewer. http:\/\/developer.android.com\/tools\/help\/hierarchy-viewer.html.  Android hierarchyviewer. http:\/\/developer.android.com\/tools\/help\/hierarchy-viewer.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android uiautomator. http:\/\/developer.android.com\/tools\/help\/uiautomator\/index.html.  Android uiautomator. http:\/\/developer.android.com\/tools\/help\/uiautomator\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Google admob. http:\/\/www.google.com\/ads\/admob\/.  Google admob. http:\/\/www.google.com\/ads\/admob\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Google Play crawler. https:\/\/github.com\/Akdeniz\/google-play-crawler.  Google Play crawler. https:\/\/github.com\/Akdeniz\/google-play-crawler."},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft advertising. http:\/\/advertising.microsoft.com\/en-us\/splitter.  Microsoft advertising. http:\/\/advertising.microsoft.com\/en-us\/splitter."},{"key":"e_1_3_2_1_6_1","unstructured":"Software Testing Research Survey Bibliography. http:\/\/web.engr.illinois.edu\/~taoxie\/testingresearchsurvey.htm.  Software Testing Research Survey Bibliography. http:\/\/web.engr.illinois.edu\/~taoxie\/testingresearchsurvey.htm."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of NDSS","author":"Egele M.","year":"2011","unstructured":"M. Egele , C. Kruegel , E. Kirda , and G. Vigna . PiOS: Detecting Privacy Leaks in iOS Applications . In Proc. of NDSS , 2011 . M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proc. of NDSS, 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of ACM OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proc. of ACM OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of ACM OSDI, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of USENIX Security","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. McDaniel , and S. Chaudhuri . A Study of Android Application Security . In Proc. of USENIX Security , 2011 . W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proc. of USENIX Security, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486801"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465430"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464459"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of NSDI","author":"Liu B.","year":"2014","unstructured":"B. Liu , S. Nath , R. Govindan , and J. Liu . DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps . In Proc. of NSDI , 2014 . B. Liu, S. Nath, R. Govindan, and J. Liu. DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. In Proc. of NSDI, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of USENIX Security","author":"Livshits B.","year":"2013","unstructured":"B. Livshits and J. Jung . Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications . In Proc. of USENIX Security , 2013 . B. Livshits and J. Jung. Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. In Proc. of USENIX Security, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464452"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594377"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of ACM OSDI","author":"Ravindranath L.","year":"2012","unstructured":"L. Ravindranath , J. Padhye , S. Agarwal , R. Mahajan , I. Obermiller , and S. Shayandeh . AppInsight: Mobile App Performance Monitoring in the Wild . In Proc. of ACM OSDI , 2012 . L. Ravindranath, J. Padhye, S. Agarwal, R. Mahajan, I. Obermiller, and S. Shayandeh. AppInsight: Mobile App Performance Monitoring in the Wild. In Proc. of ACM OSDI, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522717"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"}],"event":{"name":"MobiSys'14: The 12th Annual International Conference on Mobile Systems, Applications, and Services","location":"Bretton Woods New Hampshire USA","acronym":"MobiSys'14","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 12th annual international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594368.2594390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2594368.2594390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:02Z","timestamp":1750229762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594368.2594390"}},"subtitle":["programmable UI-automation for large-scale dynamic analysis of mobile apps"],"short-title":[],"issued":{"date-parts":[[2014,6,2]]},"references-count":27,"alternative-id":["10.1145\/2594368.2594390","10.1145\/2594368"],"URL":"https:\/\/doi.org\/10.1145\/2594368.2594390","relation":{},"subject":[],"published":{"date-parts":[[2014,6,2]]},"assertion":[{"value":"2014-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}