{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:30Z","timestamp":1772042430759,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T00:00:00Z","timestamp":1402531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1320470"],"award-info":[{"award-number":["CNS-1320470"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon","award":["ONR grant N000141310156"],"award-info":[{"award-number":["ONR grant N000141310156"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,12]]},"DOI":"10.1145\/2614628.2614633","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":153,"title":["Android taint flow analysis for app sets"],"prefix":"10.1145","author":[{"given":"William","family":"Klieber","sequence":"first","affiliation":[{"name":"CERT\/SEI, Carnegie Mellon University"}]},{"given":"Lori","family":"Flynn","sequence":"additional","affiliation":[{"name":"CERT\/SEI, Carnegie Mellon University"}]},{"given":"Amar","family":"Bhosale","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Limin","family":"Jia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2014,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_2_1","unstructured":"ECSPRIDE. DroidBench Benchmarks. Accessed 03-26-2014.  ECSPRIDE. DroidBench Benchmarks. Accessed 03-26-2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proc. OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI, 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission Re-Delegation: Attacks and Defenses . In USENIX Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In USENIX Security, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA579929"},{"key":"e_1_3_2_1_8_1","volume-title":"TU Darmstadt","author":"Fritz C.","year":"2013","unstructured":"C. Fritz . FlowDroid : A Precise and Scalable Data Flow Analysis for Android. Master's thesis , TU Darmstadt , July 2013 . C. Fritz. FlowDroid: A Precise and Scalable Data Flow Analysis for Android. Master's thesis, TU Darmstadt, July 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_10_1","volume-title":"TU Darmstadt","author":"Hausknecht D.","year":"2013","unstructured":"D. Hausknecht . Variability-aware Data-flow Analysis for Smartphone Applications. Master's thesis , TU Darmstadt , Sept. 2013 . D. Hausknecht. Variability-aware Data-flow Analysis for Smartphone Applications. Master's thesis, TU Darmstadt, Sept. 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. USENIX Security","author":"Livshits V. B.","year":"2005","unstructured":"V. B. Livshits and M. S. Lam . Finding security vulnerabilities in Java applications with static analysis . In Proc. USENIX Security , 2005 . V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. USENIX Security, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. USENIX Security","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. Le Traon . Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis . In Proc. USENIX Security , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In Proc. USENIX Security, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. CASCON","author":"Vall\u00e9e-Rai R.","year":"1999","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. Hendren , P. Lam , and V. Sundaresan . Soot - A Java bytecode optimization framework . In Proc. CASCON , 1999 . R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - A Java bytecode optimization framework. In Proc. CASCON, 1999."}],"event":{"name":"PLDI '14: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Edinburgh United Kingdom","acronym":"PLDI '14","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2614628.2614633","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2614628.2614633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:32Z","timestamp":1750231172000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2614628.2614633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,12]]},"references-count":16,"alternative-id":["10.1145\/2614628.2614633","10.1145\/2614628"],"URL":"https:\/\/doi.org\/10.1145\/2614628.2614633","relation":{},"subject":[],"published":{"date-parts":[[2014,6,12]]},"assertion":[{"value":"2014-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}