{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:47Z","timestamp":1763468207337,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2643018","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"515-526","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Information flows as a permission mechanism"],"prefix":"10.1145","author":[{"given":"Feng","family":"Shen","sequence":"first","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Namita","family":"Vishnubhotla","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Chirag","family":"Todarka","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Mohit","family":"Arora","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Babu","family":"Dhandapani","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Eric John","family":"Lehner","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Steven Y.","family":"Ko","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]},{"given":"Lukasz","family":"Ziarek","sequence":"additional","affiliation":[{"name":"University at Buffalo, The State University of New York, Buffalo, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon ec2. http:\/\/aws.amazon.com\/ec2\/.  Amazon ec2. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Avg threat labs.http:\/\/www.avgthreatlabs.com\/android-app-reports\/app\/_pkg=com.bluecode.photo.space.effects.apk.  Avg threat labs.http:\/\/www.avgthreatlabs.com\/android-app-reports\/app\/_pkg=com.bluecode.photo.space.effects.apk."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"key":"e_1_3_2_1_11_1","volume-title":"Pios: Detecting privacy leaks in ios applications","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . Pios: Detecting privacy leaks in ios applications . In NDSS. The Internet Society , 2011 . Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. Pios: Detecting privacy leaks in ios applications. In NDSS. The Internet Society, 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 11th Annual Workshop on the Economics of Information Security (WEIS)","author":"Egelman Serge","year":"2012","unstructured":"Serge Egelman , Adrienne P. Felt , and David Wagner . Choice Architecture and Smartphone Privacy: There's A Price for That . In Proceedings of the 11th Annual Workshop on the Economics of Information Security (WEIS) , 2012 . Serge Egelman, Adrienne P. Felt, and David Wagner. Choice Architecture and Smartphone Privacy: There's A Price for That. In Proceedings of the 11th Annual Workshop on the Economics of Information Security (WEIS), 2012."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . Taintdroid: an information-ow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10 , pages 1 -- 6 , Berkeley, CA, USA , 2010 . USENIX Association. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: an information-ow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 20th USENIX conference on Security, SEC'11","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J. Wang , Alexander Moshchuk , Steven Hanna , and Erika Chin . Permission re-delegation: attacks and defenses . In Proceedings of the 20th USENIX conference on Security, SEC'11 , 2011 . Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steven Hanna, and Erika Chin. Permission re-delegation: attacks and defenses. In Proceedings of the 20th USENIX conference on Security, SEC'11, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Adam P. Fuchs Avik Chaudhuri and Jeffrey S. Foster. Scandroid: Automated security certification of android applications.  Adam P. Fuchs Avik Chaudhuri and Jeffrey S. Foster. Scandroid: Automated security certification of android applications."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693128"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_24_1","volume-title":"USA","author":"Kim Jinyung","year":"2012","unstructured":"Jinyung Kim , Yongho Yoon , Kwangkeun Yi , and Junbum Shin . ScanDal : Static analyzer for detecting privacy leaks in android applications. In Hao Chen, Larry Koved, and Dan S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA , USA , May 2012 . IEEE. Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum Shin. ScanDal: Static analyzer for detecting privacy leaks in android applications. In Hao Chen, Larry Koved, and Dan S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA, USA, May 2012. IEEE."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232009"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.052540"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13)","author":"Octeau Damien","year":"2013","unstructured":"Damien Octeau , Patrick McDaniel , Somesh Jha , Alexandre Bartel , , Eric Bodden , Jacques Klein , and Yves Le Traon . Effective inter-component communication mapping in android: An essential step towards holistic security analysis . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13) , 2013 . Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, , Eric Bodden, Jacques Klein, and Yves Le Traon. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security'13), 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"e_1_3_2_1_33_1","first-page":"13","volume-title":"Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99","author":"Rai Raja Vall","unstructured":"Raja Vall ee- Rai , Phong Co , Etienne Gagnon , Laurie Hendren , Patrick Lam , and Vijay Sundaresan . Soot - a java bytecode optimization framework . In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99 , pages 13 --. IBM Press, 1999. Raja Vall ee-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan. Soot - a java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, CASCON '99, pages 13--. IBM Press, 1999."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-46423-9_2","volume-title":"Proceedings of the 9th International Conference on Compiler Construction, CC '00","author":"Rai Raja Vall","year":"2000","unstructured":"Raja Vall ee- Rai , Etienne Gagnon , Laurie J. Hendren , Patrick Lam , Patrice Pominville , and Vijay Sundaresan . Optimizing java bytecode using the soot framework: Is it feasible? In Proceedings of the 9th International Conference on Compiler Construction, CC '00 , pages 18 -- 34 , London, UK, UK , 2000 . Springer-Verlag. Raja Vall ee-Rai, Etienne Gagnon, Laurie J. Hendren, Patrick Lam, Patrice Pominville, and Vijay Sundaresan. Optimizing java bytecode using the soot framework: Is it feasible? In Proceedings of the 9th International Conference on Compiler Construction, CC '00, pages 18--34, London, UK, UK, 2000. Springer-Verlag."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394504.1394506"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351689"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Xu Rubin","year":"2012","unstructured":"Rubin Xu , Hassen Sa\u00efAurasium : practical policy enforcement for android applications . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , 2012 . Rubin Xu, Hassen Sa\u00efAurasium: practical policy enforcement for android applications. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2643018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":40,"alternative-id":["10.1145\/2642937.2643018","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2643018","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}