{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:42:49Z","timestamp":1752982969579,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T00:00:00Z","timestamp":1426464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["ACP2-GA-2013-605442,ASCENS 257414"],"award-info":[{"award-number":["ACP2-GA-2013-605442,ASCENS 257414"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Swiss National Science Foundation","doi-asserted-by":"publisher","award":["CRSII2_136225"],"award-info":[{"award-number":["CRSII2_136225"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Key Laboratory of Scalable Computing and Systems"},{"name":"Sino-Swiss Science and Technology Cooperation Institutional Partnership","award":["IP04 092010"],"award-info":[{"award-number":["IP04 092010"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272101"],"award-info":[{"award-number":["61272101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,16]]},"DOI":"10.1145\/2724525.2724566","type":"proceedings-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T12:27:54Z","timestamp":1426595274000},"page":"133-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A programming model and framework for comprehensive dynamic analysis on Android"],"prefix":"10.1145","author":[{"given":"Haiyang","family":"Sun","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China \/ University of Lugano, Switzerland"}]},{"given":"Yudi","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland"}]},{"given":"Lubom\u00edr","family":"Bulej","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland \/ Charles University, Czech Republic"}]},{"given":"Alex","family":"Villaz\u00f3n","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland \/ Universidad Privada Boliviana, Bolivia"}]},{"given":"Zhengwei","family":"Qi","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Petr","family":"T\u016fma","sequence":"additional","affiliation":[{"name":"Charles University, Czech Republic"}]},{"given":"Walter","family":"Binder","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,3,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-642-39038-8_15"},{"key":"e_1_3_2_1_2_1","first-page":"381","volume-title":"Proc. 4th Intl. Conf. on Runtime Verification","volume":"8174","author":"Arzt S.","unstructured":"S. Arzt , S. Rasthofer , and E. Bodden . Instrumenting Android and Java applications as easy as abc . In Proc. 4th Intl. Conf. on Runtime Verification , volume 8174 of LNCS, pages 364\u2013 381 . Springer, 2013. S. Arzt, S. Rasthofer, and E. Bodden. Instrumenting Android and Java applications as easy as abc. In Proc. 4th Intl. Conf. on Runtime Verification, volume 8174 of LNCS, pages 364\u2013381. Springer, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2594291.2594299"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_5_1","volume-title":"Improving privacy on Android smartphones through in-vivo bytecode instrumentation. CoRR, abs\/1208.4536","author":"Bartel A.","year":"2012","unstructured":"A. Bartel , J. Klein , M. Monperrus , K. Allix , and Y. L. Traon . Improving privacy on Android smartphones through in-vivo bytecode instrumentation. CoRR, abs\/1208.4536 , 2012 . A. Bartel, J. Klein, M. Monperrus, K. Allix, and Y. L. Traon. Improving privacy on Android smartphones through in-vivo bytecode instrumentation. CoRR, abs\/1208.4536, 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. 19th Annual Network and Distributed System Security Symp., NDSS\u201912","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on Android . In Proc. 19th Annual Network and Distributed System Security Symp., NDSS\u201912 . ISOC, 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on Android. In Proc. 19th Annual Network and Distributed System Security Symp., NDSS\u201912. ISOC, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. Mobile Security Technologies, MOST\u201912","author":"Davis B.","year":"2012","unstructured":"B. Davis , B. S, A. Khodaverdian , and H. Chen . I-ARM-droid: A rewriting framework for in-app reference monitors for Android applications . In Proc. Mobile Security Technologies, MOST\u201912 . IEEE, 2012 . B. Davis, B. S, A. Khodaverdian, and H. Chen. I-ARM-droid: A rewriting framework for in-app reference monitors for Android applications. In Proc. Mobile Security Technologies, MOST\u201912. IEEE, 2012."},{"key":"e_1_3_2_1_9_1","first-page":"23","volume-title":"Proc. 20th USENIX Security Symposium","author":"Dietz M.","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight provenance for smart phone operating systems . In Proc. 20th USENIX Security Symposium , pages 23\u2013 23 . USENIX, 2011. M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In Proc. 20th USENIX Security Symposium, pages 23\u201323. USENIX, 2011."},{"key":"e_1_3_2_1_10_1","first-page":"6","volume-title":"Proc. 9th USENIX Conf. on Operating Systems Design and Implementation, OSDI\u201910","author":"Enck W.","unstructured":"W. Enck , P. Gilbert , B. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proc. 9th USENIX Conf. on Operating Systems Design and Implementation, OSDI\u201910 , pages 1\u2013 6 . USENIX, 2010. W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. 9th USENIX Conf. on Operating Systems Design and Implementation, OSDI\u201910, pages 1\u20136. USENIX, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2046707.2046779"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2484313.2484317"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2046707.2046780"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2414740.2414747"},{"key":"e_1_3_2_1_15_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop, CETUS\u201911","author":"Lam P.","year":"2011","unstructured":"P. Lam , E. Bodden , O. Lhotak , and L. Hendren . The Soot framework for Java program analysis: a retrospective . In Cetus Users and Compiler Infrastructure Workshop, CETUS\u201911 , 2011 . P. Lam, E. Bodden, O. Lhotak, and L. Hendren. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop, CETUS\u201911, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2517208.2517219"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.4028\/www.scientific.net\/AMR.756-759.2220"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1960275.1960292"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.5555\/983238"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. 22nd USENIX Security Symposium. USENIX","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. L. Traon . Effective inter-component communication mapping in Android: An essential step towards holistic security analysis . In Proc. 22nd USENIX Security Symposium. USENIX , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in Android: An essential step towards holistic security analysis. In Proc. 22nd USENIX Security Symposium. USENIX, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2388936.2388956"},{"key":"e_1_3_2_1_23_1","volume-title":"JVM Tool Interface (JVMTI) version 1.2. Web","author":"Oracle Corporation","year":"2007","unstructured":"Oracle Corporation . JVM Tool Interface (JVMTI) version 1.2. Web pages at http:\/\/download.oracle.com\/javase\/7\/docs\/platform\/ jvmti\/jvmti.html, 2007 . Oracle Corporation. JVM Tool Interface (JVMTI) version 1.2. Web pages at http:\/\/download.oracle.com\/javase\/7\/docs\/platform\/ jvmti\/jvmti.html, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2491894.2466484"},{"key":"e_1_3_2_1_25_1","first-page":"29","volume-title":"Proc. 21st USENIX Security Symposium, Security\u201912","author":"Yan L. K.","unstructured":"L. K. Yan and H. Yin . DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis . In Proc. 21st USENIX Security Symposium, Security\u201912 , pages 29\u2013 29 . USENIX, 2012. L. K. Yan and H. Yin. DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In Proc. 21st USENIX Security Symposium, Security\u201912, pages 29\u201329. USENIX, 2012."}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"acronym":"Modularity '15","name":"Modularity '15: 14th International Conference on Modularity","location":"Fort Collins CO USA"},"container-title":["Proceedings of the 14th International Conference on Modularity"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2724525.2724566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2724525.2724566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:43Z","timestamp":1750227403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2724525.2724566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,16]]},"references-count":25,"alternative-id":["10.1145\/2724525.2724566","10.1145\/2724525"],"URL":"https:\/\/doi.org\/10.1145\/2724525.2724566","relation":{},"subject":[],"published":{"date-parts":[[2015,3,16]]},"assertion":[{"value":"2015-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}