{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:23Z","timestamp":1750306403541,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Huawei Technologies Co. Ltd. through Singapore Management University","award":["MX13C0094F"],"award-info":[{"award-number":["MX13C0094F"]}]},{"name":"National 973 Plan of China","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766518","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["CICC"],"prefix":"10.1145","author":[{"given":"Daibin","family":"Wang","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Haixia","family":"Yao","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Control Permissions For Individual Apps! http:\/\/www.androidpolice.com\/2013\/07\/25\/app-ops-android-4-3s-hidden-app-permission-manager-control-permissions-for-individual-apps\/","author":"Amadeo R.","year":"2013","unstructured":"R. Amadeo . App Ops: Android 4.3's Hidden App Permission Manager , Control Permissions For Individual Apps! http:\/\/www.androidpolice.com\/2013\/07\/25\/app-ops-android-4-3s-hidden-app-permission-manager-control-permissions-for-individual-apps\/ , 2013 . R. Amadeo. App Ops: Android 4.3's Hidden App Permission Manager, Control Permissions For Individual Apps! http:\/\/www.androidpolice.com\/2013\/07\/25\/app-ops-android-4-3s-hidden-app-permission-manager-control-permissions-for-individual-apps\/, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/play.google.com\/store\/apps\/details?id=com.antutu.ABenchMark","author":"AnTuTu Benchmark Tu.","year":"2014","unstructured":"AnTu Tu. AnTuTu Benchmark . https:\/\/play.google.com\/store\/apps\/details?id=com.antutu.ABenchMark , 2014 . AnTuTu. AnTuTu Benchmark. https:\/\/play.google.com\/store\/apps\/details?id=com.antutu.ABenchMark, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664264"},{"key":"e_1_3_2_1_5_1","volume-title":"NDSS","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on android . In NDSS , 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"volume-title":"http:\/\/blog.curesec.com\/article\/blog\/35.html","year":"2014","key":"e_1_3_2_1_7_1","unstructured":"Curesec. CVE-2013-6272. http:\/\/blog.curesec.com\/article\/blog\/35.html , 2014 . Curesec. CVE-2013-6272. http:\/\/blog.curesec.com\/article\/blog\/35.html, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: lightweight provenance for smart phone operating systems . In USENIX Security , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: lightweight provenance for smart phone operating systems. In USENIX Security, 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: attacks and defenses . In USENIX Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: attacks and defenses. In USENIX Security, 2011."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. monkeyrunner. http:\/\/developer.android.com\/tools\/help\/monkeyrunner_concepts.html 2014.  Google. monkeyrunner. http:\/\/developer.android.com\/tools\/help\/monkeyrunner_concepts.html 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"NDSS","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In NDSS , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"LBE Security Guard. https:\/\/play.google.com\/store\/apps\/details?id=com.lbe.security&hl=en","author":"LBE.","year":"2014","unstructured":"LBE. LBE Security Guard. https:\/\/play.google.com\/store\/apps\/details?id=com.lbe.security&hl=en , 2014 . LBE. LBE Security Guard. https:\/\/play.google.com\/store\/apps\/details?id=com.lbe.security&hl=en, 2014."},{"volume-title":"http:\/\/xteam.baidu.com\/?p=164","year":"2014","key":"e_1_3_2_1_13_1","unstructured":"Baidu X-team. CVE-2014-8610. http:\/\/xteam.baidu.com\/?p=164 , 2014 . Baidu X-team. CVE-2014-8610. http:\/\/xteam.baidu.com\/?p=164, 2014."}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New York New York","acronym":"WiSec'15"},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766518"}},"subtitle":["a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":13,"alternative-id":["10.1145\/2766498.2766518","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766518","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}