{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:56Z","timestamp":1750306076571,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science, ICT and Future Planning, Korea, under the ITRC (Information Technology Research Center)","award":["IITP-2017-2016-0-00312, IITP-2017-2016-0-00304"],"award-info":[{"award-number":["IITP-2017-2016-0-00312, IITP-2017-2016-0-00304"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,14]]},"DOI":"10.1145\/3105971.3105975","type":"proceedings-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T18:21:39Z","timestamp":1502821299000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Personal visual analytics for android security risk lifelog"],"prefix":"10.1145","author":[{"given":"Sangbong","family":"Yoo","sequence":"first","affiliation":[{"name":"Sejong University"}]},{"given":"Hong Ryeol","family":"Ryu","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Hanbyul","family":"Yeon","sequence":"additional","affiliation":[{"name":"Sejong University"}]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Yonsei University"}]},{"given":"Yun","family":"Jang","sequence":"additional","affiliation":[{"name":"Sejong University"}]}],"member":"320","published-online":{"date-parts":[[2017,8,14]]},"reference":[{"volume-title":"Updated","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"androidsoft.org. 2015 . Permission Friendly Apps . Updated March 21, 2015, https:\/\/play.google.com\/store\/apps\/details?id=org.androidsoft.app.permission. (2015). androidsoft.org. 2015. Permission Friendly Apps. Updated March 21, 2015, https:\/\/play.google.com\/store\/apps\/details?id=org.androidsoft.app.permission. (2015)."},{"key":"e_1_3_2_1_2_1","first-page":"228","article-title":"Permission-Based Android Malware","volume":"2","author":"Aung Zarni","year":"2013","unstructured":"Zarni Aung and Win Zaw . 2013 . Permission-Based Android Malware Detection. Int. Journal of Scientific & Technology Research 2 , 3 (2013), 228 -- 234 . Zarni Aung and Win Zaw. 2013. Permission-Based Android Malware Detection. Int. Journal of Scientific & Technology Research 2, 3 (2013), 228--234.","journal-title":"Journal of Scientific & Technology Research"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_4_1","unstructured":"Criniti Carlo. 2012. Permission Explorer. Updated November 1 2012 https:\/\/play.google.com\/store\/apps\/details?id=com.carlocriniti.android.permission_explorer. (2012).  Criniti Carlo. 2012. Permission Explorer. Updated November 1 2012 https:\/\/play.google.com\/store\/apps\/details?id=com.carlocriniti.android.permission_explorer. (2012)."},{"key":"e_1_3_2_1_5_1","unstructured":"Droid Mate. 2014. Permission Master. Updated October 5 2014 https:\/\/play.google.com\/store\/apps\/details?id=com.droidmate.permaster. (2014).  Droid Mate. 2014. Permission Master. Updated October 5 2014 https:\/\/play.google.com\/store\/apps\/details?id=com.droidmate.permaster. (2014)."},{"volume-title":"TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th USENIX Conference on Operating Systems Design and Implementation. 1--6.","author":"Enck William","key":"e_1_3_2_1_6_1","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010 . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th USENIX Conference on Operating Systems Design and Implementation. 1--6. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th USENIX Conference on Operating Systems Design and Implementation. 1--6."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"Communications (ICC), 2014 IEEE International Conference on. 1802--1807","author":"Finickel E.","key":"e_1_3_2_1_9_1","unstructured":"E. Finickel , A. Lahmadi , F. Beck , and O. Festor . 2014. Empirical analysis of Android logs using self-organizing maps . In Communications (ICC), 2014 IEEE International Conference on. 1802--1807 . E. Finickel, A. Lahmadi, F. Beck, and O. Festor. 2014. Empirical analysis of Android logs using self-organizing maps. In Communications (ICC), 2014 IEEE International Conference on. 1802--1807."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Nokia Mobile Data Challenge 2012 Workshop.","author":"H\u00f6ferlin Benjamin","year":"2012","unstructured":"Benjamin H\u00f6ferlin , Markus H\u00f6ferlin , and J\u00fcrgen R\u00e4uchle . 2012 . Visual Analytics of Mobile Data . In Proceedings of the Nokia Mobile Data Challenge 2012 Workshop. Benjamin H\u00f6ferlin, Markus H\u00f6ferlin, and J\u00fcrgen R\u00e4uchle. 2012. Visual Analytics of Mobile Data. In Proceedings of the Nokia Mobile Data Challenge 2012 Workshop."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. Huang M. Tory B. Aseniero L. Bartram S. Bateman S. Carpendale A. Tang and R. Woodbury. 2014. Personal Visualization and Personal Visual Analytics. Preprinted in IEEE Transactions on Visualization and Computer Graphics (2014).  D. Huang M. Tory B. Aseniero L. Bartram S. Bateman S. Carpendale A. Tang and R. Woodbury. 2014. Personal Visualization and Personal Visual Analytics. Preprinted in IEEE Transactions on Visualization and Computer Graphics (2014).","DOI":"10.1109\/TVCG.2014.2359887"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517959"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MFI.2008.4648026"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2014.6741400"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2007.4388994"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46263-9_7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12395"},{"key":"e_1_3_2_1_19_1","first-page":"269","article-title":"Information security analysis system. (July 31 2001)","volume":"6","author":"Maloney Michael P","year":"2001","unstructured":"Michael P Maloney , John M Suit , Rich Rubel , and Francis M Woodus . 2001 . Information security analysis system. (July 31 2001) . US Patent 6 , 269 ,447. Michael P Maloney, John M Suit, Rich Rubel, and Francis M Woodus. 2001. Information security analysis system. (July 31 2001). US Patent 6,269,447.","journal-title":"US Patent"},{"volume-title":"High Performance Computing Simulation (HPCS), 2014 International Conference on. 535--542","author":"Merlo A.","key":"e_1_3_2_1_20_1","unstructured":"A. Merlo , M. Migliardi , and P. Fontanelli . 2014. On energy-based profiling of malware in Android . In High Performance Computing Simulation (HPCS), 2014 International Conference on. 535--542 . A. Merlo, M. Migliardi, and P. Fontanelli. 2014. On energy-based profiling of malware in Android. In High Performance Computing Simulation (HPCS), 2014 International Conference on. 535--542."},{"volume-title":"Retrieved","year":"2011","key":"e_1_3_2_1_21_1","unstructured":"Mila. 2011 . Contagio malware dump . Retrieved July 08, 2011, http:\/\/contagiodump.blogspot.kr\/2011\/03\/take-sample-leave-sample-mobile-malware.html. (2011). Mila. 2011. Contagio malware dump. Retrieved July 08, 2011, http:\/\/contagiodump.blogspot.kr\/2011\/03\/take-sample-leave-sample-mobile-malware.html. (2011)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0511-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis.2014.54"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2005.10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"volume-title":"Updated","year":"2015","key":"e_1_3_2_1_29_1","unstructured":"SteelWorks. 2015 . APK Permission Remover . Updated December 30, 2015, https:\/\/play.google.com\/store\/apps\/details?id=com.gmail.heagoo.apkpermremover. (2015). SteelWorks. 2015. APK Permission Remover. Updated December 30, 2015, https:\/\/play.google.com\/store\/apps\/details?id=com.gmail.heagoo.apkpermremover. (2015)."},{"volume-title":"Updated","year":"2016","key":"e_1_3_2_1_30_1","unstructured":"SteelWorks. 2016 . Advanced Permission Manager . Updated January 27, 2016, https:\/\/play.google.com\/store\/apps\/details?id=com.gmail.heagoo.pmaster. (2016). SteelWorks. 2016. Advanced Permission Manager. Updated January 27, 2016, https:\/\/play.google.com\/store\/apps\/details?id=com.gmail.heagoo.pmaster. (2016)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00219-9_2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2526667.2526682"},{"volume-title":"Updated","year":"2010","key":"e_1_3_2_1_33_1","unstructured":"youten. 2010 . Permission Viewer . Updated December 23, 2010, https:\/\/play.google.com\/store\/apps\/details?id=youten.redo.pview. (2010). youten. 2010. Permission Viewer. Updated December 23, 2010, https:\/\/play.google.com\/store\/apps\/details?id=youten.redo.pview. (2010)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"VINCI '17: 10th International Symposium on Visual Information Communication and Interaction","sponsor":["KMUTT King Mongkut's University of Technology Thonburi"],"location":"Bangkok Thailand","acronym":"VINCI '17"},"container-title":["Proceedings of the 10th International Symposium on Visual Information Communication and Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3105971.3105975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3105971.3105975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:04Z","timestamp":1750217404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3105971.3105975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":34,"alternative-id":["10.1145\/3105971.3105975","10.1145\/3105971"],"URL":"https:\/\/doi.org\/10.1145\/3105971.3105975","relation":{},"subject":[],"published":{"date-parts":[[2017,8,14]]},"assertion":[{"value":"2017-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}