{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:08:52Z","timestamp":1759133332569,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3121279","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"1065-1067","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Detecting wearable app permission mismatches: a case study on Android wear"],"prefix":"10.1145","author":[{"given":"Suhaib","family":"Mujahid","sequence":"first","affiliation":[{"name":"Concordia University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_3_1","unstructured":"Android Developers Documentation. 2017. Packaging Wearable Apps. https: \/\/developer.android.com\/training\/wearables\/apps\/packaging.html. (2017). (Accessed on 01\/19\/2017).  Android Developers Documentation. 2017. Packaging Wearable Apps. https: \/\/developer.android.com\/training\/wearables\/apps\/packaging.html. (2017). (Accessed on 01\/19\/2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.41"},{"key":"e_1_3_2_1_6_1","volume-title":"2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","volume":"1","author":"Karim M. Y.","unstructured":"M. Y. Karim , H. Kagdi , and M. D. Penta . 2016. Mining Android Apps to Recommend Permissions . In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) , Vol. 1 . 427\u2013437. M. Y. Karim, H. Kagdi, and M. D. Penta. 2016. Mining Android Apps to Recommend Permissions. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Vol. 1. 427\u2013437."},{"key":"e_1_3_2_1_7_1","unstructured":"Jakob K\u00c3\u0171rner Lars Hitzges and Dennis Gehrke. 2016. Goko. http:\/\/goko.me. (2016). (Accessed on 09\/09\/2016).  Jakob K\u00c3\u0171rner Lars Hitzges and Dennis Gehrke. 2016. Goko. http:\/\/goko.me. (2016). (Accessed on 09\/09\/2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.25"},{"key":"e_1_3_2_1_9_1","unstructured":"Wearable Software. 2016. Android Wear Center. http:\/\/www.androidwearcenter. com. (2016). (Accessed on 09\/09\/2016).  Wearable Software. 2016. Android Wear Center. http:\/\/www.androidwearcenter. com. (2016). (Accessed on 09\/09\/2016)."},{"volume-title":"2013 10th Working Conference on Mining Software Repositories (MSR). 31\u201340","author":"Stevens R.","key":"e_1_3_2_1_10_1","unstructured":"R. Stevens , J. Ganz , V. Filkov , P. Devanbu , and H. Chen . 2013. Asking for (and about) permissions used by Android apps . In 2013 10th Working Conference on Mining Software Repositories (MSR). 31\u201340 . R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen. 2013. Asking for (and about) permissions used by Android apps. In 2013 10th Working Conference on Mining Software Repositories (MSR). 31\u201340."},{"key":"e_1_3_2_1_11_1","unstructured":"Connor Tumbleson and Ryszard Wi\u00c5\u017bniewski. 2017. Apktool - A tool for reverse engineering 3rd party closed binary Android apps. https:\/\/ibotpeaches.github. io\/Apktool\/. (2017). (Accessed on 05\/04\/2017). Abstract 1 Introduction 2 Related Work 3 Approach 3.1 Unpack App APKs and Extract Handheld and Wearable Mainfest Files 3.2 Detect Missing Permissions 4 Preliminary Findings 5 Conclusion and Future Work References  Connor Tumbleson and Ryszard Wi\u00c5\u017bniewski. 2017. Apktool - A tool for reverse engineering 3rd party closed binary Android apps. https:\/\/ibotpeaches.github. io\/Apktool\/. (2017). (Accessed on 05\/04\/2017). Abstract 1 Introduction 2 Related Work 3 Approach 3.1 Unpack App APKs and Extract Handheld and Wearable Mainfest Files 3.2 Detect Missing Permissions 4 Preliminary Findings 5 Conclusion and Future Work References"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Paderborn Germany","acronym":"ESEC\/FSE'17"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3121279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3121279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3121279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":11,"alternative-id":["10.1145\/3106237.3121279","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3121279","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}