{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:53Z","timestamp":1750306133971,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3141235.3141239","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"35-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["ReDroid"],"prefix":"10.1145","author":[{"given":"Ke","family":"Tian","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Penn State Univerisity, University Park, PA, USA"}]},{"given":"Danfeng Daphne","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, blacksburg, VA, USA"}]},{"given":"Barbara G.","family":"Ryder","sequence":"additional","affiliation":[{"name":"Virginia Tech, blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Root privilege. https:\/\/blog.lookout.com\/droiddream\/. Accessed: 2017-05-02.  Android Root privilege. https:\/\/blog.lookout.com\/droiddream\/. Accessed: 2017-05-02."},{"key":"e_1_3_2_1_2_1","unstructured":"Android trojan genimi. https:\/\/nakedsecurity.sophos.com\/2010\/12\/31\/geinimi-android-trojan-horse-discovered\/. Accessed: 2017-05-02.  Android trojan genimi. https:\/\/nakedsecurity.sophos.com\/2010\/12\/31\/geinimi-android-trojan-horse-discovered\/. Accessed: 2017-05-02."},{"key":"e_1_3_2_1_3_1","unstructured":"Android trojan plankton. https:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/. Accessed: 2017-05-02.  Android trojan plankton. https:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton\/. Accessed: 2017-05-02."},{"key":"e_1_3_2_1_4_1","unstructured":"Department of defense app store. http:\/\/mashable.com\/2013\/10\/30\/department-of-defense-app-store\/#INyfw4BG2aq7. Accessed: 2017-05-02.  Department of defense app store. http:\/\/mashable.com\/2013\/10\/30\/department-of-defense-app-store\/#INyfw4BG2aq7. Accessed: 2017-05-02."},{"key":"e_1_3_2_1_5_1","unstructured":"ICC Benchmark Apps. https:\/\/github.com\/fgwei\/ICC-Bench. Accessed: 2017-05-01.  ICC Benchmark Apps. https:\/\/github.com\/fgwei\/ICC-Bench. Accessed: 2017-05-01."},{"key":"e_1_3_2_1_6_1","unstructured":"IccTA Benchmark Apps. https:\/\/github.com\/secure-software-engineering\/DroidBench\/tree\/iccta. Accessed: 2017-05-01.  IccTA Benchmark Apps. https:\/\/github.com\/secure-software-engineering\/DroidBench\/tree\/iccta. Accessed: 2017-05-01."},{"key":"e_1_3_2_1_7_1","unstructured":"Monkey Automatic input generation. https:\/\/developer.android.com\/studio\/test\/monkey.html. Accessed: 2017-05-01.  Monkey Automatic input generation. https:\/\/developer.android.com\/studio\/test\/monkey.html. Accessed: 2017-05-01."},{"key":"e_1_3_2_1_8_1","unstructured":"Virusl Total. https:\/\/www.virustotal.com. Accessed: 2017-05-01.  Virusl Total. https:\/\/www.virustotal.com. Accessed: 2017-05-01."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_13_1","unstructured":"Backes M. Bugiel S. Schranz O. von Styp-Rekowsky P. and Weisgerber S. ARTist: The Android runtime instrumentation and security toolkit.  Backes M. Bugiel S. Schranz O. von Styp-Rekowsky P. and Weisgerber S. ARTist: The Android runtime instrumentation and security toolkit."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814274"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of NDSS","author":"Bugiel S.","year":"2012","unstructured":"Bugiel , S. , Davi , L. , Dmitrienko , A. , Fischer , T. , Sadeghi , A.-R. , and Shastry , B . Towards taming privilege-escalation attacks on Android . In Proc. of NDSS ( 2012 ). Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., and Shastry, B. Towards taming privilege-escalation attacks on Android. In Proc. of NDSS (2012)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of MoST","author":"Davis B.","year":"2012","unstructured":"Davis , B. , Sanders , B. , Khodaverdian , A. , and Chen , H . I-ARM-Droid: A rewriting framework for in-app reference monitors for Android applications . Proc. of MoST ( 2012 ). Davis, B., Sanders, B., Khodaverdian, A., and Chen, H. I-ARM-Droid: A rewriting framework for in-app reference monitors for Android applications. Proc. of MoST (2012)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_15"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of NDSS","author":"Reynaud D.","year":"2012","unstructured":"Reynaud , D. , Song , D. X. , Magrino , T. R. , Wu , E. X. , and Shin , E. C. R. Freemarket: Shopping for free in Android applications . In Proc. of NDSS ( 2012 ). Reynaud, D., Song, D. X., Magrino, T. R., Wu, E. X., and Shin, E. C. R. Freemarket: Shopping for free in Android applications. In Proc. of NDSS (2012)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.33"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of IEEE Transactions TDSC","author":"Tian K.","year":"2017","unstructured":"Tian , K. , Yao , D. D. , Ryder , B. G. , Tan , G. , and Peng , G . Code-heterogeneity aware detection for repackaged malware . In Proc. of IEEE Transactions TDSC ( 2017 ). Tian, K., Yao, D. D., Ryder, B. G., Tan, G., and Peng, G. Code-heterogeneity aware detection for repackaged malware. In Proc. of IEEE Transactions TDSC (2017)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of USENIX Security","author":"Xu R.","year":"2012","unstructured":"Xu , R. , Sa\u00efdi , H. , and Anderson , R . Aurasium: Practical policy enforcement for Android applications . In Proc. of USENIX Security ( 2012 ). Xu, R., Sa\u00efdi, H., and Anderson, R. Aurasium: Practical policy enforcement for Android applications. In Proc. of USENIX Security (2012)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590309"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996760"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.002"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3141235.3141239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3141235.3141239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:13Z","timestamp":1750217833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3141235.3141239"}},"subtitle":["Prioritizing Data Flows and Sinks for App Security Transformation"],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":34,"alternative-id":["10.1145\/3141235.3141239","10.1145\/3141235"],"URL":"https:\/\/doi.org\/10.1145\/3141235.3141239","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}