{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:39Z","timestamp":1750221159083,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196533","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"765-776","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Droid M+"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Gasparis","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Azeem","family":"Aqil","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Srikanth V.","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Rajiv","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Edward","family":"Colbert","sequence":"additional","affiliation":[{"name":"U.S. Army Research Lab, Adelphi, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Y. Acar M. Backes S. Fahl S. Garfinkel D. Kim M. Mazurek and C. Stransky. 2017. Comparing the usability of cryptographic APIs. IEEE S&P.  Y. Acar M. Backes S. Fahl S. Garfinkel D. Kim M. Mazurek and C. Stransky. 2017. Comparing the usability of cryptographic APIs. IEEE S&P.","DOI":"10.1109\/SP.2017.52"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"P. Andriotis M. Sasse and G. Stringhini. 2016. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model IEEE Workshop on Information Forensics and Security (WIFS).  P. Andriotis M. Sasse and G. Stringhini. 2016. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model IEEE Workshop on Information Forensics and Security (WIFS).","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"e_1_3_2_1_3_1","unstructured":"Androguard. 2016. Tool to play with apk files. (2016). https:\/\/goo.gl\/edcClw  Androguard. 2016. Tool to play with apk files. (2016). https:\/\/goo.gl\/edcClw"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/goo.gl\/9kiCgg","author":"Share Android","year":"2017","unstructured":"Android. 2017. Android Share . ( 2017 ). https:\/\/goo.gl\/9kiCgg Android. 2017. Android Share. (2017). https:\/\/goo.gl\/9kiCgg"},{"volume-title":"Task List.","year":"2016","key":"e_1_3_2_1_5_1","unstructured":"Any.do. 2016. To-do list , Task List. ( 2016 ). https:\/\/goo.gl\/rPpZq8 Any.do. 2016. To-do list, Task List. (2016). https:\/\/goo.gl\/rPpZq8"},{"key":"e_1_3_2_1_6_1","unstructured":"AOP. {n. d.}. Aspect Oriented Programming. (. {n. d.}). http:\/\/goo.gl\/1UnkGS  AOP. {n. d.}. Aspect Oriented Programming. (. {n. d.}). http:\/\/goo.gl\/1UnkGS"},{"key":"e_1_3_2_1_7_1","unstructured":"Apktool. 2016. Reverse engineering apk files. (2016). https:\/\/goo.gl\/JCh7U7  Apktool. 2016. Reverse engineering apk files. (2016). https:\/\/goo.gl\/JCh7U7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_9_1","unstructured":"B.Liu M.S. Andersen F.Schaub H.Almuhimedi S.Zhang N.Sadeh Y.Agarwal and A.Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions ACM SOUPS.  B.Liu M.S. Andersen F.Schaub H.Almuhimedi S.Zhang N.Sadeh Y.Agarwal and A.Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions ACM SOUPS."},{"key":"e_1_3_2_1_10_1","unstructured":"Google Developers. 2016. Improving Code Inspection with Annotations. (2016). http:\/\/goo.gl\/qSE9dh  Google Developers. 2016. Improving Code Inspection with Annotations. (2016). http:\/\/goo.gl\/qSE9dh"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897914"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2016 a. Material Design Patterns. (2016). https:\/\/goo.gl\/QQcfEv  Google. 2016 a. Material Design Patterns. (2016). https:\/\/goo.gl\/QQcfEv"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2016 b. Requesting Runtime Permissions. (2016). https:\/\/goo.gl\/0enMi9  Google. 2016 b. Requesting Runtime Permissions. (2016). https:\/\/goo.gl\/0enMi9"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2016 c. Runtime Permissions Basic Sample. (2016). https:\/\/goo.gl\/t59Dw9  Google. 2016 c. Runtime Permissions Basic Sample. (2016). https:\/\/goo.gl\/t59Dw9"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2017. Google Play Store. (2017). https:\/\/goo.gl\/kN0Nhz  Google. 2017. Google Play Store. (2017). https:\/\/goo.gl\/kN0Nhz"},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2018. Play Store Top Charts. (2018). https:\/\/goo.gl\/uPr4nj  Google. 2018. Play Store Top Charts. (2018). https:\/\/goo.gl\/uPr4nj"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702370"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381944"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_26_1","unstructured":"B. Livshits and J. Jung. 2013. Automatic mediation of privacy-sensitive resource access in smartphone applications USENIX Security.   B. Livshits and J. Jung. 2013. Automatic mediation of privacy-sensitive resource access in smartphone applications USENIX Security."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568288"},{"key":"e_1_3_2_1_28_1","unstructured":"H. Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. (2004).  H. Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. (2004)."},{"key":"e_1_3_2_1_29_1","unstructured":"K. Olmstead and M. Atkinson. 2015. Apps Permissions in the Google Play Store. (2015). http:\/\/goo.gl\/ph7KGk  K. Olmstead and M. Atkinson. 2015. Apps Permissions in the Google Play Store. (2015). http:\/\/goo.gl\/ph7KGk"},{"key":"e_1_3_2_1_30_1","unstructured":"Oracle. 2016. Java SE Annotations. (2016). http:\/\/goo.gl\/g9b0Dh  Oracle. 2016. Java SE Annotations. (2016). http:\/\/goo.gl\/g9b0Dh"},{"key":"e_1_3_2_1_31_1","volume-title":"Whyper: Towards automating risk assessment of mobile applications USENIX Security.","author":"Pandita R.","year":"2013","unstructured":"R. Pandita , X. Xiao , W. Yang , W. Enck , and T. Xie . 2013 . Whyper: Towards automating risk assessment of mobile applications USENIX Security. R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. 2013. Whyper: Towards automating risk assessment of mobile applications USENIX Security."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"volume-title":"https:\/\/goo.gl\/MhLqGW","year":"2016","key":"e_1_3_2_1_33_1","unstructured":"Ringdroid. 2016. Ringdroid. ( 2016 ). https:\/\/goo.gl\/MhLqGW Ringdroid. 2016. Ringdroid. (2016). https:\/\/goo.gl\/MhLqGW"},{"key":"e_1_3_2_1_34_1","volume-title":"Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS.","author":"Schlegel R.","year":"2011","unstructured":"R. Schlegel , K. Zhang , X. Zhou , M. Intwala , A. Kapadia , and X. Wang . 2011 . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS."},{"key":"e_1_3_2_1_35_1","volume-title":"Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework NDSS.","author":"Shao Y.","year":"2016","unstructured":"Y. Shao , J. Ott , Q. Chen , Z. Qian , and Z. M. Mao . 2016 . Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework NDSS. Y. Shao, J. Ott, Q.Chen, Z. Qian, and Z. M. Mao. 2016. Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework NDSS."},{"volume-title":"Asian Symposium on Programming Languages and Systems. Springer.","author":"Smaragdakis Y.","key":"e_1_3_2_1_36_1","unstructured":"Y. Smaragdakis , G. Balatsouras , G. Kastrinis , and M. Bravenboer . 2015. More sound static handling of Java reflection . In Asian Symposium on Programming Languages and Systems. Springer. Y. Smaragdakis, G. Balatsouras, G. Kastrinis, and M. Bravenboer. 2015. More sound static handling of Java reflection. In Asian Symposium on Programming Languages and Systems. Springer."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_3_2_1_38_1","unstructured":"Z. Templeman R and. Rahman D. Crandall and A. Kapadia. 2012. PlaceRaider: Virtual theft in physical spaces with smartphones. arXiv:1209.5982 (2012).  Z. Templeman R and. Rahman D. Crandall and A. Kapadia. 2012. PlaceRaider: Virtual theft in physical spaces with smartphones. arXiv:1209.5982 (2012)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501605"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"e_1_3_2_1_41_1","unstructured":"P. Wijesekera A. Baokar A. Hosseini S. Egelman D. Wagner and K. Beznosov. 2015. Android permissions remystified: A field study on contextual integrity USENIX Security.   P. Wijesekera A. Baokar A. Hosseini S. Egelman D. Wagner and K. Beznosov. 2015. Android permissions remystified: A field study on contextual integrity USENIX Security."},{"key":"e_1_3_2_1_42_1","volume-title":"Permlyzer: Analyzing permission usage in android applications IEEE Symposium on Software Reliability Engineering (ISSRE).","author":"Xu W.","year":"2013","unstructured":"W. Xu , F. Zhang , and S. Zhu . 2013 . Permlyzer: Analyzing permission usage in android applications IEEE Symposium on Software Reliability Engineering (ISSRE). W. Xu, F. Zhang, and S. Zhu. 2013. Permlyzer: Analyzing permission usage in android applications IEEE Symposium on Software Reliability Engineering (ISSRE)."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196533","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196533"}},"subtitle":["Developer Support for Imbibing Android's New Permission Model"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":42,"alternative-id":["10.1145\/3196494.3196533","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196533","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}