{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:50:17Z","timestamp":1757591417418,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EIT Digital","award":["API Assistant"],"award-info":[{"award-number":["API Assistant"]}]},{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["INTER\/AAL\/15\/11213850 and INTER\/DFG\/14\/11092585"],"award-info":[{"award-number":["INTER\/AAL\/15\/11213850 and INTER\/DFG\/14\/11092585"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MIUR","award":["2015KWREMX"],"award-info":[{"award-number":["2015KWREMX"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3197231.3197238","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"24-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["AnFlo"],"prefix":"10.1145","author":[{"given":"Biniam Fisseha","family":"Demissie","sequence":"first","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Mariano","family":"Ceccato","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Lwin Khin","family":"Shar","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962600"},{"key":"e_1_3_2_1_2_1","volume-title":"Drebin: Effective and explainable detection of android malware in your pocket","author":"Arp D.","year":"2014","unstructured":"D. Arp , M. Spreitzenbarth , H. Gascon , K. Rieck , and C. Siemens . Drebin: Effective and explainable detection of android malware in your pocket . 2014 . D. Arp, M. Spreitzenbarth, H. Gascon, K. Rieck, and C. Siemens. Drebin: Effective and explainable detection of android malware in your pocket. 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_8_1","volume-title":"9th Usenix Symposium on Operating Systems Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. gon Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In 9th Usenix Symposium on Operating Systems Design and Implementation , 2010 . W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In 9th Usenix Symposium on Operating Systems Design and Implementation, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"20th Usenix Security Symposium","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In 20th Usenix Security Symposium , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_11_1","volume-title":"Systematic detection of capability leaks in stock Android smartphones","author":"Grace M. C.","year":"2012","unstructured":"M. C. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock Android smartphones . In NDSS. The Internet Society , 2012 . M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock Android smartphones. In NDSS. The Internet Society, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"e_1_3_2_1_13_1","first-page":"20","volume-title":"Fifth International Workshop on Intelligent Data Analysis in Medicine and Pharmacology","volume":"1","author":"Laurikkala J.","year":"2000","unstructured":"J. Laurikkala , M. Juhola , E. Kentala , N. Lavrac , S. Miksch , and B. Kavsek . Informal identification of outliers in medical data . In Fifth International Workshop on Intelligent Data Analysis in Medicine and Pharmacology , volume 1 , pages 20 -- 24 , 2000 . J. Laurikkala, M. Juhola, E. Kentala, N. Lavrac, S. Miksch, and B. Kavsek. Informal identification of outliers in medical data. In Fifth International Workshop on Intelligent Data Analysis in Medicine and Pharmacology, volume 1, pages 20--24, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.36"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232009"},{"key":"e_1_3_2_1_18_1","volume-title":"A machine learning for language toolkit","author":"McCallum A. K.","year":"2002","unstructured":"A. K. McCallum . Mallet : A machine learning for language toolkit . 2002 . A. K. McCallum. Mallet: A machine learning for language toolkit. 2002."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818767"},{"key":"e_1_3_2_1_20_1","first-page":"543","volume-title":"Proceedings of the 22Nd USENIX Conference on Security, SEC'13","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. Le Traon . Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis . In Proceedings of the 22Nd USENIX Conference on Security, SEC'13 , pages 543 -- 558 , Berkeley, CA, USA , 2013 . USENIX Association. D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pages 543--558, Berkeley, CA, USA, 2013. USENIX Association."},{"key":"e_1_3_2_1_21_1","first-page":"313","volume-title":"Readings in information retrieval","author":"Porter M. F.","year":"1997","unstructured":"M. F. Porter . Readings in information retrieval . chapter An Algorithm for Suffix Stripping, pages 313 -- 316 . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 1997 . M. F. Porter. Readings in information retrieval. chapter An Algorithm for Suffix Stripping, pages 313--316. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1997."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.37"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_24_1","volume-title":"Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications","author":"Zhang M.","year":"2014","unstructured":"M. Zhang and H. Yin . Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications . 2014 . M. Zhang and H. Yin. Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications. 2014."}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 5th International Conference on Mobile Software Engineering and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197231.3197238","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3197231.3197238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:17Z","timestamp":1750212437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197231.3197238"}},"subtitle":["detecting anomalous sensitive information flows in Android apps"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":24,"alternative-id":["10.1145\/3197231.3197238","10.1145\/3197231"],"URL":"https:\/\/doi.org\/10.1145\/3197231.3197238","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}