{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:22:31Z","timestamp":1752283351100,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["FA8702-15-D-0002"],"award-info":[{"award-number":["FA8702-15-D-0002"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232825","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Practical Precise Taint-flow Static Analysis for Android App Sets"],"prefix":"10.1145","author":[{"given":"William","family":"Klieber","sequence":"first","affiliation":[{"name":"Carnegie Mellon Univ, Software Engineering Institute, Pittsburgh, Pennsylvania"}]},{"given":"Lori","family":"Flynn","sequence":"additional","affiliation":[{"name":"Carnegie Mellon Univ, Software Engineering Institute, Pittsburgh, Pennsylvania"}]},{"given":"Will","family":"Snavely","sequence":"additional","affiliation":[{"name":"Carnegie Mellon Univ, Software Engineering Institute, Pittsburgh, Pennsylvania"}]},{"given":"Michael","family":"Zheng","sequence":"additional","affiliation":[{"name":"Carnegie Mellon Univ, Software Engineering Institute, Pittsburgh, Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884816"},{"key":"e_1_3_2_1_4_1","unstructured":"Karan Dwivedi Hongli Yin Pranav Bagree Xiaoxiao Tang Lori Flynn William Klieber and William Snavely. 2017. DidFail: Coverage and Precision Enhancement. (2017).  Karan Dwivedi Hongli Yin Pranav Bagree Xiaoxiao Tang Lori Flynn William Klieber and William Snavely. 2017. DidFail: Coverage and Precision Enhancement. (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. OSDI.","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol Sheth . 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proc. OSDI. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI."},{"key":"e_1_3_2_1_6_1","unstructured":"Greg Youst (DISA Chief Mobility Engineer). 2014. DoD's Strategic Mobility Vision: Needs and Challenges. http:\/\/csrc.nist.gov\/groups\/SMA\/ispab\/documents\/minutes\/2014-10\/oct22_dod_mobility-needs-and-challenges_youst.pdf. (October 2014).  Greg Youst (DISA Chief Mobility Engineer). 2014. DoD's Strategic Mobility Vision: Needs and Challenges. http:\/\/csrc.nist.gov\/groups\/SMA\/ispab\/documents\/minutes\/2014-10\/oct22_dod_mobility-needs-and-challenges_youst.pdf. (October 2014)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_8_1","unstructured":"Adrienne Porter Felt Helen J Wang Alexander Moshchuk Steve Hanna and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In USENIX Security.   Adrienne Porter Felt Helen J Wang Alexander Moshchuk Steve Hanna and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In USENIX Security."},{"key":"e_1_3_2_1_9_1","unstructured":"Lori Flynn and William Klieber. 2015. An Enhanced Tool for Securing Android Apps. https:\/\/insights.sei.cmu.edu\/sei_blog\/2015\/03\/an-enhanced-tool-for-securing-android-apps.html. (2015).  Lori Flynn and William Klieber. 2015. An Enhanced Tool for Securing Android Apps. https:\/\/insights.sei.cmu.edu\/sei_blog\/2015\/03\/an-enhanced-tool-for-securing-android-apps.html. (2015)."},{"key":"e_1_3_2_1_10_1","unstructured":"Lori Flynn and William Klieber. 2017. Automated Detection of Information Leaks in Mobile Devices. https:\/\/insights.sei.cmu.edu\/sei_blog\/2017\/11\/automated-detection-of-information-leaks-in-mobile-devices.html. (2017).  Lori Flynn and William Klieber. 2017. Automated Detection of Information Leaks in Mobile Devices. https:\/\/insights.sei.cmu.edu\/sei_blog\/2017\/11\/automated-detection-of-information-leaks-in-mobile-devices.html. (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106286"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"e_1_3_2_1_14_1","volume-title":"Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mcdaniel.","author":"Li Li","year":"2015","unstructured":"Li Li , Alexandre Bartel , Tegawend\u00e9 F Bissyand\u00e9 , Jacques Klein , Yves Le Traon , Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mcdaniel. 2015 . IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE ( 2015). Li Li, Alexandre Bartel, Tegawend\u00e9 F Bissyand\u00e9, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mcdaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE (2015)."},{"key":"e_1_3_2_1_15_1","volume-title":"New York","author":"Oberheide Jon","year":"2012","unstructured":"Jon Oberheide and Charlie Miller . 2012. Dissecting the Android bouncer. SummerCon2012 , New York ( 2012 ). Jon Oberheide and Charlie Miller. 2012. Dissecting the Android bouncer. SummerCon2012, New York (2012)."},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium.","author":"Octeau Damien","year":"2013","unstructured":"Damien Octeau , Patrick McDaniel , Somesh Jha , Alexandre Bartel , Eric Bodden , Jacques Klein , and Yves Le Traon . 2013 . Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis . In USENIX Security Symposium. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. 2013. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In USENIX Security Symposium."},{"volume-title":"Vetting the security of mobile applications. US Department of Commerce","author":"Quirolgico Steve","key":"e_1_3_2_1_17_1","unstructured":"Steve Quirolgico , Jeffrey Voas , Tom Karygiannis , Christoph Michael , and Karen Scarfone . 2015. Vetting the security of mobile applications. US Department of Commerce , National Institute of Standards and Technology . Steve Quirolgico, Jeffrey Voas, Tom Karygiannis, Christoph Michael, and Karen Scarfone. 2015. Vetting the security of mobile applications. US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819149"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232825","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":19,"alternative-id":["10.1145\/3230833.3232825","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232825","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}