{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:46Z","timestamp":1775912806913,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236029","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"331-341","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["Do Android taint analysis tools keep their promises?"],"prefix":"10.1145","author":[{"given":"Felix","family":"Pauck","sequence":"first","affiliation":[{"name":"University of Paderborn, Germany"}]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"University of Paderborn, Germany"}]},{"given":"Heike","family":"Wehrheim","sequence":"additional","affiliation":[{"name":"University of Paderborn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019797"},{"key":"e_1_3_2_1_2_1","volume-title":"Damien Octeau, and Patrick D. McDaniel.","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt , Siegfried Rasthofer , Christian Fritz , Eric Bodden , Alexandre Bartel , Jacques Klein , Yves Le Traon , Damien Octeau, and Patrick D. McDaniel. 2014 . Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick D. McDaniel. 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_5_1","volume-title":"Reyhaneh Jabbarvand Behrouz, and Sam Malek","author":"Bagheri Hamid","year":"2016","unstructured":"Hamid Bagheri , Alireza Sadeghi , Reyhaneh Jabbarvand Behrouz, and Sam Malek . 2016 . Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. In DSN, Toulouse, France, 2016. IEEE Computer Society , 514\u2013525. Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, and Sam Malek. 2016. Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. In DSN, Toulouse, France, 2016. IEEE Computer Society, 514\u2013525."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54580-5_20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3168451.3168458"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766509"},{"key":"e_1_3_2_1_11_1","volume-title":"OSDI","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick D. McDaniel , and Anmol Sheth . 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In OSDI , Vancouver, Canada , 2010, Remzi H. Arpaci-Dusseau and Brad Chen (Eds.). USENIX Association, 393\u2013407. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, and Anmol Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, Vancouver, Canada, 2010, Remzi H. Arpaci-Dusseau and Brad Chen (Eds.). USENIX Association, 393\u2013407."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661694.2661697"},{"key":"e_1_3_2_1_13_1","volume-title":"Gartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of","year":"2017","unstructured":"Gartner. 2017. Gartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of 2017 . Gartner. 2017. Gartner Says Worldwide Sales of Smartphones Grew 9 Percent in First Quarter of 2017."},{"key":"e_1_3_2_1_14_1","unstructured":"https:\/\/www.gartner.com\/newsroom\/id\/3725117.  https:\/\/www.gartner.com\/newsroom\/id\/3725117."},{"key":"e_1_3_2_1_15_1","volume-title":"Information Flow Analysis of Android Applications in DroidSafe. In NDSS","author":"Gordon Michael I.","year":"2015","unstructured":"Michael I. Gordon , Deokhwan Kim , Jeff H. Perkins , Limei Gilham , Nguyen Nguyen , and Martin C. Rinard . 2015 . Information Flow Analysis of Android Applications in DroidSafe. In NDSS , San Diego, USA , 2015 . The Internet Society. Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, and Martin C. Rinard. 2015. Information Flow Analysis of Android Applications in DroidSafe. In NDSS, San Diego, USA, 2015. The Internet Society."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"e_1_3_2_1_18_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop (CETUS). http:\/\/www.bodden.de\/pubs\/lblh11soot.pdf","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam , Eric Bodden , Ond\u0159ej Lhot\u00e1k , and Laurie Hendren . 2011 . The Soot framework for Java program analysis: a retrospective . In Cetus Users and Compiler Infrastructure Workshop (CETUS). http:\/\/www.bodden.de\/pubs\/lblh11soot.pdf Patrick Lam, Eric Bodden, Ond\u0159ej Lhot\u00e1k, and Laurie Hendren. 2011. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop (CETUS). http:\/\/www.bodden.de\/pubs\/lblh11soot.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick D. McDaniel.","author":"Li Li","year":"2015","unstructured":"Li Li , Alexandre Bartel , Tegawend\u00e9 F. Bissyand\u00e9 , Jacques Klein , Yves Le Traon , Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick D. McDaniel. 2015 . IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In ICSE, Florence, Italy, 2015, Antonia Bertolino, Gerardo Canfora, and Sebastian G. Elbaum (Eds.). IEEE Computer Society , 280\u2013291. Li Li, Alexandre Bartel, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick D. McDaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In ICSE, Florence, Italy, 2015, Antonia Bertolino, Gerardo Canfora, and Sebastian G. Elbaum (Eds.). IEEE Computer Society, 280\u2013291."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_21_1","volume-title":"SCanDroid: Automated security certification of Android applications. Technical report","author":"Fuchs Adam P","unstructured":"Adam P Fuchs , Avik Chaudhuri , and Jeffrey S Foster . 2009. SCanDroid: Automated security certification of Android applications. Technical report , University of Maryland (2009) . Adam P Fuchs, Avik Chaudhuri, and Jeffrey S Foster. 2009. SCanDroid: Automated security certification of Android applications. Technical report, University of Maryland (2009)."},{"key":"e_1_3_2_1_22_1","volume-title":"Cooperative static analysis of Android applications. Master\u2019s thesis","author":"Pauck Felix","unstructured":"Felix Pauck . 2017. Cooperative static analysis of Android applications. Master\u2019s thesis . Paderborn University , Germany. Felix Pauck. 2017. Cooperative static analysis of Android applications. Master\u2019s thesis. Paderborn University, Germany."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213873"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"e_1_3_2_1_29_1","volume-title":"CASCON","author":"Vall\u00e9e-Rai Raja","year":"1999","unstructured":"Raja Vall\u00e9e-Rai , Phong Co , Etienne Gagnon , Laurie J. Hendren , Patrick Lam , and Vijay Sundaresan . 1999 . Soot - a Java bytecode optimization framework . In CASCON , 1999, Mississauga, Canada, Stephen A. MacKay and J. Howard Johnson (Eds.). IBM, 13. Raja Vall\u00e9e-Rai, Phong Co, Etienne Gagnon, Laurie J. Hendren, Patrick Lam, and Vijay Sundaresan. 1999. Soot - a Java bytecode optimization framework. In CASCON, 1999, Mississauga, Canada, Stephen A. MacKay and J. Howard Johnson (Eds.). IBM, 13."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:25Z","timestamp":1750208245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":30,"alternative-id":["10.1145\/3236024.3236029","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236029","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}