{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:35Z","timestamp":1763507735088,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["740787,786669,786890,690972"],"award-info":[{"award-number":["740787,786669,786890,690972"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100013294","name":"Connecting Europe Facility","doi-asserted-by":"publisher","award":["INEA\/CEF\/ICT\/A2016\/1332498"],"award-info":[{"award-number":["INEA\/CEF\/ICT\/A2016\/1332498"]}],"id":[{"id":"10.13039\/100013294","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300027","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["REAPER"],"prefix":"10.1145","author":[{"given":"Michalis","family":"Diamantaris","sequence":"first","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Elias P.","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"volume-title":"Over half of 3rd party Android in-app ad libraries have privacy issues and possible security holes. https:\/\/bit.ly\/2G3Vejl","key":"e_1_3_2_1_1_1","unstructured":"2012. Over half of 3rd party Android in-app ad libraries have privacy issues and possible security holes. https:\/\/bit.ly\/2G3Vejl . 2012. Over half of 3rd party Android in-app ad libraries have privacy issues and possible security holes. https:\/\/bit.ly\/2G3Vejl."},{"key":"e_1_3_2_1_2_1","unstructured":"2013. Forbes - Google Users: You're The Product Not The Customer. https: \/\/bit.ly\/2G7dDM9.  2013. Forbes - Google Users: You're The Product Not The Customer. https: \/\/bit.ly\/2G7dDM9."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. ThreatPost - Unnamed Android Mobile Ad Library Poses Large-Scale Risk. https:\/\/bit.ly\/2G5jUrM.  2013. ThreatPost - Unnamed Android Mobile Ad Library Poses Large-Scale Risk. https:\/\/bit.ly\/2G5jUrM."},{"key":"e_1_3_2_1_4_1","unstructured":"2014. PC World - Researchers: Mobile users at risk from lack of HTTPS use by mobile ad libraries. https:\/\/bit.ly\/2BYbzC5.  2014. PC World - Researchers: Mobile users at risk from lack of HTTPS use by mobile ad libraries. https:\/\/bit.ly\/2BYbzC5."},{"key":"e_1_3_2_1_5_1","unstructured":"2014. Xposed Hook Overhead. https:\/\/bit.ly\/2BW1HZp.  2014. Xposed Hook Overhead. https:\/\/bit.ly\/2BW1HZp."},{"key":"e_1_3_2_1_6_1","unstructured":"2016. MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. https:\/\/bit.ly\/2RHTxcC.  2016. MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. https:\/\/bit.ly\/2RHTxcC."},{"key":"e_1_3_2_1_7_1","unstructured":"2016. A repository of Android libraries. https:\/\/bit.ly\/2RCf5Y1.  2016. A repository of Android libraries. https:\/\/bit.ly\/2RCf5Y1."},{"key":"e_1_3_2_1_8_1","unstructured":"2016. Root Detection Evasion on iOS and Android. https:\/\/bit.ly\/2rpLHZH.  2016. Root Detection Evasion on iOS and Android. https:\/\/bit.ly\/2rpLHZH."},{"key":"e_1_3_2_1_9_1","unstructured":"2016. The ultimate privacy manager for Android. https:\/\/bit.ly\/2zMdd8a.  2016. The ultimate privacy manager for Android. https:\/\/bit.ly\/2zMdd8a."},{"key":"e_1_3_2_1_10_1","unstructured":"2017. The Google Play apps that say they don't collect your data and then do. https:\/\/bit.ly\/2L0CTCu.  2017. The Google Play apps that say they don't collect your data and then do. https:\/\/bit.ly\/2L0CTCu."},{"key":"e_1_3_2_1_11_1","unstructured":"2018. Android Distribution between Platform versions. https:\/\/bit.ly\/1kjKifB.  2018. Android Distribution between Platform versions. https:\/\/bit.ly\/1kjKifB."},{"key":"e_1_3_2_1_12_1","unstructured":"2018. Android library statistics. https:\/\/bit.ly\/2L1S5zd.  2018. Android library statistics. https:\/\/bit.ly\/2L1S5zd."},{"key":"e_1_3_2_1_13_1","unstructured":"2018. Android View Class. https:\/\/bit.ly\/1ZSHM2l.  2018. Android View Class. https:\/\/bit.ly\/1ZSHM2l."},{"key":"e_1_3_2_1_14_1","unstructured":"2018. AppsFlyer - Mobile App Tracking & Attribution. https:\/\/bit.ly\/1lMd3oa.  2018. AppsFlyer - Mobile App Tracking & Attribution. https:\/\/bit.ly\/1lMd3oa."},{"key":"e_1_3_2_1_15_1","unstructured":"2018. AppsFlyer SDK Integration - Android. https:\/\/bit.ly\/2QjPzKz.  2018. AppsFlyer SDK Integration - Android. https:\/\/bit.ly\/2QjPzKz."},{"key":"e_1_3_2_1_16_1","unstructured":"2018. Axplorer. https:\/\/bit.ly\/2L2XoP3.  2018. Axplorer. https:\/\/bit.ly\/2L2XoP3."},{"key":"e_1_3_2_1_17_1","unstructured":"2018. GMS Google's most popular apps all in one place. https:\/\/bit.ly\/2L6cdk4.  2018. GMS Google's most popular apps all in one place. https:\/\/bit.ly\/2L6cdk4."},{"key":"e_1_3_2_1_18_1","unstructured":"2018. Permission Protection Level. https:\/\/bit.ly\/2BWzhif.  2018. Permission Protection Level. https:\/\/bit.ly\/2BWzhif."},{"key":"e_1_3_2_1_19_1","unstructured":"2018. Raccoon - APK downloader. https:\/\/bit.ly\/1yIT4bR.  2018. Raccoon - APK downloader. https:\/\/bit.ly\/1yIT4bR."},{"key":"e_1_3_2_1_20_1","unstructured":"2018. UI Automator - Android's UI testing framework. https:\/\/bit.ly\/2B2ze2m.  2018. UI Automator - Android's UI testing framework. https:\/\/bit.ly\/2B2ze2m."},{"key":"e_1_3_2_1_21_1","unstructured":"2018. Window Layout - FLAG_SECURE. https:\/\/bit.ly\/2QHEoLk.  2018. Window Layout - FLAG_SECURE. https:\/\/bit.ly\/2QHEoLk."},{"key":"e_1_3_2_1_22_1","volume-title":"On the Unicity of Smartphone Applications. In WPES '15","author":"Achara Jagdish Prasad","year":"2015","unstructured":"Jagdish Prasad Achara , Gergely Acs , and Claude Castelluccia . 2015 . On the Unicity of Smartphone Applications. In WPES '15 . Jagdish Prasad Achara, Gergely Acs, and Claude Castelluccia. 2015. On the Unicity of Smartphone Applications. In WPES '15."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_25_1","volume-title":"PScout: Analyzing the Android Permission Specification. In CCS '12","author":"Yee Au Kathy Wain","year":"2012","unstructured":"Kathy Wain Yee Au , Yi Fan Zhou , Zhen Huang , and David Lie . 2012 . PScout: Analyzing the Android Permission Specification. In CCS '12 . Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. PScout: Analyzing the Android Permission Specification. In CCS '12."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_28_1","unstructured":"Michael Backes Sven Bugiel Erik Derr Patrick McDaniel Damien Octeau and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In USENIX Security'16.   Michael Backes Sven Bugiel Erik Derr Patrick McDaniel Damien Octeau and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In USENIX Security'16."},{"key":"e_1_3_2_1_29_1","volume-title":"v. Styp-Rekowsky, and S. Weisgerber","author":"Backes M.","year":"2017","unstructured":"M. Backes , S. Bugiel , O. Schranz , P. v. Styp-Rekowsky, and S. Weisgerber . 2017 . ARTist: The Android Runtime Instrumentation and Security Toolkit. In EuroSP '17. M. Backes, S. Bugiel, O. Schranz, P. v. Styp-Rekowsky, and S. Weisgerber. 2017. ARTist: The Android Runtime Instrumentation and Security Toolkit. In EuroSP'17."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_31_1","volume-title":"Wallach","author":"Book Theodore","year":"2013","unstructured":"Theodore Book , Adam Pridgen , and Dan S . Wallach . 2013 . Longitudinal Analysis of Android Ad Library Permissions . In MoST '13. Theodore Book, Adam Pridgen, and Dan S. Wallach. 2013. Longitudinal Analysis of Android Ad Library Permissions. In MoST '13."},{"key":"e_1_3_2_1_32_1","volume-title":"CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In FC '16","author":"Carter Patrick","year":"2016","unstructured":"Patrick Carter , Collin Mulliner , Martina Lindorfer , William Robertson , and Engin Kirda . 2016 . CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In FC '16 . Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, and Engin Kirda. 2016. CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In FC '16."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"volume-title":"ASE '15","author":"Choudhary S. R.","key":"e_1_3_2_1_34_1","unstructured":"S. R. Choudhary , A. Gorla , and A. Orso . 2015. Automated Test Input Generation for Android: Are We There Yet? (E) . In ASE '15 . S. R. Choudhary, A. Gorla, and A. Orso. 2015. Automated Test Input Generation for Android: Are We There Yet? (E). In ASE '15."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23465"},{"key":"e_1_3_2_1_36_1","volume-title":"ESSoS '16","author":"Costamagna Valerio","year":"2016","unstructured":"Valerio Costamagna and Cong Zheng . 2016 . ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime .. In ESSoS '16 . Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime.. In ESSoS '16."},{"volume-title":"NDSS '16","author":"Demetriou Soteris","key":"e_1_3_2_1_37_1","unstructured":"Soteris Demetriou , Whitney Merrill , Wei Yang , Aston Zhang , and Carl A. Gunter . 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android . In NDSS '16 . Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, and Carl A. Gunter. 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In NDSS '16."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.458"},{"key":"e_1_3_2_1_39_1","volume-title":"Sheth","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N . Sheth . 2010 . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI '10. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI'10."},{"key":"e_1_3_2_1_40_1","volume-title":"Android Permissions Demystified. In CCS '11","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Erika Chin , Steve Hanna , Dawn Song , and David Wagner . 2011 . Android Permissions Demystified. In CCS '11 . Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. 2011. Android Permissions Demystified. In CCS '11."},{"key":"e_1_3_2_1_41_1","volume-title":"Perman: Fine-Grained Permission Management for Android Applications. In ISSRE' 17.","author":"Fu Jiaojiao","year":"2017","unstructured":"Jiaojiao Fu , Yangfan Zhou , Huan Liu , Yu Kang , and Xin Wang . 2017 . Perman: Fine-Grained Permission Management for Android Applications. In ISSRE' 17. Jiaojiao Fu, Yangfan Zhou, Huan Liu, Yu Kang, and Xin Wang. 2017. Perman: Fine-Grained Permission Management for Android Applications. In ISSRE' 17."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.41"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_45_1","volume-title":"Lorrie Faith Cranor","author":"Kelley Patrick Gage","year":"2012","unstructured":"Patrick Gage Kelley , Sunny Consolvo , Lorrie Faith Cranor , Jaeyeon Jung, Norman Sadeh , and David Wetherall. 2012 . A Conundrum of Permissions: Installing Applications on an Android Smartphone. In FC '12. Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In FC'12."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987456"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"e_1_3_2_1_51_1","volume-title":"SecureComm '16","author":"Liu Xing","year":"2016","unstructured":"Xing Liu , Sencun Zhu , Wei Wang , and Jiqiang Liu . 2016 . Alde: privacy risk analysis of analytics libraries in the android ecosystem . In SecureComm '16 . Xing Liu, Sencun Zhu, Wei Wang, and Jiqiang Liu. 2016. Alde: privacy risk analysis of analytics libraries in the android ecosystem. In SecureComm '16."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_53_1","volume-title":"The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. In NDSS '16","author":"Meng Wei","year":"2016","unstructured":"Wei Meng , Ren Ding , Simon P. Chung , Steven Han , and Wenke Lee . 2016 . The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. In NDSS '16 . Wei Meng, Ren Ding, Simon P. Chung, Steven Han, and Wenke Lee. 2016. The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. In NDSS '16."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052691"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766523"},{"key":"e_1_3_2_1_64_1","volume-title":"FLEXDROID: Enforcing In-App Privilege Separation in Android. In NDSS '16","author":"Seo Jaebaek","year":"2016","unstructured":"Jaebaek Seo , Daehyeok Kim , Donghyun Cho , Insik Shin , and Taesoo Kim . 2016 . FLEXDROID: Enforcing In-App Privilege Separation in Android. In NDSS '16 . Jaebaek Seo, Daehyeok Kim, Donghyun Cho, Insik Shin, and Taesoo Kim. 2016. FLEXDROID: Enforcing In-App Privilege Separation in Android. In NDSS '16."},{"key":"e_1_3_2_1_65_1","volume-title":"Wallach","author":"Shekhar Shashi","year":"2012","unstructured":"Shashi Shekhar , Michael Dietz , and Dan S . Wallach . 2012 . AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security '12. Shashi Shekhar, Michael Dietz, and Dan S. Wallach. 2012. AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security '12."},{"key":"e_1_3_2_1_66_1","volume-title":"What Mobile Ads Know About Mobile Users. In NDSS '16","author":"Son Sooel","year":"2016","unstructured":"Sooel Son , Daehyeok Kim , and Vitaly Shmatikov . 2016 . What Mobile Ads Know About Mobile Users. In NDSS '16 . Sooel Son, Daehyeok Kim, and Vitaly Shmatikov. 2016. What Mobile Ads Know About Mobile Users. In NDSS '16."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808120"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_2_1_69_1","volume-title":"MoST '12","author":"Stevens Ryan","year":"2012","unstructured":"Ryan Stevens , Clint Gibler , Jon Crussell , Jeremy Erickson , and Hao Chen . 2012 . Investigating user privacy in android ad libraries . In MoST '12 . Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating user privacy in android ad libraries. In MoST '12."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_73_1","volume-title":"CopperDroid: Automatic Reconstruction of Android Malware Behaviors. In NDSS '15","author":"Tam Kimberly","year":"2015","unstructured":"Kimberly Tam , Salahuddin J Khan , Aristide Fattori , and Lorenzo Cavallaro . 2015 . CopperDroid: Automatic Reconstruction of Android Malware Behaviors. In NDSS '15 . Kimberly Tam, Salahuddin J Khan, Aristide Fattori, and Lorenzo Cavallaro. 2015. CopperDroid: Automatic Reconstruction of Android Malware Behaviors. In NDSS '15."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Fabo Wang Yuqing Zhang Kai Wang Peng Liu and Wenjie Wang. 2016. Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. In ESORICS' 16.  Fabo Wang Yuqing Zhang Kai Wang Peng Liu and Wenjie Wang. 2016. Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. In ESORICS' 16.","DOI":"10.1007\/978-3-319-45744-4_23"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805833"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3086677"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556420.2556495"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Dominik Wermke Nicolas Huaman Yasemin Acar Bradley Reaves Patrick Traynor and Sascha Fahl. 2018. A Large Scale Investigation of Obfuscation Use in Google Play. (2018). http:\/\/arxiv.org\/abs\/1801.02742  Dominik Wermke Nicolas Huaman Yasemin Acar Bradley Reaves Patrick Traynor and Sascha Fahl. 2018. A Large Scale Investigation of Obfuscation Use in Google Play. (2018). http:\/\/arxiv.org\/abs\/1801.02742","DOI":"10.1145\/3274694.3274726"},{"key":"e_1_3_2_1_79_1","volume-title":"Android Permissions Remystified: A Field Study on Contextual Integrity. In USENIX Security '15","author":"Wijesekera Primal","year":"2015","unstructured":"Primal Wijesekera , Arjun Baokar , Ashkan Hosseini , Serge Egelman , David Wagner , and Konstantin Beznosov . 2015 . Android Permissions Remystified: A Field Study on Contextual Integrity. In USENIX Security '15 . Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. In USENIX Security '15."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_16"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134089"}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Richardson Texas USA","acronym":"CODASPY '19"},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:02Z","timestamp":1750208522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300027"}},"subtitle":["Real-time App Analysis for Augmenting the Android Permission System"],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":85,"alternative-id":["10.1145\/3292006.3300027","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300027","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}