{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:11Z","timestamp":1750220951064,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T00:00:00Z","timestamp":1560729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000275","name":"Leverhulme Trust","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000275","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,17]]},"DOI":"10.1145\/3322640.3326729","type":"proceedings-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T12:18:16Z","timestamp":1563884296000},"page":"123-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MagnetDroid"],"prefix":"10.1145","author":[{"given":"Emanuele","family":"Uliana","sequence":"first","affiliation":[{"name":"Department of Computer Science, Royal Holloway University of London, UK"}]},{"given":"Kostas","family":"Stathis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Royal Holloway University of London, UK"}]},{"given":"Robert","family":"Jago","sequence":"additional","affiliation":[{"name":"School of Law, Royal Holloway University of London, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n.d.}. 2018 UK Data Protection Act. https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted Available at https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted.  {n.d.}. 2018 UK Data Protection Act. https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted Available at https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted."},{"key":"e_1_3_2_1_2_1","unstructured":"{n.d.}. Android Market Share. https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems Available at https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems.  {n.d.}. Android Market Share. https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems Available at https:\/\/www.statista.com\/statistics\/266136\/global-market-share-held-by-smartphone-operating-systems."},{"volume-title":"The Network and Information Systems Regulations","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"{n.d.}. The Network and Information Systems Regulations 2018 . http:\/\/www.legislation.gov.uk\/uksi\/2018\/506\/made Available at http:\/\/www.legislation.gov.uk\/uksi\/2018\/506\/made. {n.d.}. The Network and Information Systems Regulations 2018. http:\/\/www.legislation.gov.uk\/uksi\/2018\/506\/made Available at http:\/\/www.legislation.gov.uk\/uksi\/2018\/506\/made."},{"key":"e_1_3_2_1_4_1","unstructured":"{n.d.}. Security | Android Open Source Project. https:\/\/source.android.com\/security Available at https:\/\/source.android.com\/security.  {n.d.}. Security | Android Open Source Project. https:\/\/source.android.com\/security Available at https:\/\/source.android.com\/security."},{"key":"e_1_3_2_1_5_1","unstructured":"{n.d.}. The Transport Layer Security (TLS) Protocol Version 1.3. https:\/\/tools.ietf.org\/html\/rfc8446 Available at https:\/\/tools.ietf.org\/html\/rfc8446.  {n.d.}. The Transport Layer Security (TLS) Protocol Version 1.3. https:\/\/tools.ietf.org\/html\/rfc8446 Available at https:\/\/tools.ietf.org\/html\/rfc8446."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008242417011"},{"volume-title":"Towards a Rule Based Representation of Open Texture in Law","author":"Bench-Capon Trevor","key":"e_1_3_2_1_9_1","unstructured":"Trevor Bench-Capon and Marek Sergot . 1989. Towards a Rule Based Representation of Open Texture in Law . In Computing Power and Legal Reasoning, Charles Walter (Ed.). Greenwood Press , Chapter 6, 39--60. Trevor Bench-Capon and Marek Sergot. 1989. Towards a Rule Based Representation of Open Texture in Law. In Computing Power and Legal Reasoning, Charles Walter (Ed.). Greenwood Press, Chapter 6, 39--60."},{"key":"e_1_3_2_1_10_1","volume-title":"Andlantis: Large-scale Android dynamic analysis. arXiv preprint arXiv:1410.7751","author":"Bierma Michael","year":"2014","unstructured":"Michael Bierma , Eric Gustafson , Jeremy Erickson , David Fritz , and Yung Ryn Choe . 2014 . Andlantis: Large-scale Android dynamic analysis. arXiv preprint arXiv:1410.7751 (2014). Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz, and Yung Ryn Choe. 2014. Andlantis: Large-scale Android dynamic analysis. arXiv preprint arXiv:1410.7751 (2014)."},{"key":"e_1_3_2_1_11_1","volume-title":"Situating cognitive agents in GOLEM. Engineering environment-mediated multi-agent systems","author":"Bromuri Stefano","year":"2008","unstructured":"Stefano Bromuri and Kostas Stathis . 2008. Situating cognitive agents in GOLEM. Engineering environment-mediated multi-agent systems ( 2008 ), 115--134. Stefano Bromuri and Kostas Stathis. 2008. Situating cognitive agents in GOLEM. Engineering environment-mediated multi-agent systems (2008), 115--134."},{"key":"e_1_3_2_1_12_1","volume-title":"Symposium on Logic and Data Bases, Centre d'\u00e9tudes et de recherches de Toulouse","author":"Clark Keith L.","year":"1977","unstructured":"Keith L. Clark . 1977 . Negation as Failure. In Logic and Data Bases , Symposium on Logic and Data Bases, Centre d'\u00e9tudes et de recherches de Toulouse , France , 1977. (Advances in Data Base Theory), Herv\u00e9 Gallaire and Jack Minker (Eds.). Plemum Press, New York, 293--322. Keith L. Clark. 1977. Negation as Failure. In Logic and Data Bases, Symposium on Logic and Data Bases, Centre d'\u00e9tudes et de recherches de Toulouse, France, 1977. (Advances in Data Base Theory), Herv\u00e9 Gallaire and Jack Minker (Eds.). Plemum Press, New York, 293--322."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt.  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_14_1","unstructured":"Anthony Desnos et al. 2011. Androguard. URL: https:\/\/github.com\/androguard\/androguard (2011).  Anthony Desnos et al. 2011. Androguard. URL: https:\/\/github.com\/androguard\/androguard (2011)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_17_1","volume-title":"Official Journal of the European Union L119 (4","author":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119 (4 May 2016 ), 1--88. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119 (4 May 2016), 1--88. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_20_1","volume-title":"Puppetdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications. arXiv preprint arXiv:1402.4826","author":"Gianazza Andrea","year":"2014","unstructured":"Andrea Gianazza , Federico Maggi , Aristide Fattori , Lorenzo Cavallaro , and Stefano Zanero . 2014 . Puppetdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications. arXiv preprint arXiv:1402.4826 (2014). Andrea Gianazza, Federico Maggi, Aristide Fattori, Lorenzo Cavallaro, and Stefano Zanero. 2014. Puppetdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications. arXiv preprint arXiv:1402.4826 (2014)."},{"volume-title":"Building in big brother: the cryptographic policy debate","author":"Hoffman Lance J","key":"e_1_3_2_1_21_1","unstructured":"Lance J Hoffman . 2012. Building in big brother: the cryptographic policy debate . Springer Science & Business Media . Lance J Hoffman. 2012. Building in big brother: the cryptographic policy debate. Springer Science & Business Media."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2308672"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622698.1622707"},{"key":"e_1_3_2_1_24_1","article-title":"Android Based Effective and Efficient Search Engine Retrieval System Using Ontology","volume":"1","author":"Karthika S","year":"2013","unstructured":"S Karthika , S Gunanandhini , and Mr A Vijayanarayanan . 2013 . Android Based Effective and Efficient Search Engine Retrieval System Using Ontology . IJREAT International Journal of Research in Engineering & Advanced Technology 1 , 1 (2013). S Karthika, S Gunanandhini, and Mr A Vijayanarayanan. 2013. Android Based Effective and Efficient Search Engine Retrieval System Using Ontology. IJREAT International Journal of Research in Engineering & Advanced Technology 1, 1 (2013).","journal-title":"IJREAT International Journal of Research in Engineering & Advanced Technology"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516768"},{"key":"e_1_3_2_1_27_1","volume-title":"This POODLE bites: exploiting the SSL 3.0 fallback. Security Advisory","author":"M\u00f6ller Bodo","year":"2014","unstructured":"Bodo M\u00f6ller , Thai Duong , and Krzysztof Kotowicz . 2014. This POODLE bites: exploiting the SSL 3.0 fallback. Security Advisory ( 2014 ). Bodo M\u00f6ller, Thai Duong, and Krzysztof Kotowicz. 2014. This POODLE bites: exploiting the SSL 3.0 fallback. Security Advisory (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.001"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Teleo-reactive Programs for Agent Control","volume":"1","author":"Nilsson Nils J.","year":"1994","unstructured":"Nils J. Nilsson . 1994 . Teleo-reactive Programs for Agent Control . J. Artif. Int. Res. 1 , 1 (Jan. 1994), 139--158. Nils J. Nilsson. 1994. Teleo-reactive Programs for Agent Control. J. Artif. Int. Res. 1, 1 (Jan. 1994), 139--158.","journal-title":"J. Artif. Int. Res."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"H. Prakken and G. Sartor. 1997. A Dialectical Model of Assessing Conflicting Arguments in Legal Reasoning. Springer Netherlands Dordrecht 175--211.  H. Prakken and G. Sartor. 1997. A Dialectical Model of Assessing Conflicting Arguments in Legal Reasoning. Springer Netherlands Dordrecht 175--211.","DOI":"10.1007\/978-94-011-5668-4_6"},{"volume-title":"Research in Attacks","author":"Rizzo Claudio","key":"e_1_3_2_1_31_1","unstructured":"Claudio Rizzo , Lorenzo Cavallaro , and Johannes Kinder . 2018. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews . In Research in Attacks , Intrusions, and Defenses, Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer International Publishing , Cham , 25--46. Claudio Rizzo, Lorenzo Cavallaro, and Johannes Kinder. 2018. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. In Research in Attacks, Intrusions, and Defenses, Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer International Publishing, Cham, 25--46."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.05.081"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70540-6_157"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2012.6347456"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23205"},{"key":"e_1_3_2_1_36_1","first-page":"5","article-title":"A Game-based Architecture for Developing Interactive Components in Computational Logic","volume":"2000","author":"Stathis Kostas","year":"2000","unstructured":"Kostas Stathis . 2000 . A Game-based Architecture for Developing Interactive Components in Computational Logic . Journal of Functional and Logic Programming 2000 , 5 (March 2000). Kostas Stathis. 2000. A Game-based Architecture for Developing Interactive Components in Computational Logic. Journal of Functional and Logic Programming 2000, 5 (March 2000).","journal-title":"Journal of Functional and Logic Programming"},{"volume-title":"Games as a Metaphor for Interactive Systems","author":"Stathis Kostas","key":"e_1_3_2_1_37_1","unstructured":"Kostas Stathis and Marek Sergot . 1996. Games as a Metaphor for Interactive Systems . In People and Computers XI, Martina Angela Sasse, R. Jim Cunningham, and Russel L. Winder (Eds.). Springer London , London , 19--33. Kostas Stathis and Marek Sergot. 1996. Games as a Metaphor for Interactive Systems. In People and Computers XI, Martina Angela Sasse, R. Jim Cunningham, and Russel L. Winder (Eds.). Springer London, London, 19--33."},{"key":"e_1_3_2_1_38_1","unstructured":"Kimberly Tam Salahuddin J Khan Aristide Fattori and Lorenzo Cavallaro. 2015. CopperDroid: Automatic Reconstruction of Android Malware Behaviors.. In NDSS.  Kimberly Tam Salahuddin J Khan Aristide Fattori and Lorenzo Cavallaro. 2015. CopperDroid: Automatic Reconstruction of Android Malware Behaviors.. In NDSS."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85485-2_18"},{"key":"e_1_3_2_1_40_1","unstructured":"Edgaras Valincius Hai H Nguyen and Jeff Z Pan. 2015. A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices.. In ORE. 80--86.  Edgaras Valincius Hai H Nguyen and Jeff Z Pan. 2015. A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices.. In ORE. 80--86."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017824.2017861"},{"volume-title":"Argumentation methods for artificial intelligence in law","author":"Walton Douglas","key":"e_1_3_2_1_42_1","unstructured":"Douglas Walton . 2005. Argumentation methods for artificial intelligence in law . Springer Science & Business Media . Douglas Walton. 2005. Argumentation methods for artificial intelligence in law. Springer Science & Business Media."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25928-2_21"},{"key":"e_1_3_2_1_44_1","first-page":"21","article-title":"IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware","volume":"16","author":"Wong Michelle Y","year":"2016","unstructured":"Michelle Y Wong and David Lie . 2016 . IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware .. In NDSS , Vol. 16. 21 -- 24 . Michelle Y Wong and David Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.. In NDSS, Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_1_45_1","unstructured":"Lok-Kwong Yan and Heng Yin. 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.. In USENIX security symposium. 569--584.   Lok-Kwong Yan and Heng Yin. 2012. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.. In USENIX security symposium. 569--584."},{"key":"e_1_3_2_1_46_1","unstructured":"Roberto Yus Carlos Bobed Guillermo Esteban Fernando Bobillo and Eduardo Mena. 2013. Android goes Semantic: DL Reasoners on Smartphones.. In Ore. Citeseer 46--52.  Roberto Yus Carlos Bobed Guillermo Esteban Fernando Bobillo and Eduardo Mena. 2013. Android goes Semantic: DL Reasoners on Smartphones.. In Ore. Citeseer 46--52."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906344"}],"event":{"name":"ICAIL '19: Seventeenth International Conference on Artificial Intelligence and Law","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","Univ. of Montreal University of Montreal","AAAI","IAAIL Intl Asso for Artifical Intel & Law"],"location":"Montreal QC Canada","acronym":"ICAIL '19"},"container-title":["Proceedings of the Seventeenth International Conference on Artificial Intelligence and Law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322640.3326729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322640.3326729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:58Z","timestamp":1750204438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322640.3326729"}},"subtitle":["security-oriented analysis for bridging privacy and law for Android applications"],"short-title":[],"issued":{"date-parts":[[2019,6,17]]},"references-count":47,"alternative-id":["10.1145\/3322640.3326729","10.1145\/3322640"],"URL":"https:\/\/doi.org\/10.1145\/3322640.3326729","relation":{},"subject":[],"published":{"date-parts":[[2019,6,17]]},"assertion":[{"value":"2019-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}