{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:58Z","timestamp":1762005118396,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325941","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"179-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["PUREDroid"],"prefix":"10.1145","author":[{"given":"Ali","family":"Alshehri","sequence":"first","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]},{"given":"Pawel","family":"Marcinek","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]},{"given":"Abdulrahman","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]},{"given":"Hani","family":"Alshahrani","sequence":"additional","affiliation":[{"name":"Najran University, Najran, Saudi Arabia"}]},{"given":"Huirong","family":"Fu","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apktool. 2018. https:\/\/github.com\/iBotPeaches\/Apktool.  Apktool. 2018. https:\/\/github.com\/iBotPeaches\/Apktool."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2017.94016"},{"key":"e_1_3_2_1_4_1","unstructured":"Android Developer. 2018. Request App Permissions. https:\/\/developer.android.com\/training\/permissions\/requesting.  Android Developer. 2018. Request App Permissions. https:\/\/developer.android.com\/training\/permissions\/requesting."},{"key":"e_1_3_2_1_5_1","volume-title":"Entropy-based security risk measurement for Android mobile applications. Soft Computing (04","author":"Deypir Mahmood","year":"2018","unstructured":"Mahmood Deypir . 2018. Entropy-based security risk measurement for Android mobile applications. Soft Computing (04 Aug 2018 ). Mahmood Deypir. 2018. Entropy-based security risk measurement for Android mobile applications. Soft Computing (04 Aug 2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_8_1","volume-title":"European Symposium on Research in Computer Security. Springer, 1--18","author":"Fragkaki Elli","year":"2012","unstructured":"Elli Fragkaki , Lujo Bauer , Limin Jia , and David Swasey . 2012 . Modeling and enhancing android\u00e2\u0102&Zacute;s permission system . In European Symposium on Research in Computer Security. Springer, 1--18 . Elli Fragkaki, Lujo Bauer, Limin Jia, and David Swasey. 2012. Modeling and enhancing android\u00e2\u0102&Zacute;s permission system. In European Symposium on Research in Computer Security. Springer, 1--18."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2302293"},{"volume-title":"2015 International Symposium on Theoretical Aspects of Software Engineering. 31--38","author":"Hao H.","key":"e_1_3_2_1_10_1","unstructured":"H. Hao , Z. Li , and H. Yu . 2015. An Effective Approach to Measuring and Assessing the Risk of Android Application . In 2015 International Symposium on Theoretical Aspects of Software Engineering. 31--38 . H. Hao, Z. Li, and H. Yu. 2015. An Effective Approach to Measuring and Assessing the Risk of Android Application. In 2015 International Symposium on Theoretical Aspects of Software Engineering. 31--38."},{"volume-title":"2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC). 599--600","author":"Mahmoud Q. H.","key":"e_1_3_2_1_11_1","unstructured":"Q. H. Mahmoud , D. Kauling , and S. Zanin . 2017. Hidden android permissions: Remote code execution and shell access using a live wallpaper . In 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC). 599--600 . Q. H. Mahmoud, D. Kauling, and S. Zanin. 2017. Hidden android permissions: Remote code execution and shell access using a live wallpaper. In 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC). 599--600."},{"volume-title":"ICT Systems Security and Privacy Protection, Sabrina De Capitani di Vimercati and Fabio Martinelli (Eds.)","author":"Merlo Alessio","key":"e_1_3_2_1_12_1","unstructured":"Alessio Merlo and Gabriel Claudiu Georgiu . 2017. RiskInDroid: Machine LearningBased Risk Analysis on Android . In ICT Systems Security and Privacy Protection, Sabrina De Capitani di Vimercati and Fabio Martinelli (Eds.) . Springer International Publishing , Cham , 538--552. Alessio Merlo and Gabriel Claudiu Georgiu. 2017. RiskInDroid: Machine LearningBased Risk Analysis on Android. In ICT Systems Security and Privacy Protection, Sabrina De Capitani di Vimercati and Fabio Martinelli (Eds.). Springer International Publishing, Cham, 538--552."},{"volume-title":"Android Application Security Essentials","author":"Rai Pragati Ogal","key":"e_1_3_2_1_13_1","unstructured":"Pragati Ogal Rai . 2013. Android Application Security Essentials . Packt Publishing . Pragati Ogal Rai. 2013. Android Application Security Essentials. Packt Publishing."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180172"},{"volume-title":"Collaborative Computing: Networking","author":"Shen Yidong","key":"e_1_3_2_1_15_1","unstructured":"Yidong Shen , Ming Xu , Ning Zheng , Jian Xu , Wenjing Xia , Yiming Wu , Tong Qiao , and Tao Yang . 2018. Android App Classification and Permission Usage Risk Assessment . In Collaborative Computing: Networking , Applications and Worksharing, Imed Romdhani, Lei Shu, Hara Takahiro, Zhangbing Zhou, Timothy Gordon, and Deze Zeng (Eds.). Springer International Publishing , Cham , 567--577. Yidong Shen, Ming Xu, Ning Zheng, Jian Xu, Wenjing Xia, Yiming Wu, Tong Qiao, and Tao Yang. 2018. Android App Classification and Permission Usage Risk Assessment. In Collaborative Computing: Networking, Applications and Worksharing, Imed Romdhani, Lei Shu, Hara Takahiro, Zhangbing Zhou, Timothy Gordon, and Deze Zeng (Eds.). Springer International Publishing, Cham, 567--577."},{"key":"e_1_3_2_1_16_1","unstructured":"StatCounter. 2019. Mobile Operating System Market Share Worldwide. http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide  StatCounter. 2019. Mobile Operating System Market Share Worldwide. http:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487093"},{"key":"e_1_3_2_1_18_1","unstructured":"Symantec. 2017. Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf  Symantec. 2017. Internet Security Threat Report. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf"},{"key":"e_1_3_2_1_19_1","article-title":"Permission-based malware detection mechanisms on android: Analysis and perspectives","volume":"1","author":"Tchakount\u00e9 Franklin","year":"2014","unstructured":"Franklin Tchakount\u00e9 . 2014 . Permission-based malware detection mechanisms on android: Analysis and perspectives . Journal of Computer Science 1 , 2 (2014). Franklin Tchakount\u00e9. 2014. Permission-based malware detection mechanisms on android: Analysis and perspectives. Journal of Computer Science 1, 2 (2014).","journal-title":"Journal of Computer Science"},{"volume-title":"Quantitative Security Risk Assessment of Android Permissions and Applications","author":"Wang Yang","key":"e_1_3_2_1_20_1","unstructured":"Yang Wang , Jun Zheng , Chen Sun , and Srinivas Mukkamala . 2013. Quantitative Security Risk Assessment of Android Permissions and Applications . In Data and Applications Security and Privacy XXVII, Lingyu Wang and Basit Shafiq (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 226--241. Yang Wang, Jun Zheng, Chen Sun, and Srinivas Mukkamala. 2013. Quantitative Security Risk Assessment of Android Permissions and Applications. In Data and Applications Security and Privacy XXVII, Lingyu Wang and Basit Shafiq (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 226--241."}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","sponsor":["University of Houston"],"location":"Houston TX USA","acronym":"ICISDM 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325941"}},"subtitle":["Permission Usage and Risk Estimation for Android Applications"],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":20,"alternative-id":["10.1145\/3325917.3325941","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325941","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}