{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:43:43Z","timestamp":1757544223865,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387905.3388592","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T01:53:17Z","timestamp":1602121997000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Security testing of second order permission re-delegation vulnerabilities in Android apps"],"prefix":"10.1145","author":[{"given":"Biniam Fisseha","family":"Demissie","sequence":"first","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Mariano","family":"Ceccato","sequence":"additional","affiliation":[{"name":"University of Verona, Verona, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.77"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2419611"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197238"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897082"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897082"},{"volume-title":"On the need of precise inter-app ICC classification for detecting Android malware collusions","author":"Elish Karim O","key":"e_1_3_2_1_12_1","unstructured":"Karim O Elish , Danfeng Yao , and Barbara G Ryder . 2015. On the need of precise inter-app ICC classification for detecting Android malware collusions . In IEEE mobile security technologies (MoST), in conjunction with the IEEE symposium on security and privacy. Karim O Elish, Danfeng Yao, and Barbara G Ryder. 2015. On the need of precise inter-app ICC classification for detecting Android malware collusions. In IEEE mobile security technologies (MoST), in conjunction with the IEEE symposium on security and privacy."},{"volume-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th Usenix Symposium on Operating Systems Design and Implementation.","author":"Enck William","key":"e_1_3_2_1_13_1","unstructured":"William Enck , Peter Gilbert , Byung gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010 . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th Usenix Symposium on Operating Systems Design and Implementation. William Enck, Peter Gilbert, Byung gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In 9th Usenix Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_14_1","volume-title":"Permission Re-Delegation: Attacks and Defenses. In 20th Usenix Security Symposium.","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J. Wang , Alexander Moshchuk , Steve Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses. In 20th Usenix Security Symposium. Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In 20th Usenix Security Symposium."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771800"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.36"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263963"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232009"},{"key":"e_1_3_2_1_23_1","volume-title":"last accessed","author":"Micro Trend","year":"2020","unstructured":"Trend Micro . last accessed January 2020 . First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services , https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/first-kotlin-developed-malicious-app-signs-users-premium-sms-services\/. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/first-kotlin-developed-malicious-app-signs-users-premium-sms-services\/ Trend Micro. last accessed January 2020. First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services, https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/first-kotlin-developed-malicious-app-signs-users-premium-sms-services\/. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/first-kotlin-developed-malicious-app-signs-users-premium-sms-services\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689705"},{"key":"e_1_3_2_1_25_1","unstructured":"Soot. 2018. Soot - A Java optimization framework https:\/\/github.com\/Sable\/soot. (2018). https:\/\/sable.github.io\/soot\/  Soot. 2018. Soot - A Java optimization framework https:\/\/github.com\/Sable\/soot. (2018). https:\/\/sable.github.io\/soot\/"},{"volume-title":"last accessed","year":"2020","key":"e_1_3_2_1_26_1","unstructured":"Techspot. last accessed January 2020 . New Android malware can steal data, record audio, and send SMS messages to premium services, https:\/\/www.techspot.com\/news\/73481-new-android-malware-can-steal-data-record-audio.html. https:\/\/www.techspot.com\/news\/73481-new-android-malware-can-steal-data-record-audio.html Techspot. last accessed January 2020. New Android malware can steal data, record audio, and send SMS messages to premium services, https:\/\/www.techspot.com\/news\/73481-new-android-malware-can-steal-data-record-audio.html. https:\/\/www.techspot.com\/news\/73481-new-android-malware-can-steal-data-record-audio.html"},{"volume-title":"last accessed","year":"2020","key":"e_1_3_2_1_27_1","unstructured":"Threatpost. last accessed January 2020 . Joker Android Malware Snowballs on Google Play , https:\/\/threatpost.com\/joker-androids-malware-ramps-volume\/151785\/. https:\/\/threatpost.com\/joker-androids-malware-ramps-volume\/151785\/ Threatpost. last accessed January 2020. Joker Android Malware Snowballs on Google Play, https:\/\/threatpost.com\/joker-androids-malware-ramps-volume\/151785\/. https:\/\/threatpost.com\/joker-androids-malware-ramps-volume\/151785\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052645"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"},{"key":"e_1_3_2_1_31_1","volume-title":"Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications.","author":"Zhang Mu","year":"2014","unstructured":"Mu Zhang and Heng Yin . 2014 . Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications. Mu Zhang and Heng Yin. 2014. Appsealer: Automatic generation of vulnerability-specific patches for preventing component hijacking attacks in Android applications."},{"volume-title":"Android Permission Re-delegation Detection and Test Case Generation. In 2012 International Conference on Computer Science and Service System. 871--874","author":"Zhong J.","key":"e_1_3_2_1_32_1","unstructured":"J. Zhong , J. Huang , and B. Liang . 2012 . Android Permission Re-delegation Detection and Test Case Generation. In 2012 International Conference on Computer Science and Service System. 871--874 . J. Zhong, J. Huang, and B. Liang. 2012. Android Permission Re-delegation Detection and Test Case Generation. In 2012 International Conference on Computer Science and Service System. 871--874."}],"event":{"name":"MOBILESoft '20: IEEE\/ACM 7th International Conference on Mobile Software Engineering and Systems","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"MOBILESoft '20"},"container-title":["Proceedings of the IEEE\/ACM 7th International Conference on Mobile Software Engineering and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387905.3388592","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387905.3388592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387905.3388592"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":32,"alternative-id":["10.1145\/3387905.3388592","10.1145\/3387905"],"URL":"https:\/\/doi.org\/10.1145\/3387905.3388592","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}