{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:07Z","timestamp":1750220527654,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468561","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:40:03Z","timestamp":1629337203000},"page":"95-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Checking conformance of applications against GUI policies"],"prefix":"10.1145","author":[{"given":"Zhen","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Yu","family":"Feng","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Sebastian","family":"Porst","sequence":"additional","affiliation":[{"name":"Google, USA"}]},{"given":"Isil","family":"Dillig","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alibaba. 2020. Alibaba UC Market Ads Guide. http:\/\/aliapp.open.uc.cn\/wiki\/?p=140 [Online; accessed 13-Mar-2020].  Alibaba. 2020. Alibaba UC Market Ads Guide. http:\/\/aliapp.open.uc.cn\/wiki\/?p=140 [Online; accessed 13-Mar-2020]."},{"volume-title":"iOS Design. https:\/\/developer.apple.com\/design\/tips [Online","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"Apple. 2020. iOS Design. https:\/\/developer.apple.com\/design\/tips [Online ; accessed 13- Mar- 2020 ]. Apple. 2020. iOS Design. https:\/\/developer.apple.com\/design\/tips [Online; accessed 13-Mar-2020]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915)","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . USENIX Association, USA. 659\u2013674. isbn:978 1931971232 Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915). USENIX Association, USA. 659\u2013674. isbn:9781931971232"},{"key":"e_1_3_2_1_6_1","volume-title":"Martin Rinard, and Dawn Xiaodong Song.","author":"Chen Kevin Zhijie","year":"2013","unstructured":"Kevin Zhijie Chen , Noah M Johnson , Vijay D\u2019Silva , Shuaifu Dai , Kyle MacNamara , Thomas R Magrino , Edward XueJun Wu , Martin Rinard, and Dawn Xiaodong Song. 2013 . Contextual policy enforcement in android applications with permission event graphs.. In NDSS. 234. Kevin Zhijie Chen, Noah M Johnson, Vijay D\u2019Silva, Shuaifu Dai, Kyle MacNamara, Thomas R Magrino, Edward XueJun Wu, Martin Rinard, and Dawn Xiaodong Song. 2013. Contextual policy enforcement in android applications with permission event graphs.. In NDSS. 234."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236045"},{"key":"e_1_3_2_1_9_1","volume-title":"7 GDPR \u2013 Conditions for consent. https:\/\/gdpr-info.eu\/art-7-gdpr\/ [Online","author":"Art EU.","year":"2020","unstructured":"EU. 2020. Art . 7 GDPR \u2013 Conditions for consent. https:\/\/gdpr-info.eu\/art-7-gdpr\/ [Online ; accessed 4- Apr- 2020 ]. EU. 2020. Art. 7 GDPR \u2013 Conditions for consent. https:\/\/gdpr-info.eu\/art-7-gdpr\/ [Online; accessed 4-Apr-2020]."},{"key":"e_1_3_2_1_10_1","volume-title":"Article 5: Principles relating to processing of personal data. https:\/\/www.privacy-regulation.eu\/en\/article-5-principles-relating-to-processing-of-personal-data-GDPR.htm [Online","author":"EU.","year":"2020","unstructured":"EU. 2020. Article 5: Principles relating to processing of personal data. https:\/\/www.privacy-regulation.eu\/en\/article-5-principles-relating-to-processing-of-personal-data-GDPR.htm [Online ; accessed 13- Mar- 2020 ]. EU. 2020. Article 5: Principles relating to processing of personal data. https:\/\/www.privacy-regulation.eu\/en\/article-5-principles-relating-to-processing-of-personal-data-GDPR.htm [Online; accessed 13-Mar-2020]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS)","author":"Feng Yu","year":"2017","unstructured":"Yu Feng , Osbert Bastani , Ruben Martins , Isil Dillig , and Saswat Anand . 2017 . Automatically learning android malware signatures from few samples . In Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS) ( San Diego, California, USA. Yu Feng, Osbert Bastani, Ruben Martins, Isil Dillig, and Saswat Anand. 2017. Automatically learning android malware signatures from few samples. In Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS)(San Diego, California, USA."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2018_Report_Final.pdf [Online","author":"Security Android","year":"2020","unstructured":"Google. 2018. Android Security & Privacy 2018 Year In Review . https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2018_Report_Final.pdf [Online ; accessed 13- Mar- 2020 ]. Google. 2018. Android Security & Privacy 2018 Year In Review. https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2018_Report_Final.pdf [Online; accessed 13-Mar-2020]."},{"volume-title":"AdMob policies and restrictions. https:\/\/support.google.com\/admob\/answer\/6128543?hl=en&ref_topic=2745287&visit_id=637149126866279343-1579955165&rd=1 [Online","year":"2020","key":"e_1_3_2_1_14_1","unstructured":"Google. 2020. AdMob policies and restrictions. https:\/\/support.google.com\/admob\/answer\/6128543?hl=en&ref_topic=2745287&visit_id=637149126866279343-1579955165&rd=1 [Online ; accessed 13- Mar- 2020 ]. Google. 2020. AdMob policies and restrictions. https:\/\/support.google.com\/admob\/answer\/6128543?hl=en&ref_topic=2745287&visit_id=637149126866279343-1579955165&rd=1 [Online; accessed 13-Mar-2020]."},{"volume-title":"Android Developer - Design. https:\/\/developer.android.com\/design [Online","year":"2020","key":"e_1_3_2_1_15_1","unstructured":"Google. 2020. Android Developer - Design. https:\/\/developer.android.com\/design [Online ; accessed 13- Mar- 2020 ]. Google. 2020. Android Developer - Design. https:\/\/developer.android.com\/design [Online; accessed 13-Mar-2020]."},{"volume-title":"Disallowed interstitial implementations. https:\/\/support.google.com\/admob\/answer\/6201362?hl=en [Online","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"Google. 2020. Disallowed interstitial implementations. https:\/\/support.google.com\/admob\/answer\/6201362?hl=en [Online ; accessed 13- Mar- 2020 ]. Google. 2020. Disallowed interstitial implementations. https:\/\/support.google.com\/admob\/answer\/6201362?hl=en [Online; accessed 13-Mar-2020]."},{"volume-title":"Guidelines for programmatic native ads using app code. https:\/\/support.google.com\/admanager\/answer\/7031536?hl=en [Online","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"Google. 2020. Guidelines for programmatic native ads using app code. https:\/\/support.google.com\/admanager\/answer\/7031536?hl=en [Online ; accessed 4- Apr- 2020 ]. Google. 2020. Guidelines for programmatic native ads using app code. https:\/\/support.google.com\/admanager\/answer\/7031536?hl=en [Online; accessed 4-Apr-2020]."},{"volume-title":"Material Design. https:\/\/material.io\/ [Online","year":"2020","key":"e_1_3_2_1_18_1","unstructured":"Google. 2020. Material Design. https:\/\/material.io\/ [Online ; accessed 13- Mar- 2020 ]. Google. 2020. Material Design. https:\/\/material.io\/ [Online; accessed 13-Mar-2020]."},{"volume-title":"Play Store Ads Guide. https:\/\/play.google.com\/intl\/en-GB_ALL\/about\/monetization-ads\/ads\/ [Online","year":"2020","key":"e_1_3_2_1_19_1","unstructured":"Google. 2020. Play Store Ads Guide. https:\/\/play.google.com\/intl\/en-GB_ALL\/about\/monetization-ads\/ads\/ [Online ; accessed 13- Mar- 2020 ]. Google. 2020. Play Store Ads Guide. https:\/\/play.google.com\/intl\/en-GB_ALL\/about\/monetization-ads\/ads\/ [Online; accessed 13-Mar-2020]."},{"volume-title":"Requesting Consent from European Users. https:\/\/developers.google.com\/admob\/android\/eu-consent [Online","year":"2020","key":"e_1_3_2_1_20_1","unstructured":"Google. 2020. Requesting Consent from European Users. https:\/\/developers.google.com\/admob\/android\/eu-consent [Online ; accessed 13- Mar- 2020 ]. Google. 2020. Requesting Consent from European Users. https:\/\/developers.google.com\/admob\/android\/eu-consent [Online; accessed 13-Mar-2020]."},{"volume-title":"The type system. https:\/\/material.io\/design\/typography\/the-type-system.html [Online","year":"2020","key":"e_1_3_2_1_21_1","unstructured":"Google. 2020. The type system. https:\/\/material.io\/design\/typography\/the-type-system.html [Online ; accessed 4- Apr- 2020 ]. Google. 2020. The type system. https:\/\/material.io\/design\/typography\/the-type-system.html [Online; accessed 4-Apr-2020]."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133926"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177692459"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197232"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970368"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67531-2_27"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227174"},{"volume-title":"Interval analysis. 4","author":"Moore Ramon E","key":"e_1_3_2_1_31_1","unstructured":"Ramon E Moore . 1966. Interval analysis. 4 , Prentice-Hall Englewood Cliffs . Ramon E Moore. 1966. Interval analysis. 4, Prentice-Hall Englewood Cliffs."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180246"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.32"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487568.2487569"},{"key":"e_1_3_2_1_36_1","volume-title":"Shoaib Kamil, Michael Ernst, Zachary Tatlock, and Emina Torlak.","author":"Panchekha Pavel","year":"2020","unstructured":"Pavel Panchekha , Adam Timothy Geller , Shoaib Kamil, Michael Ernst, Zachary Tatlock, and Emina Torlak. 2020 . The Cassius Framework . https:\/\/cassius.uwplse.org\/ [Online; accessed 13-Mar-2020]. Pavel Panchekha, Adam Timothy Geller, Shoaib Kamil, Michael Ernst, Zachary Tatlock, and Emina Torlak. 2020. The Cassius Framework. https:\/\/cassius.uwplse.org\/ [Online; accessed 13-Mar-2020]."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984010"},{"key":"e_1_3_2_1_38_1","volume-title":"18 Free Mobile Accessibility Testing Tools. https:\/\/www.digitala11y.com\/free-mobile-accessibility-testing-tools\/ [Online","author":"Peri Raghavendra Satish","year":"2021","unstructured":"Raghavendra Satish Peri . 2021. 18 Free Mobile Accessibility Testing Tools. https:\/\/www.digitala11y.com\/free-mobile-accessibility-testing-tools\/ [Online ; accessed 13- Feb- 2021 ]. Raghavendra Satish Peri. 2021. 18 Free Mobile Accessibility Testing Tools. https:\/\/www.digitala11y.com\/free-mobile-accessibility-testing-tools\/ [Online; accessed 13-Feb-2021]."},{"key":"e_1_3_2_1_39_1","volume-title":"GATOR: Program Analysis Toolkit For \\Android\\. 12 pages","author":"PRESTO.","year":"2017","unstructured":"PRESTO. 2017 . GATOR: Program Analysis Toolkit For \\Android\\. 12 pages . http:\/\/web.cse.ohio-state.edu\/presto\/software\/gator\/ PRESTO. 2017. GATOR: Program Analysis Toolkit For \\Android\\. 12 pages. http:\/\/web.cse.ohio-state.edu\/presto\/software\/gator\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544159"},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/souffle-lang.github.io\/datalog [Online","author":"Developers Souffl\u00e9","year":"2020","unstructured":"Souffl\u00e9 Developers . 2020. Souffl\u00e9 - Datalog . https:\/\/souffle-lang.github.io\/datalog [Online ; accessed 13- Mar- 2020 ]. Souffl\u00e9 Developers. 2020. Souffl\u00e9 - Datalog. https:\/\/souffle-lang.github.io\/datalog [Online; accessed 13-Mar-2020]."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"volume-title":"https:\/\/www.virustotal.com\/ [Online","year":"2020","key":"e_1_3_2_1_43_1","unstructured":"VirusTotal. 2020. VirusTotal. https:\/\/www.virustotal.com\/ [Online ; accessed 13- Mar- 2020 ]. VirusTotal. 2020. VirusTotal. https:\/\/www.virustotal.com\/ [Online; accessed 13-Mar-2020]."},{"key":"e_1_3_2_1_44_1","volume-title":"Web Accessibility Evaluation Tools List. https:\/\/www.w3.org\/WAI\/ER\/tools\/ [Online","author":"C.","year":"2021","unstructured":"W3 C. 2021. Web Accessibility Evaluation Tools List. https:\/\/www.w3.org\/WAI\/ER\/tools\/ [Online ; accessed 13- Feb- 2021 ]. W3C. 2021. Web Accessibility Evaluation Tools List. https:\/\/www.w3.org\/WAI\/ER\/tools\/ [Online; accessed 13-Feb-2021]."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23241"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.76"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180188"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Athens Greece","acronym":"ESEC\/FSE '21"},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468561","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468561","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468561"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":47,"alternative-id":["10.1145\/3468264.3468561","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468561","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}