{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:59:43Z","timestamp":1771667983182,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528555","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"20-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["PITracker"],"prefix":"10.1145","author":[{"given":"Chennan","family":"Zhang","sequence":"first","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Shuang","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Wenrui","family":"Diao","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Shanqing","family":"Guo","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. AAPT2. Retrieved February 2 2022 from https:\/\/developer.android.com\/st udio\/command-line\/aapt2?hl=en  2021. AAPT2. Retrieved February 2 2022 from https:\/\/developer.android.com\/st udio\/command-line\/aapt2?hl=en"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. AccessibilityService. Retrieved February 2 2022 from https:\/\/developer.an droid.com\/reference\/android\/accessibilityservice\/AccessibilityService  2021. AccessibilityService. Retrieved February 2 2022 from https:\/\/developer.an droid.com\/reference\/android\/accessibilityservice\/AccessibilityService"},{"key":"e_1_3_2_1_3_1","volume-title":"baksmali. Retrieved","year":"2022","unstructured":"2021. baksmali. Retrieved February 2, 2022 from https:\/\/github.com\/JesusFreke\/ smali 2021. baksmali. Retrieved February 2, 2022 from https:\/\/github.com\/JesusFreke\/ smali"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. CVE-2014-8609. Retrieved February 2 2022 from https:\/\/packetstormsecur ity.com\/files\/129281\/Android-Settings-Pendingintent-Leak.html  2021. CVE-2014-8609. Retrieved February 2 2022 from https:\/\/packetstormsecur ity.com\/files\/129281\/Android-Settings-Pendingintent-Leak.html"},{"key":"e_1_3_2_1_5_1","volume-title":"CVEs of PendingIntent. Retrieved","year":"2022","unstructured":"2021. CVEs of PendingIntent. Retrieved February 2, 2022 from https:\/\/developer. android.com\/guide\/components\/intents-filters 2021. CVEs of PendingIntent. Retrieved February 2, 2022 from https:\/\/developer. android.com\/guide\/components\/intents-filters"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/soot-oss.github.io\/soot\/. Retrieved","year":"2022","unstructured":"2021. http:\/\/soot-oss.github.io\/soot\/. Retrieved February 2, 2022 from http:\/\/soot-oss.github.io\/soot\/ 2021. http:\/\/soot-oss.github.io\/soot\/. Retrieved February 2, 2022 from http:\/\/soot-oss.github.io\/soot\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Intent.java. Retrieved February 2 2022 from https:\/\/cs.android.com\/andro id\/platform\/superproject\/+\/master:frameworks\/base\/core\/java\/android\/content\/Intent.java  2021. Intent.java. Retrieved February 2 2022 from https:\/\/cs.android.com\/andro id\/platform\/superproject\/+\/master:frameworks\/base\/core\/java\/android\/content\/Intent.java"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. NotificationListenerService. Retrieved February 2 2022 from https:\/\/develo per.android.com\/reference\/android\/service\/notification\/NotificationListenerService  2021. NotificationListenerService. Retrieved February 2 2022 from https:\/\/develo per.android.com\/reference\/android\/service\/notification\/NotificationListenerService"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. PendingIntent. Retrieved February 2 2022 from https:\/\/developer.android. com\/reference\/android\/app\/PendingIntent  2021. PendingIntent. Retrieved February 2 2022 from https:\/\/developer.android. com\/reference\/android\/app\/PendingIntent"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. PendingIntent Remediation. Retrieved February 2 2022 from https:\/\/develo per.android.com\/guide\/components\/intents-filters  2021. PendingIntent Remediation. Retrieved February 2 2022 from https:\/\/develo per.android.com\/guide\/components\/intents-filters"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS)","author":"Gro\u00df Sascha","year":"2018","unstructured":"Sascha Gro\u00df , Abhishek Tiwari , and Christian Hammer . 2018 . PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis . In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS) , Barcelona, Spain , September 3-7, 2018. Sascha Gro\u00df, Abhishek Tiwari, and Christian Hammer. 2018. PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 3-7, 2018."},{"key":"e_1_3_2_1_13_1","volume-title":"Re-route Your Intent for Privilege Escalation. BlackHat 2021","author":"He En","year":"2021","unstructured":"En He , Wenbo Chen , and Daoyuan Wu. 2021. Re-route Your Intent for Privilege Escalation. BlackHat 2021 ( 2021 ). En He, Wenbo Chen, and Daoyuan Wu. 2021. Re-route Your Intent for Privilege Escalation. BlackHat 2021 (2021)."},{"key":"e_1_3_2_1_14_1","volume-title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proccedings of the 37th IEEE\/ACM International Conference on Software Engineering (ICSE)","author":"Li Li","year":"2015","unstructured":"Li Li , Alexandre Bartel , Tegawend\u00e9 F. Bissyand\u00e9 , Jacques Klein , Yves Le Traon , Steven Arzt , Siegfried Rasthofer , Eric Bodden , Damien Octeau , and Patrick D . McDaniel. 2015 . IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proccedings of the 37th IEEE\/ACM International Conference on Software Engineering (ICSE) , Florence, Italy , May 16-24, 2015 . Li Li, Alexandre Bartel, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick D. McDaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proccedings of the 37th IEEE\/ACM International Conference on Software Engineering (ICSE), Florence, Italy, May 16-24, 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00126"},{"key":"e_1_3_2_1_17_1","volume-title":"Chang","author":"Wu Daoyuan","year":"2021","unstructured":"Daoyuan Wu , Debin Gao , Robert H. Deng , and Rocky K. C . Chang . 2021 . When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. In Proceedings of the 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Taipei, Taiwan , June 21-24, 2021. Daoyuan Wu, Debin Gao, Robert H. Deng, and Rocky K. C. Chang. 2021. When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. In Proceedings of the 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Taipei, Taiwan, June 21-24, 2021."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528555"}},"subtitle":["Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis"],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":18,"alternative-id":["10.1145\/3507657.3528555","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528555","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}