{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:13Z","timestamp":1772042413969,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534221","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"593-604","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["PermDroid: automatically testing permission-related behaviour of Android applications"],"prefix":"10.1145","author":[{"given":"Shuaihao","family":"Yang","sequence":"first","affiliation":[{"name":"Nanjing University of Science and Technology, China"}]},{"given":"Zigang","family":"Zeng","sequence":"additional","affiliation":[{"name":"Nanjing University of Science and Technology, China"}]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[{"name":"Nanjing University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.77"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 25th USENIX Security Symposium, USENIX Security\u201916","author":"Backes Michael","year":"2016","unstructured":"Michael Backes , Sven Bugiel , Erik Derr , Patrick D. McDaniel , Damien Octeau , and Sebastian Weisgerber . 2016 . On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis . In Proceedings of the 25th USENIX Security Symposium, USENIX Security\u201916 , Austin, TX, USA, August 10-12. USENIX Association, 1101\u20131118. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/backes_android Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In Proceedings of the 25th USENIX Security Symposium, USENIX Security\u201916, Austin, TX, USA, August 10-12. USENIX Association, 1101\u20131118. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/backes_android"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00070"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509552"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911","author":"Dietz Michael","year":"2011","unstructured":"Michael Dietz , Shashi Shekhar , Yuliy Pisetsky , Anhei Shu , and Dan S. Wallach . [n.d.]. QUIRE: Lightweight Provenance for Smart Phone Operating Systems . In Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911 , San Francisco, CA, USA, August 8-12, publisher = USENIX Association, year = 2011 , url = http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Dietz7-26-11.pdf. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach. [n.d.]. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911, San Francisco, CA, USA, August 8-12, publisher = USENIX Association, year = 2011, url = http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Dietz7-26-11.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0009372308040814"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps\u201911","author":"Felt Adrienne Porter","unstructured":"Adrienne Porter Felt , Kate Greenwood , and David A. Wagner . 2011. The Effectiveness of Application Permissions . In Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps\u201911 , Portland, Oregon, USA, June 15-16. USENIX Association. https:\/\/www.usenix.org\/conference\/webapps11\/effectiveness-application-permissions Adrienne Porter Felt, Kate Greenwood, and David A. Wagner. 2011. The Effectiveness of Application Permissions. In Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps\u201911, Portland, Oregon, USA, June 15-16. USENIX Association. https:\/\/www.usenix.org\/conference\/webapps11\/effectiveness-application-permissions"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J. Wang , Alexander Moshchuk , Steve Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses . In Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911 , San Francisco, CA, USA, August 8-12. USENIX Association. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Felt.pdf Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, USENIX Security\u201911, San Francisco, CA, USA, August 8-12. USENIX Association. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Felt.pdf"},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2020. The Monkey UI Android testing tool. [Online]. Available: http:\/\/developer.android.com\/tools\/help\/monkey.html \t\t\t\t\t  Google. 2020. The Monkey UI Android testing tool. [Online]. Available: http:\/\/developer.android.com\/tools\/help\/monkey.html"},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2021. Android Debug Bridge. [Online]. Available: https:\/\/developer.android.com\/studio\/command-line\/adb \t\t\t\t\t  Google. 2021. Android Debug Bridge. [Online]. Available: https:\/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2021. Android permission model. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/permissions\/overview \t\t\t\t\t  Google. 2021. Android permission model. [Online]. Available: https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2021. Android Permissions best practices. [Online]. Available: https:\/\/developer.android.com\/training\/permissions\/usage-notes \t\t\t\t\t  Google. 2021. Android Permissions best practices. [Online]. Available: https:\/\/developer.android.com\/training\/permissions\/usage-notes"},{"key":"e_1_3_2_1_25_1","unstructured":"Google. 2021. UIAutomator. [Online]. Available: https:\/\/developer.android.com\/training\/testing\/ui-automator \t\t\t\t\t  Google. 2021. UIAutomator. [Online]. Available: https:\/\/developer.android.com\/training\/testing\/ui-automator"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00042"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00059"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693128"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_31_1","first-page":"381","article-title":"Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android","volume":"22","author":"Huang Jianmeng","year":"2020","unstructured":"Jianmeng Huang , Wenchao Huang , Fuyou Miao , and Yan Xiong . 2020 . Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur. , 22 , 3 (2020), 381 \u2013 391 . http:\/\/ijns.jalaxy.com.tw\/contents\/ijns-v22-n3\/ijns-2020-v22-n3-p381-391.pdf Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong. 2020. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur., 22, 3 (2020), 381\u2013391. http:\/\/ijns.jalaxy.com.tw\/contents\/ijns-v22-n3\/ijns-2020-v22-n3-p381-391.pdf","journal-title":"Applications. Int. J. Netw. Secur."},{"key":"e_1_3_2_1_32_1","unstructured":"iSECpartners. 2009. Intnet fuzzer. [Online].  https:\/\/www.isecpartners.com\/tools\/mobile-security\/intent-fuzzer.aspx \t\t\t\t\t  iSECpartners. 2009. Intnet fuzzer. [Online].  https:\/\/www.isecpartners.com\/tools\/mobile-security\/intent-fuzzer.aspx"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.74"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00021"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639131"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635896"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263963"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884853"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.34"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.14"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106250"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115615"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464806"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, CASCON\u201999 , November 8-11","author":"Vall\u00e9e-Rai Raja","year":"1999","unstructured":"Raja Vall\u00e9e-Rai , Phong Co , Etienne Gagnon , Laurie J. Hendren , Patrick Lam , and Vijay Sundaresan . 1999 . Soot - a Java bytecode optimization framework . In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, CASCON\u201999 , November 8-11 , Mississauga, Ontario, Canada. IBM, 13. https:\/\/dl.acm.org\/citation.cfm?id=78 2008 Raja Vall\u00e9e-Rai, Phong Co, Etienne Gagnon, Laurie J. Hendren, Patrick Lam, and Vijay Sundaresan. 1999. Soot - a Java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, CASCON\u201999 , November 8-11, Mississauga, Ontario, Canada. IBM, 13. https:\/\/dl.acm.org\/citation.cfm?id=782008"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380382"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468554"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897097"},{"key":"e_1_3_2_1_56_1","unstructured":"Ryszard Wi\u015bniewski and Connor Tumbleson. 2020. Apktool. [Online]. Available: https:\/\/ibotpeaches.github.io\/Apktool\/ \t\t\t\t\t  Ryszard Wi\u015bniewski and Connor Tumbleson. 2020. Apktool. [Online]. Available: https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892218"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363193"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698893"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380347"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6534755"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.76"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_19"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536881"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180188"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":65,"alternative-id":["10.1145\/3533767.3534221","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534221","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}