{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T11:37:48Z","timestamp":1769686668647,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Suomen Akatemia","doi-asserted-by":"publisher","award":["137736, 276786, 285062"],"award-info":[{"award-number":["137736, 276786, 285062"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1228777"],"award-info":[{"award-number":["1228777"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003406","name":"Tekes","doi-asserted-by":"publisher","award":["2932\/31\/2009"],"award-info":[{"award-number":["2932\/31\/2009"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["PCIG11-GA-2012-322138,645706-GRAGE"],"award-info":[{"award-number":["PCIG11-GA-2012-322138,645706-GRAGE"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766506","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Securacy"],"prefix":"10.1145","author":[{"given":"Denzil","family":"Ferreira","sequence":"first","affiliation":[{"name":"University of Oulu"}]},{"given":"Vassilis","family":"Kostakos","sequence":"additional","affiliation":[{"name":"University of Oulu"}]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Janne","family":"Lindqvist","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Anind K.","family":"Dey","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_1_5_1","unstructured":"BBC News - Can Europe go its own way on data privacy?. http:\/\/www.bbc.com\/news\/technology-26228176 retrieved 23\/01\/2015.  BBC News - Can Europe go its own way on data privacy?. http:\/\/www.bbc.com\/news\/technology-26228176 retrieved 23\/01\/2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468502"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1236475"},{"key":"e_1_3_2_1_12_1","unstructured":"Cisco Visual Networking Index Forecast Projects 18-Fold Growth in Global Mobile Internet Data Traffic From 2011 to 2016. http:\/\/newsroom.cisco.com\/release\/668380\/Cisco-Visual-Networking-Index-Forecast-Projects-18-Fold-Growth-in-Global-Mobile-Internet-Data-Traffic-From-2011-to-2016 retrieved 05\/09\/2014.  Cisco Visual Networking Index Forecast Projects 18-Fold Growth in Global Mobile Internet Data Traffic From 2011 to 2016. http:\/\/newsroom.cisco.com\/release\/668380\/Cisco-Visual-Networking-Index-Forecast-Projects-18-Fold-Growth-in-Global-Mobile-Internet-Data-Traffic-From-2011-to-2016 retrieved 05\/09\/2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203750"},{"key":"e_1_3_2_1_14_1","unstructured":"Dashboards for Android Developers. https:\/\/developer.android.com\/about\/dashboards\/index.html retrieved 1\/05\/2015.  Dashboards for Android Developers. https:\/\/developer.android.com\/about\/dashboards\/index.html retrieved 1\/05\/2015."},{"key":"e_1_3_2_1_15_1","unstructured":"Edward Snowden urges professionals to encrypt client communications. http:\/\/www.theguardian.com\/world\/2014\/jul\/17\/edward-snowden-professionals-encrypt-client-communications-nsa-spy retrieved 17\/09\/2014.  Edward Snowden urges professionals to encrypt client communications. http:\/\/www.theguardian.com\/world\/2014\/jul\/17\/edward-snowden-professionals-encrypt-client-communications-nsa-spy retrieved 17\/09\/2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdet.2003100101"},{"key":"e_1_3_2_1_17_1","first-page":"6","article-title":"TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","volume":"1","author":"Enck W.","year":"2010","unstructured":"Enck , W. , Gilbert , P. , Chun , B.-G. , Cox , L. P. , TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation . USENIX Association , 2010 , 1 -- 6 . Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., et al. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, 2010, 1--6.","journal-title":"USENIX Association"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516655"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493465"},{"key":"#cr-split#-e_1_3_2_1_23_1.1","doi-asserted-by":"crossref","unstructured":"Ferreira D. Kostakos V. and Dey A. K. AWARE: mobile context instrumentation framework. Frontiers in ICT 2:6 (2015) DOI: 10.3389\/fict.2015.00006. 10.3389\/fict.2015.00006","DOI":"10.3389\/fict.2015.00006"},{"key":"#cr-split#-e_1_3_2_1_23_1.2","doi-asserted-by":"crossref","unstructured":"Ferreira D. Kostakos V. and Dey A. K. AWARE: mobile context instrumentation framework. Frontiers in ICT 2:6 (2015) DOI: 10.3389\/fict.2015.00006.","DOI":"10.3389\/fict.2015.00006"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2012070102"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23044"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0482-7"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"e_1_3_2_1_30_1","unstructured":"IANA TCP\/IP port specifications. http:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml?&page=126 retrieved 14\/03\/2014.  IANA TCP\/IP port specifications. http:\/\/www.iana.org\/assignments\/service-names-port-numbers\/service-names-port-numbers.xhtml?&page=126 retrieved 14\/03\/2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557549"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030138"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_36_1","unstructured":"Manifest permissions for Android Developers. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html retrieved 11\/03\/2014.  Manifest permissions for Android Developers. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html retrieved 11\/03\/2014."},{"key":"e_1_3_2_1_37_1","unstructured":"Moto X: the Google phone that's always listening. http:\/\/www.telegraph.co.uk\/technology\/google\/10217856\/Moto-X-the-Google-phone-thats-always-listening.html retrieved 05\/09\/2014.  Moto X: the Google phone that's always listening. http:\/\/www.telegraph.co.uk\/technology\/google\/10217856\/Moto-X-the-Google-phone-thats-always-listening.html retrieved 05\/09\/2014."},{"key":"e_1_3_2_1_38_1","first-page":"3","article-title":"Realization of a user-centric, privacy preserving permission framework for Android","volume":"8","author":"Nauman M.","year":"2014","unstructured":"Nauman , M. , Khan , S. , Othman , A. T. and Musa , S . Realization of a user-centric, privacy preserving permission framework for Android . Security Comm. Networks 8 , 3 , 2014 , 368--382. Nauman, M., Khan, S., Othman, A. T. and Musa, S. Realization of a user-centric, privacy preserving permission framework for Android. Security Comm. Networks 8, 3, 2014, 368--382.","journal-title":"Security Comm. Networks"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_40_1","unstructured":"The new Moto X is 'always listening' - and so is the NSA!. http:\/\/www.techradar.com\/us\/news\/phone-and-communications\/mobile-phones\/the-new-moto-x-is-always-listening-and-so-is-the-nsa-1170553 retrieved 17\/09\/2014.  The new Moto X is 'always listening' - and so is the NSA!. http:\/\/www.techradar.com\/us\/news\/phone-and-communications\/mobile-phones\/the-new-moto-x-is-always-listening-and-so-is-the-nsa-1170553 retrieved 17\/09\/2014."},{"key":"e_1_3_2_1_41_1","first-page":"51","article-title":"Android Security Permissions -- Can We Trust Them?","volume":"40","author":"Orthacker C.","year":"2012","unstructured":"Orthacker , C. , Teufl , P. , Kraxberger , S. , Lackner , G. , Android Security Permissions -- Can We Trust Them? In Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg , 2012 , 40 -- 51 . Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., et al. Android Security Permissions -- Can We Trust Them? In Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg, 2012, 40--51.","journal-title":"Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_43_1","unstructured":"Report: 97% Of Mobile Malware Is On Android. This Is The Easy Way You Stay Safe. http:\/\/www.forbes.com\/sites\/gordonkelly\/2014\/03\/24\/report-97-of-mobile-malware-is-on-android-this-is-the-easy-way-you-stay-safe\/ retrieved 22\/09\/2014.  Report: 97% Of Mobile Malware Is On Android. This Is The Easy Way You Stay Safe. http:\/\/www.forbes.com\/sites\/gordonkelly\/2014\/03\/24\/report-97-of-mobile-malware-is-on-android-this-is-the-easy-way-you-stay-safe\/ retrieved 22\/09\/2014."},{"key":"e_1_3_2_1_44_1","unstructured":"Report: NSA among worst offenders of mass surveillance Snowden says. http:\/\/edition.cnn.com\/2013\/11\/03\/world\/europe\/edward-snowden-manifesto\/ retrieved 08\/03\/2014.  Report: NSA among worst offenders of mass surveillance Snowden says. http:\/\/edition.cnn.com\/2013\/11\/03\/world\/europe\/edward-snowden-manifesto\/ retrieved 08\/03\/2014."},{"key":"e_1_3_2_1_45_1","unstructured":"Review app permissions. https:\/\/support.google.com\/googleplay\/answer\/6014972?p=app_permissions&rd=1 retrieved 11\/09\/2014.  Review app permissions. https:\/\/support.google.com\/googleplay\/answer\/6014972?p=app_permissions&rd=1 retrieved 11\/09\/2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516774"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.11"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568046"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464439"},{"key":"e_1_3_2_1_51_1","unstructured":"Verizon's offer: Let us track you get free stuff. http:\/\/money.cnn.com\/2014\/07\/22\/technology\/mobile\/verizon-tracking\/index.html?hpt=hp_t2 retrieved 22\/07\/2014.  Verizon's offer: Let us track you get free stuff. http:\/\/money.cnn.com\/2014\/07\/22\/technology\/mobile\/verizon-tracking\/index.html?hpt=hp_t2 retrieved 22\/07\/2014."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.56"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000007"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510913"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"New York New York","acronym":"WiSec'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766506"}},"subtitle":["an empirical investigation of Android applications' network usage, privacy and security"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":57,"alternative-id":["10.1145\/2766498.2766506","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766506","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}