{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T05:19:54Z","timestamp":1699939194518},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T00:00:00Z","timestamp":1474502400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0711-4","type":"journal-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T12:39:16Z","timestamp":1474547956000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection"],"prefix":"10.1186","volume":"2016","author":[{"given":"Rui","family":"Hou","sequence":"first","affiliation":[]},{"given":"Zhigang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Baoliang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"711_CR1","unstructured":"Android, http:\/\/www.android.com . Accessed date 6 Feb 2016."},{"key":"711_CR2","unstructured":"Android Market, http:\/\/market.android.com . Accessed date 6 Feb 2016."},{"key":"711_CR3","unstructured":"Apache Harmony \u2013 Open Source Java Platform, http:\/\/harmony.apache.org . Accessed date 18 Feb 2016."},{"key":"711_CR4","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2184489.2184500","volume-title":"Proceedings of the 12th Workshop on Mobile Computing Systems and Applications","author":"AR Beresford","year":"2011","unstructured":"AR Beresford, A Rice, N Skehin, R Sohan, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (ACM, New York, 2011), pp. 49\u201354"},{"key":"711_CR5","unstructured":"W Enck, P Gilbert, B-G Chun, LP Cox, J Jung, P McDaniel, AN Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones Tech. Rep. NAS-TR-0120-2010 (Pennsylvania State University, University Park, 2010)."},{"key":"711_CR6","first-page":"639","volume-title":"CCS\u201911 Proceedings of the 18th ACM Conference on Computer and Communications Security","author":"P Hornyack","year":"2011","unstructured":"P Hornyack, S Han, J Jung, S Schechter, D Wetherall, CCS\u201911 Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM, New York, 2011), pp. 639\u2013652"},{"key":"711_CR7","unstructured":"EJ Schwartz, T Avgerinos, D Brumley, Proceedings of the 2010 IEEE Symposium on Security and Privacy (ACM, New York, 2010), pp. 125\u2013132"},{"key":"711_CR8","first-page":"21","volume-title":"Proceedings of the 20th USENIX Conference on Security","author":"W Enck","year":"2011","unstructured":"W Enck, D Octeau, P McDaniel, S Chaudhuri, Proceedings of the 20th USENIX Conference on Security (USENIX Association, Berkeley, 2011), p. 21"},{"key":"711_CR9","first-page":"1","volume-title":"Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography \u2013 Volume 6","author":"I Goldberg","year":"1996","unstructured":"I Goldberg, D Wagner, R Thomas, EA Brewer, Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography \u2013 Volume 6 (USENIX Association, Berkeley, 1996), p. 1"},{"issue":"1","key":"711_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"A Sabelfeld, AC Myers, Language-based information-flow security. IEEE J.Selected Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J.Selected Areas Commun."},{"key":"711_CR11","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/1024393.1024404","volume-title":"ASPLOS XI Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"GE Suh","year":"2004","unstructured":"GE Suh, JW Lee, D Zhang, S Devadas, ASPLOS XI Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (New York, ACM, 2004), pp. 85\u201396"},{"key":"711_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-25560-1_3","volume-title":"Proceedings of the 7th International Conference on Information Systems Security","author":"W Enck","year":"2011","unstructured":"W Enck, Proceedings of the 7th International Conference on Information Systems Security (Springer-Verlag, Berlin, 2011), pp. 49\u201370"},{"key":"711_CR13","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1145\/1653662.1653691","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security","author":"W Enck","year":"2009","unstructured":"W Enck, M Ongtang, P McDaniel, Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM, New York, 2009), pp. 235\u2013245"},{"key":"711_CR14","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/SP.2010.26","volume-title":"Proceedings of the 2010 IEEE Symposium on Security and Privacy","author":"EJ Schwartz","year":"2010","unstructured":"EJ Schwartz, T Avgerinos, D Brumley, Proceedings of the 2010 IEEE Symposium on Security and Privacy (ACM, New York, 2010), pp. 317\u2013331"},{"issue":"1","key":"711_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.10.010","volume":"197","author":"SK Nair","year":"2007","unstructured":"SK Nair, PN Simpson, B Crispo, AS Tanenbaum, Electronic Notes Theor. Comput. Sci. 197(1), 3\u201316 (2007)","journal-title":"Electronic Notes Theor. Comput. Sci."},{"key":"711_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1217935.1217939","volume-title":"EuroSys \u201906 Proceedings of the 1st ACM SIGOPS\/Eurosys European Conference on Computer Systems 2006","author":"A Ho","year":"2006","unstructured":"A Ho, M Fetterman, C Clark, A Warfield, S Hand, EuroSys \u201906 Proceedings of the 1st ACM SIGOPS\/Eurosys European Conference on Computer Systems 2006 (ACM, New York, 2006), pp. 29\u201341"},{"key":"711_CR17","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/ISCC.2006.158","volume-title":"IEEE Symposium on Computers and Communications (ISCC)","author":"W Cheng","year":"2006","unstructured":"W Cheng, Q Zhao, B Yu, S Hiroshige, IEEE Symposium on Computers and Communications (ISCC) (IEEE, Washington, DC, 2006), pp. 749\u2013754"},{"issue":"1\u20132","key":"711_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"J Ligatti, L Bauer, D Walker, Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"711_CR19","unstructured":"J Newsome, D Song, in Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS, San Diego, 2005), pp. 17-24"},{"key":"711_CR20","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1831708.1831711","volume-title":"Proceedings of the 19th International Symposium on Software Testing and Analysis","author":"T Bao","year":"2010","unstructured":"T Bao, Y Zheng, Z Lin, X Zhang, D Xu, Proceedings of the 19th International Symposium on Software Testing and Analysis (ACM Press, New York, 2010), pp. 13\u201324"},{"key":"711_CR21","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1999732.1999740","volume-title":"Proceedings of the second international workshop on Mobile cloud computing and services","author":"P Gilbert","year":"2011","unstructured":"P Gilbert, B Chun, LP Cox, J Jung, Proceedings of the second international workshop on Mobile cloud computing and services (ACM, New York, 2011), pp. 21\u201326"},{"key":"711_CR22","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1145\/1273463.1273490","volume-title":"Proceedings of the 2007 international symposium on Software testing and analysis","author":"J Clause","year":"2007","unstructured":"J Clause, W Li, A Orso, Proceedings of the 2007 international symposium on Software testing and analysis (ACM, New York, 2007), pp. 196\u2013206"},{"key":"711_CR23","unstructured":"J Newsome, D Song, in Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS, San Diego, 2005), pp. 56-62"},{"key":"711_CR24","volume-title":"Privacy Scope: A Precise Information Flow Tracking System for Finding Application Leaks","author":"Y Zhu","year":"2009","unstructured":"Y Zhu, J Jung, D Song, T Kohno, D Wetherall, Privacy Scope: A Precise Information Flow Tracking System for Finding Application Leaks (University of California, Tech. Rep.: UCB\/EECS-2009-145, Berkeley, 2009)"},{"key":"711_CR25","unstructured":"J Newsome, D Song, in Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS, San Diego, 2005), pp. 101-124"},{"key":"711_CR26","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1250734.1250746","volume-title":"Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"N Nethercote","year":"2007","unstructured":"N Nethercote, J Seward, Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation (ACM, New York, 2007), pp. 89\u2013100"},{"key":"711_CR27","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/SP.2010.37","volume-title":"Proceedings of the 2010 IEEE Symposium on Security & Privacy","author":"T Wang","year":"2010","unstructured":"T Wang, T Wei, G Gu, W Zou, Proceedings of the 2010 IEEE Symposium on Security & Privacy (IEEE Computer Society, Washington, DC, 2010), pp. 497\u2013512"},{"key":"711_CR28","unstructured":"Google Maps for Mobile. Accessed date 1 March 2016."},{"key":"711_CR29","unstructured":"Apple, INC. Apples App Store Downloads Top Three Billion. http:\/\/www.apple.com\/pr\/library\/2010\/01\/05Apples-App-Store-Downloads-Top-Three-Billion.html , January 2010. Accessed date 5 March 2016."},{"key":"711_CR30","volume-title":"Modern Compiler Implementation in C","author":"AW Appel","year":"2004","unstructured":"AW Appel, Modern Compiler Implementation in C (Cambridge University Press, Cambridge, 2004)"},{"key":"711_CR31","unstructured":"MG Kang, S McCamant, P Poosankam, D Song, in Proceedings of the Network and Distributed System Security Symposium (NDSS 2011) (NDSS, San Diego, 2011), pp. 56-70"},{"key":"711_CR32","first-page":"201","volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles","author":"A Yip","year":"2009","unstructured":"A Yip, X Wang, N Zeldovich, MF Kaashoek, Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (ACM, New York, 2009), pp. 201\u2013304"},{"issue":"9","key":"711_CR33","first-page":"1","volume":"27","author":"P Zeng","year":"2011","unstructured":"P Zeng, YJ Shao, Android System Architecture & Application Study. Comptr. Inform. 27(9), 1\u20133 (2011)","journal-title":"Comptr. Inform."},{"key":"711_CR34","unstructured":"Flurry Mobile Application Analytics, https:\/\/developer.yahoo.com\/analytics\/ . Accessed date 6 March 2016."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0711-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0711-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0711-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:32:54Z","timestamp":1657326774000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0711-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,22]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0711-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,22]]},"article-number":"227"}}