{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:47:55Z","timestamp":1772041675962,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FL190100035"],"award-info":[{"award-number":["FL190100035"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10515-025-00514-8","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T08:43:28Z","timestamp":1746434608000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A comparative study between android phone and TV apps"],"prefix":"10.1007","volume":"32","author":[{"given":"Yonghui","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yue","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pingfan","family":"Kong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyu","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chunyang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"514_CR1","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: Androzoo: Collecting millions of android apps for the research community. In: MSR (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"514_CR2","unstructured":"Allix, K.: AndroZoo. (2021). https:\/\/androzoo.uni.lu\/"},{"key":"514_CR3","doi-asserted-by":"crossref","unstructured":"Azim, T., Neamtiu, I.: Targeted and depth-first exploration for systematic testing of android apps. In: Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, pp. 641\u2013660 (2013)","DOI":"10.1145\/2509136.2509549"},{"key":"514_CR4","unstructured":"APKMirror (2021). https:\/\/www.apkmirror.com\/"},{"issue":"6","key":"514_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices 49(6), 259\u2013269 (2014)","journal-title":"Acm Sigplan Notices"},{"key":"514_CR6","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., Siemens, C.: Drebin: Effective and explainable detection of android malware in your pocket. In: Ndss, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23247"},{"key":"514_CR7","unstructured":"Aafer, Y., You, W., Sun, Y., Shi, Y., Zhang, X., Yin, H.: Android $$\\{$$SmartTVs$$\\}$$ vulnerability discovery via $$\\{$$Log-Guided$$\\}$$ fuzzing. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2759\u20132776 (2021)"},{"key":"514_CR8","doi-asserted-by":"crossref","unstructured":"Barros, P., Just, R., Millstein, S., Vines, P., Dietl, W., d\u2019Amorim, M., Ernst, M.D.: Static analysis of implicit control flow: Resolving java reflection and android intents (t). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 669\u2013679 (2015). IEEE","DOI":"10.1109\/ASE.2015.69"},{"key":"514_CR9","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, W., Liu, K., Chen, C., Li, L.: A comparative study of smartphone and smartwatch apps. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, pp. 1484\u20131493 (2021)","DOI":"10.1145\/3412841.3442023"},{"key":"514_CR10","doi-asserted-by":"crossref","unstructured":"Cao, Y., Fratantonio, Y., Bianchi, A., Egele, M., Kruegel, C., Vigna, G., Chen, Y.: Edgeminer: Automatically detecting implicit control flow transitions through the android framework. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23140"},{"key":"514_CR11","doi-asserted-by":"crossref","unstructured":"Chen, S., Fan, L., Chen, C., Su, T., Li, W., Liu, Y., Xu, L.: Storydroid: Automated generation of storyboard for android apps. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 596\u2013607 (2019). IEEE","DOI":"10.1109\/ICSE.2019.00070"},{"issue":"2","key":"514_CR12","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TSE.2022.3159548","volume":"49","author":"S Chen","year":"2022","unstructured":"Chen, S., Fan, L., Chen, C., Liu, Y.: Automatically distilling storyboard with rich features for android apps. IEEE Trans. Softw. Eng. 49(2), 667\u2013683 (2022)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"514_CR13","doi-asserted-by":"crossref","unstructured":"Chen, X., Li, C., Wang, D., Wen, S., Zhang, J., Nepal, S., Xiang, Y., Ren, K.: Android hiv: A study of repackaging malware for evading machine-learning detection. TIFS (2019)","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"514_CR14","doi-asserted-by":"crossref","unstructured":"Cai, H., Zhang, Z., Li, L., Fu, X.: A large-scale study of application incompatibilities in android. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 216\u2013227 (2019)","DOI":"10.1145\/3293882.3330564"},{"key":"514_CR15","unstructured":"Desnos, A.: Androguard. [Online]. Available: https:\/\/github.com\/androguard\/androguard Last checked 02 March 2022 (2021)"},{"key":"514_CR16","doi-asserted-by":"crossref","unstructured":"Dong, S., Li, M., Diao, W., Liu, X., Liu, J., Li, Z., Xu, F., Chen, K., Wang, X., Zhang, K.: Understanding android obfuscation techniques: A large-scale investigation in the wild. In: Security and Privacy in Communication Networks: 14th International Conference, secureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I, pp. 172\u2013192 (2018). Springer","DOI":"10.1007\/978-3-030-01701-9_10"},{"key":"514_CR17","unstructured":"Enumeration, C.W.: Use of implicit intent for sensitive communication (2017)"},{"issue":"2","key":"514_CR18","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2014.2386139","volume":"17","author":"P Faruki","year":"2014","unstructured":"Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.S., Conti, M., Rajarajan, M.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surveys Tutorials 17(2), 998\u20131022 (2014)","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"514_CR19","doi-asserted-by":"crossref","unstructured":"Fan, L., Su, T., Chen, S., Meng, G., Liu, Y., Xu, L., Pu, G., Su, Z.: Large-scale analysis of framework-specific exceptions in android apps. In: 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE), pp. 408\u2013419 (2018). IEEE","DOI":"10.1145\/3180155.3180222"},{"key":"514_CR20","unstructured":"Gao, J., Li, L., Kong, P., Bissyand\u00e9, T.F., Klein, J.: Understanding the evolution of android app vulnerabilities. IEEE Transactions on Reliability (2019)"},{"key":"514_CR21","unstructured":"Google: Google Play Python API. (2021). https:\/\/github.com\/NoMore201\/googleplay-api"},{"key":"514_CR22","unstructured":"Google: View and restrict your app\u2019s compatible devices (2021). https:\/\/support.google.com\/googleplay\/android-developer\/answer\/7353455"},{"key":"514_CR23","unstructured":"Google, D.: Android Developer Guide. (2021). https:\/\/developer.android.com\/reference\/android\/Manifest.permission"},{"key":"514_CR24","unstructured":"Google, D.: Security SSL. (2021). https:\/\/developer.android.com\/training\/articles\/security-ssl"},{"key":"514_CR25","unstructured":"Google, D.: About Android App Bundles. (2022). https:\/\/developer.android.com\/guide\/app-bundle"},{"key":"514_CR26","unstructured":"Google, D.: About Android App Bundles. (2022). https:\/\/developer.android.com\/google\/play\/publishing\/multiple-apks"},{"key":"514_CR27","unstructured":"Google, D.: Android.view. (2022). https:\/\/developer.android.com\/reference\/android\/view\/package-summary"},{"key":"514_CR28","unstructured":"Google, D.: Drawables Overview. (2022). https:\/\/developer.android.com\/develop\/ui\/views\/graphics\/drawables"},{"key":"514_CR29","unstructured":"Google, D.: Handle TV Hardware. (2022). https:\/\/developer.android.com\/training\/tv\/start\/hardware"},{"key":"514_CR30","unstructured":"Google, D.: Input Events Overview. (2022). https:\/\/developer.android.com\/guide\/topics\/ui\/ui-events"},{"key":"514_CR31","unstructured":"Google: Get Started with TV Apps. (2023). https:\/\/developer.android.com\/training\/tv\/start\/start#dev-project"},{"key":"514_CR32","unstructured":"Google, D.: MotionEvent. (2023). https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent"},{"key":"514_CR33","unstructured":"Google: Google Play TV apps (2024). https:\/\/play.google.com\/store\/apps?device=tv&hl=en &gl=US"},{"key":"514_CR34","unstructured":"Group, I.: Smart TV Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast (2021). https:\/\/www.researchandmarkets.com\/reports\/5311939\/smart-tv-market-global-industry-trends-share?w=4"},{"issue":"2","key":"514_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3631968","volume":"33","author":"H Hu","year":"2023","unstructured":"Hu, H., Dong, R., Grundy, J., Nguyen, T.M., Liu, H., Chen, C.: Automated mapping of adaptive app guis from phones to tvs. ACM Trans. Softw. Eng. Methodol. 33(2), 1\u201331 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"514_CR36","doi-asserted-by":"crossref","unstructured":"Hu, Y., Wang, H., He, R., Li, L., Tyson, G., Castro, I., Guo, Y., Wu, L., Xu, G.: Mobile app squatting. In: Proceedings of The Web Conference 2020, pp. 1727\u20131738 (2020)","DOI":"10.1145\/3366423.3380243"},{"key":"514_CR37","doi-asserted-by":"crossref","unstructured":"Johnson, J.: Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines. Morgan Kaufmann, ??? (2020)","DOI":"10.1145\/3411763.3444997"},{"key":"514_CR38","unstructured":"Laricchia, F.: Android TV Continues Its Growth W\/ 7,000 Apps. (2022). https:\/\/9to5google.com\/2020\/08\/10\/android-tv-growth-apps-users-operators\/"},{"key":"514_CR39","unstructured":"Laricchia, F.: Number of Smart TV Users in the United States from 2016 to 2022 (in Millions)*. (2022). https:\/\/www.statista.com\/statistics\/718737\/number-of-smart-tv-users-in-the-us\/"},{"key":"514_CR40","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: Iccta: Detecting inter-component privacy leaks in android apps. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280\u2013291 (2015). IEEE","DOI":"10.1109\/ICSE.2015.48"},{"key":"514_CR41","doi-asserted-by":"publisher","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., McDaniel, P.: Iccta: Detecting inter-component privacy leaks in android apps. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280\u2013291 (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.48","DOI":"10.1109\/ICSE.2015.48"},{"key":"514_CR42","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyand\u00e9, T.F., Klein, J.: Simidroid: Identifying and explaining similarities in android apps. In: The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017) (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.230"},{"key":"514_CR43","unstructured":"Li, L., Bissyand\u00e9, T.F., Klein, J.: Rebooting research on detecting repackaged android apps: Literature review and benchmark. IEEE Transactions on Software Engineering (TSE) (2019)"},{"key":"514_CR44","doi-asserted-by":"crossref","unstructured":"Li, L., Bissyand\u00e9, T.F., Octeau, D., Klein, J.: Droidra: Taming reflection to support whole-program analysis of android apps. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 318\u2013329 (2016)","DOI":"10.1145\/2931037.2931044"},{"key":"514_CR45","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chen, X., Liu, P., Grundy, J., Chen, C., Li, L.: Reunify: A step towards whole program analysis for react native android apps. In: 2023 IEEE\/ACM International Conference on Automated Software Engineering (2023)","DOI":"10.1109\/ASE56229.2023.00113"},{"key":"514_CR46","doi-asserted-by":"crossref","unstructured":"Li, C., Chen, X., Wang, D., Wen, S., Ahmed, M.E., Camtepe, S., Xiang, Y.: Backdoor attack on machine learning based android malware detectors. IEEE Trans. Depend. Secure Comput. (2021)","DOI":"10.1109\/TDSC.2021.3094824"},{"key":"514_CR47","unstructured":"Lin, Y.-C.: Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015 (2015)"},{"key":"514_CR48","doi-asserted-by":"crossref","unstructured":"Li, L., Li, D., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y., Lo, D., Cavallaro, L.: Understanding android app piggybacking: A systematic study of malicious code grafting. TIFS (2017)","DOI":"10.1109\/TIFS.2017.2656460"},{"key":"514_CR49","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, L., Kong, P., Sun, X., Bissyand\u00e9, T.F.: A first look at security risks of android tv apps. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering Workshops (ASEW), pp. 59\u201364 (2021). IEEE","DOI":"10.1109\/ASEW52652.2021.00023"},{"key":"514_CR50","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., Van Der\u00a0Veen, V., Platzer, C.: Andrubis\u20131,000,000 apps later: A view on current android malware behaviors. In: 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 3\u201317 (2014). IEEE","DOI":"10.1109\/BADGERS.2014.7"},{"key":"514_CR51","doi-asserted-by":"crossref","unstructured":"Lai, D., Rubin, J.: Goal-driven exploration for android applications. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 115\u2013127 (2019). IEEE","DOI":"10.1109\/ASE.2019.00021"},{"key":"514_CR52","doi-asserted-by":"crossref","unstructured":"Lin, J.-W., Salehnamadi, N., Malek, S.: Test automation in open-source android apps: A large-scale empirical study. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1078\u20131089 (2020)","DOI":"10.1145\/3324884.3416623"},{"key":"514_CR53","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tantithamthavorn, C., Li, L., Liu, Y.: Deep learning for android malware defenses: a systematic literature review. arXiv preprint arXiv:2103.05292 (2021)","DOI":"10.1145\/3544968"},{"key":"514_CR54","doi-asserted-by":"crossref","unstructured":"Linares-V\u00e1squez, M., Bavota, G., Escobar-Vel\u00e1squez, C.: An empirical study on android-related vulnerabilities. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 2\u201313 (2017). IEEE","DOI":"10.1109\/MSR.2017.60"},{"key":"514_CR55","doi-asserted-by":"crossref","unstructured":"Liu, T., Wang, H., Li, L., Bai, G., Guo, Y., Xu, G.: Dapanda: Detecting aggressive push notifications in android apps. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 66\u201378 (2019). IEEE","DOI":"10.1109\/ASE.2019.00017"},{"key":"514_CR56","doi-asserted-by":"crossref","unstructured":"Mao, K., Harman, M., Jia, Y.: Sapienz: Multi-objective automated testing for android applications. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 94\u2013105 (2016)","DOI":"10.1145\/2931037.2931054"},{"key":"514_CR57","doi-asserted-by":"crossref","unstructured":"Mauthe, N., Karg\u00e9n, U., Shahmehri, N.: A large-scale empirical study of android app decompilation. In: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 400\u2013410 (2021). IEEE","DOI":"10.1109\/SANER50967.2021.00044"},{"key":"514_CR58","doi-asserted-by":"crossref","unstructured":"McLaughlin, N., Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doup\u00e9, A., et al.: Deep android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 301\u2013308 (2017)","DOI":"10.1145\/3029806.3029823"},{"key":"514_CR59","doi-asserted-by":"crossref","unstructured":"Mariconti, E., Onwuzurike, L., Andriotis, P., Cristofaro, E.D., Ross, G.J., Stringhini, G.: Mamadroid: Detecting android malware by building markov chains of behavioral models. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society, ??? (2017)","DOI":"10.14722\/ndss.2017.23353"},{"key":"514_CR60","unstructured":"Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le\u00a0Traon, Y.: Effective $$\\{$$Inter-Component$$\\}$$ communication mapping in android: An essential step towards holistic security analysis. In: 22nd USENIX Security Symposium (USENIX Security 13), pp. 543\u2013558 (2013)"},{"key":"514_CR61","doi-asserted-by":"crossref","unstructured":"Palomba, F., Di\u00a0Nucci, D., Panichella, A., Zaidman, A., De\u00a0Lucia, A.: Lightweight detection of android-specific code smells: The adoctor project. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 487\u2013491 (2017). IEEE","DOI":"10.1109\/SANER.2017.7884659"},{"issue":"6","key":"514_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Zhang, J., Luo, W., Pan, L., Nepal, S., Xiang, Y.: A survey of android malware detection with deep neural models. ACM Comput. Surveys (CSUR) 53(6), 1\u201336 (2020)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"514_CR63","doi-asserted-by":"crossref","unstructured":"Samhi, J., Bartel, A., Bissyand\u00e9, T.F., Klein, J.: Raicc: Revealing atypical inter-component communication in android apps. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1398\u20131409 (2021). IEEE","DOI":"10.1109\/ICSE43902.2021.00126"},{"key":"514_CR64","doi-asserted-by":"crossref","unstructured":"Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyand\u00e9, T.F., Klein, J.: Jucify: a step towards android code unification for enhanced static analysis. In: Proceedings of the 44th International Conference on Software Engineering, pp. 1232\u20131244 (2022)","DOI":"10.1145\/3510003.3512766"},{"key":"514_CR65","doi-asserted-by":"crossref","unstructured":"Samhi, J., Just, R., Bissyand\u00e9, T.F., Ernst, M.D., Klein, J.: Call graph soundness in android static analysis. In: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 945\u2013957 (2024)","DOI":"10.1145\/3650212.3680333"},{"key":"514_CR66","doi-asserted-by":"publisher","first-page":"692","DOI":"10.56553\/popets-2022-0092","volume":"3","author":"M Tileria","year":"2022","unstructured":"Tileria, M., Blasco, J.: Watch over your tv: a security and privacy analysis of the android tv ecosystem. Proc. Privacy Enhanc. Technol. 3, 692\u2013710 (2022)","journal-title":"Proc. Privacy Enhanc. Technol."},{"key":"514_CR67","doi-asserted-by":"crossref","unstructured":"Thomas, D.R., Beresford, A.R., Coudray, T., Sutcliffe, T., Taylor, A.: The lifetime of android api vulnerabilities: case study on the javascript-to-java interface. In: Cambridge International Workshop on Security Protocols, pp. 126\u2013138 (2015). Springer","DOI":"10.1007\/978-3-319-26096-9_13"},{"key":"514_CR68","doi-asserted-by":"crossref","unstructured":"Tam, K., Fattori, A., Khan, S., Cavallaro, L.: Copperdroid: Automatic reconstruction of android malware behaviors. In: NDSS Symposium 2015, pp. 1\u201315 (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"514_CR69","unstructured":"Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., Beznosov, K.: Android permissions remystified: A field study on contextual integrity. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 499\u2013514 (2015)"},{"key":"514_CR70","doi-asserted-by":"crossref","unstructured":"Wang, H., Liu, Z., Liang, J., Vallina-Rodriguez, N., Guo, Y., Li, L., Tapiador, J., Cao, J., Xu, G.: Beyond google play: A large-scale comparative study of chinese android app markets. In: Proceedings of the Internet Measurement Conference 2018, pp. 293\u2013307 (2018)","DOI":"10.1145\/3278532.3278558"},{"key":"514_CR71","doi-asserted-by":"crossref","unstructured":"Wang, Y., Rountev, A.: Profiling the responsiveness of android applications via automated resource amplification. In: Proceedings of the International Conference on Mobile Software Engineering and Systems, pp. 48\u201358 (2016)","DOI":"10.1145\/2897073.2897097"},{"key":"514_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110609","volume":"167","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Xu, G., Liu, X., Mao, W., Si, C., Pedrycz, W., Wang, W.: Identifying vulnerabilities of ssl\/tls certificate verification in android apps with static and dynamic analysis. J. Syst. Softw. 167, 110609 (2020)","journal-title":"J. Syst. Softw."},{"key":"514_CR73","doi-asserted-by":"crossref","unstructured":"Wu, H., Yang, S., Rountev, A.: Static detection of energy defect patterns in android applications. In: Proceedings of the 25th International Conference on Compiler Construction, pp. 185\u2013195 (2016)","DOI":"10.1145\/2892208.2892218"},{"key":"514_CR74","doi-asserted-by":"crossref","unstructured":"Xu, M.e., othersMa, Y., Liu, X., Lin, F.X., Liu, Y.: Appholmes: Detecting and characterizing app collusion among third-party android markets. In: Proceedings of the 26th International Conference on World Wide Web, pp. 143\u2013152 (2017)","DOI":"10.1145\/3038912.3052645"},{"key":"514_CR75","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s10515-018-0237-6","volume":"25","author":"S Yang","year":"2018","unstructured":"Yang, S., Wu, H., Zhang, H., Wang, Y., Swaminathan, C., Yan, D., Rountev, A.: Static window transition graphs for android. Automated Softw. Eng. 25, 833\u2013873 (2018)","journal-title":"Automated Softw. Eng."},{"key":"514_CR76","doi-asserted-by":"crossref","unstructured":"Zhang, R., Chen, X., Wen, S., Zheng, J.: Who activated my voice assistant? a stealthy attack on android phones without users\u2019 awareness. In: International Conference on Machine Learning for Cyber Security, pp. 378\u2013396 (2019). Springer","DOI":"10.1007\/978-3-030-30619-9_27"},{"key":"514_CR77","doi-asserted-by":"crossref","unstructured":"Zhan, X., Fan, L., Chen, S., Wu, F., Liu, T., Luo, X., Liu, Y.: Atvhunter: Reliable version detection of third-party libraries for vulnerability identification in android applications. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 1695\u20131707 (2021). IEEE","DOI":"10.1109\/ICSE43902.2021.00150"},{"key":"514_CR78","doi-asserted-by":"crossref","unstructured":"Zhang, X., Fan, L., Chen, S., Su, Y., Li, B.: Scene-driven exploration and gui modeling for android apps. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1251\u20131262 (2023). IEEE","DOI":"10.1109\/ASE56229.2023.00179"},{"issue":"3","key":"514_CR79","first-page":"1","volume":"30","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y., Li, L., Wang, H., Cai, H., Bissyand\u00e9, T.F., Klein, J., Grundy, J.: On the impact of sample duplication in machine-learning-based android malware detection. TOSEM 30(3), 1\u201338 (2021)","journal-title":"TOSEM"},{"key":"514_CR80","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Sui, Y., Xue, J.: Launch-mode-aware context-sensitive activity transition analysis. In: Proceedings of the 40th International Conference on Software Engineering, pp. 598\u2013608 (2018)","DOI":"10.1145\/3180155.3180188"},{"key":"514_CR81","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: NDSS, vol. 25, pp. 50\u201352 (2012)"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00514-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00514-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00514-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T13:56:48Z","timestamp":1757512608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00514-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":81,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["514"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00514-8","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"30 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"46"}}