{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:50:20Z","timestamp":1745387420763},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/issre.2017.38","type":"proceedings-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T16:54:58Z","timestamp":1510851298000},"page":"250-259","source":"Crossref","is-referenced-by-count":4,"title":["Perman: Fine-Grained Permission Management for Android Applications"],"prefix":"10.1109","author":[{"given":"Jiaojiao","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yangfan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"ref32","first-page":"553","article-title":"Adsplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"21th USENIX Security Symposium"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"ref36","first-page":"539","article-title":"Aurasium: Practical policy enforcement for android applications","author":"xu","year":"2012","journal-title":"21th USENIX Security Symposium"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_23"},{"journal-title":"Malware alert if you downloaded these 3 android apps remove them immediately","year":"0","key":"ref10"},{"journal-title":"New android adware on goolge play more aggressive than ever","year":"0","key":"ref11"},{"journal-title":"A Tool for Reverse Engineering Android Apk Files","year":"0","key":"ref12"},{"journal-title":"WAPS","year":"0","key":"ref13"},{"journal-title":"Official Android Blog","article-title":"Get ready for the sweet taste of android 6. 0 marshmallow","year":"0","key":"ref14"},{"key":"ref15","first-page":"1560","article-title":"A privacy-preserving framework for managing mobile ad requests and billing information","author":"artail","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"journal-title":"Longitudinal Analysis of Android Ad Library Permissions","year":"2013","author":"book","key":"ref17"},{"key":"ref18","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on android for diverse security and privacy policies","author":"bugiel","year":"2013","journal-title":"Proceedings of the 22th USENIX Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45231-8_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23008"},{"journal-title":"Google admob","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"journal-title":"The Official Site for Android Developers","year":"0","key":"ref3"},{"journal-title":"Google play Beware android adware infestation","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"journal-title":"Google Analytics","year":"0","key":"ref5"},{"journal-title":"JD-GUI","year":"0","key":"ref8"},{"journal-title":"Google Play Store","year":"0","key":"ref7"},{"journal-title":"Adware android apps found in google play with millions of downloads","year":"0","key":"ref2"},{"journal-title":"LBE","year":"0","key":"ref9"},{"journal-title":"Adware","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.14"},{"key":"ref21","first-page":"75","article-title":"The effectiveness of application permissions","author":"felt","year":"2011","journal-title":"Proceedings of the 2nd USENIX Conference on Web Application Development"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"ref23","first-page":"101","author":"grace","year":"2012","journal-title":"Unsafe exposure analysis of mobile in-app advertisements"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref25","article-title":"Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings","author":"lin","year":"2014","journal-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS)"}],"event":{"name":"2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2017,10,23]]},"location":"Toulouse","end":{"date-parts":[[2017,10,26]]}},"container-title":["2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8108705\/8109056\/08109091.pdf?arnumber=8109091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T18:19:17Z","timestamp":1513621157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8109091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/issre.2017.38","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}