{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:22:30Z","timestamp":1725830550744},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238197"},{"type":"electronic","value":"9783319238203"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23820-3_24","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T10:21:39Z","timestamp":1442658099000},"page":"342-357","source":"Crossref","is-referenced-by-count":18,"title":["RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial"],"prefix":"10.1007","author":[{"given":"Philip","family":"Daian","sequence":"first","affiliation":[]},{"given":"Yli\u00e8s","family":"Falcone","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Meredith","sequence":"additional","affiliation":[]},{"given":"Traian Florin","family":"\u015eerb\u0103nu\u0163\u0103","sequence":"additional","affiliation":[]},{"given":"Shin\u2019ichi","family":"Shiriashi","sequence":"additional","affiliation":[]},{"given":"Akihito","family":"Iwai","sequence":"additional","affiliation":[]},{"given":"Grigore","family":"Rosu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"24_CR1","unstructured":"Google Inc.: Android Developers (2014). \n http:\/\/developers.android.com"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-35632-2_11","volume-title":"Runtime Verification","author":"Y Falcone","year":"2013","unstructured":"Falcone, Y., Currea, S., Jaber, M.: Runtime verification and enforcement for Android applications with RV-Droid. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 88\u201395. Springer, Heidelberg (2013)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-28891-3_18","volume-title":"NASA Formal Methods","author":"A Bauer","year":"2012","unstructured":"Bauer, A., K\u00fcster, J.-C., Vegliach, G.: Runtime verification meets Android security. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 174\u2013180. Springer, Heidelberg (2012)"},{"key":"24_CR4","unstructured":"Falcone, Y., Currea, S.: Weave Droid: aspect-oriented programming on Android devices: fully embedded or in the cloud. In: [23], pp. 350\u2013353"},{"key":"24_CR5","unstructured":"Eclipse: The AspectJ project (2014). \n http:\/\/eclipse.org\/aspectj"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-319-11164-3_24","volume-title":"Runtime Verification","author":"Q Luo","year":"2014","unstructured":"Luo, Q., Zhang, Y., Lee, C., Jin, D., Meredith, P.O.N., \u015eerb\u0103nu\u0163\u0103, T.F., Ro\u015fu, G.: RV-Monitor: efficient parametric runtime verification with simultaneous properties. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 285\u2013300. Springer, Heidelberg (2014)"},{"key":"24_CR7","unstructured":"Mulliner, C.: Dynamic binary instrumentation on Android (2012)"},{"key":"24_CR8","unstructured":"Bodden, E.: Instrumenting Android apps with Soot (2014). \n http:\/\/www.bodden.de\/2013\/01\/08\/soot-android-instrumentation\/"},{"issue":"2","key":"24_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1142\/S0218194096000107","volume":"6","author":"P Binns","year":"1996","unstructured":"Binns, P., Englehart, M., Jackson, M., Vestal, S.: Domain specific software architectures for guidance, navigation and control. J. Softw. Eng. Knowl. Eng. 6(2), 201\u2013227 (1996)","journal-title":"J. Softw. Eng. Knowl. Eng."},{"issue":"1","key":"24_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding Android security. IEEE Secur. Priv. 7(1), 50\u201357 (2009)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"24_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35\u201344 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"24_CR12","unstructured":"Google Inc.: Runtime\u2014Android Developers (2015). \n http:\/\/developer.android.com\/reference\/java\/lang\/Runtime.html"},{"key":"24_CR13","unstructured":"TrendMicro Security Intelligence Blog: Android ransomware uses tor (2014). \n http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/android-ransomware-uses-tor\/"},{"key":"24_CR14","unstructured":"PCWorld: Cybercriminals are using the Tor network to control their botnets. (2013) \n http:\/\/www.pcworld.com\/article\/2045183\/"},{"key":"24_CR15","unstructured":"Google Inc.: Google report Android security 2014 year in review (2014). \n https:\/\/static.googleusercontent.com\/media\/source.android.com\/en\/us\/devices\/tech\/security\/reports\/Google_Android_Security_2014_Report_Final.pdf"},{"key":"24_CR16","unstructured":"BGR: This will be the most important (and possibly most overlooked) new android m feature (2015). \n http:\/\/bgr.com\/2015\/05\/28\/android-m-granular-permissions-controls\/"},{"key":"24_CR17","unstructured":"Android Police: Android M will never ask users for permission to use the internet, and that\u2019s probably okay (2015) Published on the 06 June 2015 at \n www.androidpolice.com"},{"key":"24_CR18","unstructured":"Amalfitano, D., Fasolino, A.R., Tramontana, P., Carmine, S.D., Memon, A.M.: Using GUI ripping for automated testing of Android applications. In: [23], pp. 258\u2013261. \n http:\/\/wpage.unina.it\/ptramont\/GUIRipperWiki.htm"},{"key":"24_CR19","unstructured":"Wontae Choi on Github: Swifthand (2015). \n https:\/\/github.com\/wtchoi\/swifthand"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1145\/2666356.2594299","volume":"49","author":"S Arzt","year":"2014","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. ACM SIGPLAN Not. 49, 259\u2013269 (2014). ACM","journal-title":"ACM SIGPLAN Not."},{"key":"24_CR21","unstructured":"Fritz, C., Arzt, S., Rasthofer, S., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Highly precise taint analysis for Android applications. EC SPRIDE, TU Darmstadt, Technical report (2013)"},{"key":"24_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-77395-5_3","volume-title":"Runtime Verification","author":"E Bodden","year":"2007","unstructured":"Bodden, E., Hendren, L., Lam, P., Lhot\u00e1k, O., Naeem, N.A.: Collaborative runtime verification with tracematches. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 22\u201337. Springer, Heidelberg (2007)"},{"key":"24_CR23","unstructured":"Goedicke, M., Menzies, T., Saeki, M. (eds.): IEEE\/ACM International Conference on Automated Software Engineering, ASE 2012, Essen, Germany, 3\u20137 September. ACM (2012)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23820-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:40:52Z","timestamp":1559248852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23820-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238197","9783319238203"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23820-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}