{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:24Z","timestamp":1730213724026,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361431","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"1024-1031","source":"Crossref","is-referenced-by-count":0,"title":["PrivDroid: Android Security Code Smells Tool for Privilege Escalation Prevention"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"El Amin Tebib","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes,Grenoble INP*, LCIS lab,Valence,France"}]},{"given":"Pascal","family":"Andr\u00e9","sequence":"additional","affiliation":[{"name":"Nantes University,LS2N UMR 6004,Nantes,France"}]},{"given":"Mariem","family":"Graa","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes,Grenoble INP*, LCIS lab,Valence,France"}]},{"given":"Oum-El-Kheir","family":"Aktouf","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes,Grenoble INP*, LCIS lab,Valence,France"}]}],"member":"263","reference":[{"volume-title":"Global market share held by mobile operating systems from 2009 to 2023, by quarter","year":"2023","key":"ref1"},{"volume-title":"Android: Vulnerability statistics","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2019.00034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3140868"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICD47981.2019.9105789"},{"issue":"1&2","key":"ref6","first-page":"54","article-title":"A survey on secure android apps development life-cycle: Vulnerabilities and tools","volume":"16","author":"TEBIB","year":"2023","journal-title":"Advances in Security, IARIA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111575"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75251-4_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9673-y"},{"article-title":"Security-based code smell definition, detection, and impact quantification in android","volume-title":"Authorea","year":"2022","author":"Shi","key":"ref11"},{"volume-title":"Improve your code with lint checks","year":"2022","key":"ref12"},{"volume-title":"Lintent: Towards security type-checking of android applications","year":"2021","key":"ref13"},{"volume-title":"Ghera","year":"2021","key":"ref14"},{"volume-title":"Droidbench benchmark suite","year":"2021","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3119980"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app9183699"},{"volume-title":"Curbing android permission creep","year":"2011","author":"Vidas","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243842"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23106"},{"journal-title":"arXiv preprint","article-title":"Natidroid: Cross-language android permission specification","year":"2021","author":"Li","key":"ref24"},{"volume-title":"Free and open source android app repository - f-droid","year":"2023","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2688130.2688134"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"journal-title":"arXiv preprint","article-title":"Sema: Extending and analyzing storyboards to develop secure android apps","year":"2020","author":"Mitra","key":"ref28"},{"volume-title":"Code quality and code security","year":"2022","key":"ref29"},{"volume-title":"Fixdroid: Usable security and privacy research","year":"2022","key":"ref30"},{"volume-title":"Developer loved, security trusted","year":"2023","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2688130.2688135"},{"volume-title":"Implicitpendingintent","year":"2023","key":"ref33"},{"volume-title":"Emptypendingintent","year":"2023","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301405"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361431.pdf?arnumber=10361431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:45:03Z","timestamp":1705092303000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361431","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}