{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:32:21Z","timestamp":1730316741755,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523676","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T15:44:07Z","timestamp":1389023047000},"page":"299-308","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DR BACA"],"prefix":"10.1145","author":[{"given":"Felix","family":"Rohrer","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Yuting","family":"Zhang","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Lou","family":"Chitkushev","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Tanya","family":"Zlateva","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"M. Ballano. Android.mobiletx. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-052807-4439-99 2012. M. Ballano. Android.mobiletx. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-052807-4439-99 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Cai. Android.jifake. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-073021-4247-99 2012. B. Cai. Android.jifake. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-073021-4247-99 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266866"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"M. Conti V. Nguyen and B. Crispo. Crepe: context-related policy enforcement for android. 2011. M. Conti V. Nguyen and B. Crispo. Crepe: context-related policy enforcement for android. 2011.","DOI":"10.1007\/978-3-642-18178-8_29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"volume-title":"USENIX","year":"2011","author":"Felt A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"554","volume-title":"In 15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo D.","year":"1992"},{"key":"e_1_3_2_1_10_1","unstructured":"Gartner. Smartphone sales increased 47 percent. http:\/\/www.gartner.com\/newsroom\/id\/2237315 Nov. 2012. Gartner. Smartphone sales increased 47 percent. http:\/\/www.gartner.com\/newsroom\/id\/2237315 Nov. 2012."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. Jelly bean. http:\/\/developer.android.com\/about\/versions\/jelly-bean.html 2012. Google. Jelly bean. http:\/\/developer.android.com\/about\/versions\/jelly-bean.html 2012."},{"key":"e_1_3_2_1_12_1","unstructured":"Google. Manifest.permission. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html 2013. Google. Manifest.permission. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html 2013."},{"key":"e_1_3_2_1_13_1","unstructured":"Google. Signing your applications. http:\/\/developer.android.com\/tools\/publishing\/app-signing.html 2013. Google. Signing your applications. http:\/\/developer.android.com\/tools\/publishing\/app-signing.html 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064000"},{"key":"e_1_3_2_1_15_1","unstructured":"McAfee-Labs. Mcafee threats report: Second quarter 2012. Technical report 2012. McAfee-Labs. Mcafee threats report: Second quarter 2012. Technical report 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476628"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2011.5766466"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"volume-title":"USA","year":"1993","author":"Nielsen J.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"U. D. of Health & Human Services. Your medical records. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/understanding\/consumers\/medicalrecords.html 2013. U. D. of Health & Human Services. Your medical records. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/understanding\/consumers\/medicalrecords.html 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"e_1_3_2_1_22_1","unstructured":"E. Protalinski. New android malware uses google play icon to trick users conduct ddos attacks and send spam texts. http:\/\/thenextweb.com\/google\/2012\/12\/27\/new-android-malware-uses-google-play-icon-to-trick-users-conduct-ddos-attacks-and-send-spam-texts\/ 2012. E. Protalinski. New android malware uses google play icon to trick users conduct ddos attacks and send spam texts. http:\/\/thenextweb.com\/google\/2012\/12\/27\/new-android-malware-uses-google-play-icon-to-trick-users-conduct-ddos-attacks-and-send-spam-texts\/ 2012."},{"key":"e_1_3_2_1_23_1","first-page":"231","volume-title":"Proceedings of the 12th USENIX Security Symposium","volume":"12","author":"Provos N.","year":"2003"},{"volume-title":"Boston University Metropolitan College","year":"2013","author":"Rohrer F.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"F. Ruiz. 'Fakeinstaller' leads the attack on android phones. http:\/\/blogs.mcafee.com\/mcafee-labs\/fakeinstaller-leads-the-attack-on-android-phones 2012. F. Ruiz. 'Fakeinstaller' leads the attack on android phones. http:\/\/blogs.mcafee.com\/mcafee-labs\/fakeinstaller-leads-the-attack-on-android-phones 2012."},{"key":"e_1_3_2_1_26_1","unstructured":"A. Saita. Mobile malware dubbed 'bill shocker' targets chinese android users. http:\/\/threatpost.com\/en\\_us\/blogs\/mobile-malware-dubbed-bill-shocker-targets-chinese-android-users-013013 2013. A. Saita. Mobile malware dubbed 'bill shocker' targets chinese android users. http:\/\/threatpost.com\/en\\_us\/blogs\/mobile-malware-dubbed-bill-shocker-targets-chinese-android-users-013013 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.144"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514.2517"},{"key":"e_1_3_2_1_31_1","unstructured":"A. Yamamoto. Android.ackposts. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-072302-3943-99 2012. A. Yamamoto. Android.ackposts. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-072302-3943-99 2012."},{"key":"e_1_3_2_1_32_1","unstructured":"A. Yamamoto. Android.enesoluty. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-090607-0807-99 2012. A. Yamamoto. Android.enesoluty. http:\/\/www.symantec.com\/security\\_response\/writeup.jsp?docid=2012-090607-0807-99 2012."},{"key":"e_1_3_2_1_33_1","first-page":"54","volume-title":"Networked Computing and Advanced Information Management (NCM), 2011 7th International Conference on","author":"Yee T. T. W.","year":"2011"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T04:36:12Z","timestamp":1673584572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523676"}},"subtitle":["dynamic role based access control for Android"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":32,"alternative-id":["10.1145\/2523649.2523676","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523676","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}