{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:32Z","timestamp":1725791012045},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T00:00:00Z","timestamp":1527465600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"},{"name":"National Key R&D Program of China","award":["2017YFB1001801"]},{"name":"National Natural Science Foundation of China","award":["61690204, 61472174"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,28]]},"DOI":"10.1145\/3196321.3196336","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"244-254","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["LESdroid"],"prefix":"10.1145","author":[{"given":"Jun","family":"Ma","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Shaocong","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Yanyan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Xianping","family":"Tao","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Chang","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Jian","family":"Lu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,5,28]]},"reference":[{"volume-title":"Android Service Guide. (2017). Retrieved","year":"2017","key":"e_1_3_2_1_1_1","unstructured":"2017. Android Service Guide. (2017). Retrieved Aug. 7, 2017 from https:\/\/developer.android.com\/guide\/components\/services.html"},{"volume-title":"Retrieved","year":"2016","key":"e_1_3_2_1_2_1","unstructured":"AndrodMat 2016. AndroMAT. (2016). Retrieved July 31, 2016 from https:\/\/bitbucket.org\/joebowbeer\/andromat\/overview"},{"volume-title":"Services API 2017","year":"2017","author":"Android","key":"e_1_3_2_1_3_1","unstructured":"Android Services API 2017. Android Service API Reference. (2017). Retrieved Aug. 7, 2017 from https:\/\/developer.android.google.cn\/reference\/android\/app\/Service.html"},{"volume-title":"Platform Versions of Android. (2017). Retrieved","year":"2017","author":"Android Versions","key":"e_1_3_2_1_4_1","unstructured":"Android Versions 2017. Platform Versions of Android. (2017). Retrieved August 8, 2017 from https:\/\/developer.android.com\/about\/dashboards\/index.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508277"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818033"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106286"},{"volume-title":"Retrieved","year":"2016","author":"HAHA","key":"e_1_3_2_1_11_1","unstructured":"HAHA 2016. Headless Android Heap Analyzer(HAHA). (2016). Retrieved July 31, 2016 from https:\/\/github.com\/square\/haha"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771800"},{"volume-title":"Retrieved","year":"2016","author":"LeakCanary","key":"e_1_3_2_1_13_1","unstructured":"LeakCanary 2016. (2016). Retrieved July 11, 2016 from https:\/\/github.com\/square\/leakcanary"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"volume-title":"Proceedings of the 41th IEEE International Computer Software and Applications Conference (COMPSAC XIV).","author":"Jun MA","key":"e_1_3_2_1_15_1","unstructured":"Jun MA, Sheng LIU, Shengtao YUE, Xianping TAO, and Jian LU. 2017. LeakDAF: An Automated Tool for Detecting Leaked Activities and Fragments of Android Applications. In Proceedings of the 41th IEEE International Computer Software and Applications Conference (COMPSAC XIV)."},{"volume-title":"Retrieved","year":"2016","author":"MAT","key":"e_1_3_2_1_16_1","unstructured":"MAT 2016. (2016). Retrieved July 11, 2016 from http:\/\/www.eclipse.org\/mat\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45070-2_16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2550446"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1670-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819149"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.48"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2547385"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.60"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544151"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"D. Yan S. Yang and A. Rountev. 2013. Systematic testing for resource leaks in Android applications. (Nov 2013) 411--420.","DOI":"10.1109\/ISSRE.2013.6698894"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"H. Zhang H. Wu and A. Rountev. 2016. Automated Test Generation for Detection of Leaks in Android Applications. (May 2016) 64--70. 10.1145\/2896921.2896932","DOI":"10.1145\/2896921.2896932"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155568"},{"volume-title":"Detecting Passive Content Leaks and Pollution in Android Applications. In In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, NDSS 13","year":"2013","author":"Zhou Yajin","key":"e_1_3_2_1_29_1","unstructured":"Yajin Zhou and Xuxian Jiang. 2013. Detecting Passive Content Leaks and Pollution in Android Applications. In In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, NDSS 13."}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 26th Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196321.3196336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T22:29:20Z","timestamp":1720996160000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196321.3196336"}},"subtitle":["a tool for detecting exported service leaks of Android applications"],"short-title":[],"issued":{"date-parts":[[2018,5,28]]},"references-count":29,"alternative-id":["10.1145\/3196321.3196336","10.1145\/3196321"],"URL":"https:\/\/doi.org\/10.1145\/3196321.3196336","relation":{},"subject":[],"published":{"date-parts":[[2018,5,28]]},"assertion":[{"value":"2018-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}