{"id":"https://openalex.org/W1989142206","doi":"https://doi.org/10.4018/jeei.2013010102","title":"Android Permission System Violation","display_name":"Android Permission System Violation","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W1989142206","doi":"https://doi.org/10.4018/jeei.2013010102","mag":"1989142206"},"language":"en","primary_location":{"id":"doi:10.4018/jeei.2013010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jeei.2013010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210191280","display_name":"International Journal of E-Entrepreneurship and Innovation","issn_l":"1947-8585","issn":["1947-8585","1947-8593"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of E-Entrepreneurship and Innovation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111744865","display_name":"Kyoung Soo Han","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kyoung Soo Han","raw_affiliation_strings":["Department of Computer and Software, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005920745","display_name":"Yeoreum Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yeoreum Lee","raw_affiliation_strings":["Department of Computer and Software, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102058156","display_name":"Biao Jiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Biao Jiang","raw_affiliation_strings":["Microsoft (China), Co., Ltd., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Microsoft (China), Co., Ltd., Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009979103","display_name":"Eul Gyu Im","orcid":"https://orcid.org/0000-0002-4130-513X"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Eul Gyu Im","raw_affiliation_strings":["Division of Computer Science and Engineering, Hanyang University, Seoul, South Korea","[Division of Computer Science and Engineering, Hanyang University, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"[Division of Computer Science and Engineering, Hanyang University, Seoul, South Korea]","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111744865"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":0.9576,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73532857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"4","issue":"1","first_page":"16","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8527661561965942},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7539080381393433},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6862801313400269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6172301173210144},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2809031009674072}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8527661561965942},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7539080381393433},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6862801313400269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6172301173210144},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2809031009674072},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jeei.2013010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jeei.2013010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210191280","display_name":"International Journal of E-Entrepreneurship and Innovation","issn_l":"1947-8585","issn":["1947-8585","1947-8593"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of E-Entrepreneurship and Innovation","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jeei00:v:4:y:2013:i:1:p:16-27","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jeei.2013010102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W72228273","https://openalex.org/W81879861","https://openalex.org/W140371796","https://openalex.org/W1565125975","https://openalex.org/W1680232729","https://openalex.org/W1865564993","https://openalex.org/W1912565424","https://openalex.org/W1963971515","https://openalex.org/W1986330503","https://openalex.org/W1994588724","https://openalex.org/W1997787920","https://openalex.org/W2003276999","https://openalex.org/W2053008565","https://openalex.org/W2101834106","https://openalex.org/W2105412867","https://openalex.org/W2114275288","https://openalex.org/W2125011234","https://openalex.org/W2140095007","https://openalex.org/W2142145056","https://openalex.org/W2153497135","https://openalex.org/W2158888459","https://openalex.org/W2399034518","https://openalex.org/W2784849271","https://openalex.org/W2951116536","https://openalex.org/W6603356336","https://openalex.org/W6640059210"],"related_works":["https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W3003485427","https://openalex.org/W2755037920","https://openalex.org/W4210309948","https://openalex.org/W2072937473","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W609672658","https://openalex.org/W3137508356"],"abstract_inverted_index":{"Android":[0,7,32,50],"uses":[1],"permissions":[2,102],"for":[3,85],"application":[4,41],"security":[5],"management.":[6],"also":[8,56],"allows":[9],"inter-application":[10],"communication":[11],"(IAC),":[12],"which":[13],"enables":[14],"cooperation":[15],"between":[16],"different":[17],"applications":[18,59],"to":[19,95,106],"perform":[20],"complex":[21],"tasks":[22],"by":[23,99],"using":[24],"some":[25],"components":[26],"and":[27,36,89,103],"Intents.":[28],"In":[29,68],"other":[30],"words,":[31],"provides":[33],"more":[34],"flexibility":[35],"places":[37],"less":[38],"restriction":[39],"on":[40],"development.":[42],"This":[43],"is":[44],"a":[45,93],"major":[46],"feature":[47],"that":[48,60,77],"differentiates":[49],"from":[51],"its":[52],"competitors.":[53],"However,":[54],"IAC":[55,79,101,105],"facilitates":[57],"malicious":[58],"can":[61,81],"collude":[62],"in":[63],"attacks":[64],"of":[65],"privilege":[66,86],"escalation.":[67],"this":[69,97],"paper,":[70],"the":[71,90],"authors":[72,91],"demonstrate":[73],"with":[74],"case":[75],"studies":[76],"all":[78],"channels":[80],"potentially":[82],"be":[83],"utilized":[84],"escalation":[87],"attacks,":[88],"propose":[92],"refinement":[94],"solve":[96],"problem":[98],"enforcing":[100],"exposing":[104],"users.":[107]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
