{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:11:15Z","timestamp":1742980275348,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457437"},{"type":"electronic","value":"9783319457444"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_19","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"383-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook"],"prefix":"10.1007","author":[{"given":"Carter","family":"Yagemann","sequence":"first","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Wenliang, D., Grace, M.: Hare hunting in the wild android: a study on the threat of hanging attribute references. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1248\u20131259. ACM, New York (2015)","DOI":"10.1145\/2810103.2813648"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Andrus, J., Dall, C., Van\u2019t Hof, A., Laadan, O., Nieh, J.: Cells: a virtual mobile smartphone architecture. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 173\u2013187. ACM, New York (2011)","DOI":"10.1145\/2043556.2043574"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Gerling, S., Scippa: system-centric IPC provenance on android. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 36\u201345. ACM, New York (2014)","DOI":"10.1145\/2664243.2664264"},{"key":"19_CR4","unstructured":"Backes, M., Bugiel, S., Hammer, C., Schranz, O., von Styp-Rekowsky, P.: Boxify: full-fledged app sandboxing for stock android. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 691\u2013706. USENIX Association, Washington, D.C., August 2015"},{"key":"19_CR5","unstructured":"Bernstein, D.J.: Syn cookies. http:\/\/cr.yp.to\/syncookies.html. Accessed 20 Nov 2015"},{"key":"19_CR6","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technical report TR-2011-04, Technische Universit\u00e4t Darmstadt, April 2011"},{"key":"19_CR7","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: NDSS (2012)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.-R., Shastry, B.: Practical and lightweight domain isolation on android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 51\u201362. ACM, New York (2011)","DOI":"10.1145\/2046614.2046624"},{"key":"19_CR9","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.-R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 2013), pp. 131\u2013146. USENIX, Washington, D.C. (2013)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 239\u2013252. ACM, New York (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-18178-8_29","volume-title":"Information Security","author":"M Conti","year":"2011","unstructured":"Conti, M., Nguyen, V.T.N., Crispo, B.: CRePE: context-related policy enforcement for android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 331\u2013345. Springer, Heidelberg (2011)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"Information Security","author":"L Davi","year":"2011","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346\u2013360. Springer, Heidelberg (2011)"},{"key":"19_CR13","unstructured":"Elish, K.O., Yao, D.D., Ryder, B.G.: On the need of precise inter-app ICC classification for detecting android malware collusions. In: Proceedings of IEEE Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy (2015)"},{"key":"19_CR14","unstructured":"Enck, W., Ongtang, M., Mcdaniel, P.: Mitigating android software misuse before it happens (2008)"},{"key":"19_CR15","unstructured":"Felt, A.P., Hanna, S., Chin, E., Wang, H.J., Moshchuk, E.: Permission re-delegation: attacks and defenses. In: 20th Usenix Security Symposium (2011)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Hay, R., Tripp, O., Pistoia, M.: Dynamic detection of inter-application communication vulnerabilities in android. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, ISSTA 2015, pp. 118\u2013128. ACM, New York (2015)","DOI":"10.1145\/2771783.2771800"},{"key":"19_CR17","unstructured":"Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 1005\u20131019. USENIX Association, San Diego, August 2014"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Kantola, D., Chin, E., He, W., Wagner, D.: Reducing attack surfaces for intra-application communication in android. Technical report UCB\/EECS-2012-182, EECS Department, University of California, Berkeley, July 2012","DOI":"10.1145\/2381934.2381948"},{"key":"19_CR19","unstructured":"Lineberry, A., Richardson, D.L., Wyatt, T.: These arent the permissions you are looking for. In: DefCon, vol. 18 (2010)"},{"key":"19_CR20","unstructured":"Linux-PAM. A linux-pam page. http:\/\/www.linux-pam.org\/. Accessed 02 Dec 2015"},{"key":"19_CR21","unstructured":"Long, L., Li, Z., Zhenyu, W., Lee, W., Jiang, G., Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 229\u2013240. ACM, New York (2012)"},{"key":"19_CR22","unstructured":"Ludwig, A.: Android security state of the union. In: Black Hat USA (2015)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Maji, A.K., Arshad, F.A., Bagchi, S., Rellermeyer, J.S.: An empirical study of the robustness of inter-component communication in android. In: Proceedings of the 2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), DSN 2012, pp. 1\u201312. IEEE Computer Society, Washington, D.C. (2012)","DOI":"10.1109\/DSN.2012.6263963"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Nadkarni, A., Enck, W.: Preventing accidental data disclosure in modern operating systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 1029\u20131042. ACM, New York (2013)","DOI":"10.1145\/2508859.2516677"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in android. In: Computer Security Applications Conference, ACSAC 2009, Annual, pp. 340\u2013349, December 2009","DOI":"10.1109\/ACSAC.2009.39"},{"key":"19_CR26","unstructured":"OWASP. Web application firewall. http:\/\/tinyurl.com\/3cakwty. Accessed 4 Dec 2015"},{"key":"19_CR27","unstructured":"Android Open Source Project. Android open source project - issue tracker - issue 177223: Intent\/bundle security issue. https:\/\/code.google.com\/p\/android\/issues\/detail?id=177223. Accessed 20 Nov 2015"},{"key":"19_CR28","first-page":"17","volume":"11","author":"R Schlegel","year":"2011","unstructured":"Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.F.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. NDSS 11, 17\u201333 (2011)","journal-title":"NDSS"},{"key":"19_CR29","first-page":"20","volume":"310","author":"S Smalley","year":"2013","unstructured":"Smalley, S., Craig, R.: Security enhanced (se) android: bringing flexible MAC to android. NDSS 310, 20\u201338 (2013)","journal-title":"NDSS"},{"key":"19_CR30","unstructured":"Chiachih, W., Zhou, Y., Patel, K., Liang, Z., Jiang, X., Airbag: boosting smartphone resistance to malware infection. In: Proceedings of the Network and Distributed System Security Symposium (2014)"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Wang, D., Zhang, Y., Qin, B., Aimin, Y., Zhao, B.: Chaindroid: safe and flexible access to protected android resources based on call chain. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 156\u2013162, July 2013","DOI":"10.1109\/TrustCom.2013.24"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T02:56:11Z","timestamp":1631674571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}