{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:02:59Z","timestamp":1742990579671,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457437"},{"type":"electronic","value":"9783319457444"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_20","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"401-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hey, You, Get Off of My Image: Detecting Data Residue in Android Images"],"prefix":"10.1007","author":[{"given":"Xiao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yousra","family":"Aafer","sequence":"additional","affiliation":[]},{"given":"Kailiang","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"20_CR1","unstructured":"Android Revolution. http:\/\/goo.gl\/MVigfq"},{"key":"20_CR2","unstructured":"ANRED: Android Residue Detection Framework. https:\/\/goo.gl\/Q0d5qH"},{"key":"20_CR3","unstructured":"Apktool: A tool for reverse engineering Android apk files. http:\/\/goo.gl\/LdB4V7"},{"key":"20_CR4","unstructured":"Cyanogenmod Downloads. http:\/\/download.cyanogenmod.org\/"},{"key":"20_CR5","unstructured":"Cyclomatic complexity. https:\/\/goo.gl\/1VqYUj"},{"key":"20_CR6","unstructured":"dex2jar. https:\/\/goo.gl\/5fzsd5"},{"key":"20_CR7","unstructured":"dextra - A tool for DEX and OAT dumping, decompilation, and fuzzing. http:\/\/goo.gl\/NPG0Kz"},{"key":"20_CR8","unstructured":"ext4_utils. https:\/\/goo.gl\/1nyYfM"},{"key":"20_CR9","unstructured":"Factory Images for Nexus Devices. https:\/\/goo.gl\/i0RJnN"},{"key":"20_CR10","unstructured":"Huawei ROMs. http:\/\/goo.gl\/dYPTE5"},{"key":"20_CR11","unstructured":"Java: Computing Cyclomatic Complexity. http:\/\/goo.gl\/tduqlP"},{"key":"20_CR12","unstructured":"Java Varargs. http:\/\/goo.gl\/TEMrjk"},{"key":"20_CR13","unstructured":"Lollipop deodexing. https:\/\/goo.gl\/uw2KmR"},{"key":"20_CR14","unstructured":"Official Oxygen OS ROMs and OTA updates. https:\/\/goo.gl\/cBTF1w"},{"key":"20_CR15","unstructured":"smali and baksmali. https:\/\/goo.gl\/JS7Mgw"},{"key":"20_CR16","unstructured":"WALA. http:\/\/wala.sourceforge.net\/"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, New York, NY, USA (2014)","DOI":"10.1145\/2594291.2594299"},{"key":"20_CR18","unstructured":"Bacon, D.F.: Fast and effective optimization of statically typed object-oriented. Technical report, Berkeley, CA, USA (1998)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Bacon, D.F., Sweeney, P.F.: Fast static analysis of c++ virtual function calls. In: Proceedings of the 11th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, OOPSLA 1996, pp. 324\u2013341. ACM, New York, NY, USA (1996)","DOI":"10.1145\/236337.236371"},{"key":"20_CR20","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical report, Technische Universit\u00e4t Darmstadt, Technical Report TR-2011-04 (2011)"},{"key":"20_CR21","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. NDSS (2012)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Cao, Y., Fratantonio, Y., Bianchi, A., Egele, M., Kruegel, C., Vigna, G., Chen, Y.: EdgeMiner: automatically detecting implicit control flow transitions through the android framework. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23140"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011. ACM, New York, NY, USA (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"20_CR24","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: lightweight provenance for smart phone operating systems. In: 20th USENIX Security Symposium, San Francisco, CA, August 2011"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Egele, M., Brumley, D., Fratantonio, Y., Kruegel, C.: An empirical study of cryptographic misuse in android applications. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications security. ACM (2013)","DOI":"10.1145\/2508859.2516693"},{"issue":"2","key":"20_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"William Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1\u20136. USENIX Association, Berkeley, CA, USA (2010)","journal-title":"ACM Transactions on Computer Systems"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-39884-1_12","volume-title":"Financial Cryptography and Data Security","author":"S Fahl","year":"2013","unstructured":"Fahl, S., Harbach, M., Oltrogge, M., Muders, T., Smith, M.: Hey, you, get off of my clipboard. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 144\u2013161. Springer, Heidelberg (2013)"},{"key":"20_CR28","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: Attacks and defenses. In: Proceedings of the 20th USENIX Security Symposium, pp. 22\u201337 (2011)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Fragkaki, E., Bauer, L., Jia, L., Swasey, D.: Modeling and enhancing androids permission system. In: 17th European Symposium on Research in Computer Security (2012)","DOI":"10.21236\/ADA579929"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information-flow analysis of android applications in droidsafe. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23089"},{"key":"20_CR31","unstructured":"Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock Android smartphones. In: Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), February 2012"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Grove, D., DeFouw, G., Dean, J., Chambers, C.: Call graph construction in object-oriented languages. In: Proceedings of the 12th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, OOPSLA 1997, pp. 108\u2013124. ACM, New York, NY, USA, (1997)","DOI":"10.1145\/263700.264352"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 229\u2013240. ACM, New York, NY, USA (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on webview in the android system. In: ACSAC (2011)","DOI":"10.1145\/2076732.2076781"},{"key":"20_CR35","unstructured":"Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis. In: Proceedings of the 22nd USENIX Conference on Security, SEC 2013, pp. 543\u2013558. USENIX Association, Berkeley, CA, USA (2013)"},{"key":"20_CR36","unstructured":"Shivers, O.G.: Control-flow Analysis of Higher-order Languages of Taming Lambda. Ph.D. thesis, Pittsburgh, PA, USA (1991). UMI Order No. GAX91-26964"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Xing, L., Pan, X., Wang, R., Yuan, K., Wang, X.: Upgrading your android, elevating my malware: privilege escalation through mobile os updating. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 393\u2013408. IEEE Computer Society, Washington, DC, USA (2014)","DOI":"10.1109\/SP.2014.32"},{"key":"20_CR38","unstructured":"Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 29. USENIX Association, Berkeley, CA, USA (2012)"},{"key":"20_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-319-08509-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Du, W.: Attacks on android clipboard. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 72\u201391. Springer, Heidelberg (2014)"},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ying, K., Aafer, Y., Qiu, Z., Du, W.: Life after app. uninstallation: are the data still alive? data residue attacks on android. In: Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23061"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T02:58:58Z","timestamp":1631674738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}