{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T19:10:06Z","timestamp":1749582606833,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457437"},{"type":"electronic","value":"9783319457444"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_23","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"458-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android"],"prefix":"10.1007","author":[{"given":"Fabo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: Addroid: privilege separation for applications and advertisers in android. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 71\u201372. ACM (2012)","DOI":"10.1145\/2414456.2414498"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Y., Hariharan, S., Zhao, C., Liu, J., Du, W.: Compac: enforce component-level access control in android. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, pp. 25\u201336. ACM (2014)","DOI":"10.1145\/2557547.2557560"},{"key":"23_CR3","unstructured":"Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating user privacy in android ad libraries. In: Workshop on Mobile Security Technologies (MoST). Citeseer (2012)"},{"issue":"9","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"23_CR5","unstructured":"Gries, D., Schneider, F.B.: Monographs in computer science (2008)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app. advertisements. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101\u2013112. ACM","DOI":"10.1145\/2185448.2185464"},{"key":"23_CR8","unstructured":"Shekhar, S., Dietz, M., Wallach, D.S.: Adsplit: separating smartphone advertising from applications. In: USENIX Security Symposium, pp. 553\u2013567 (2012)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ahlawat, A., Du, W.: Aframe: isolating advertisements from mobile applications in android. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 9\u201318. ACM (2013)","DOI":"10.1145\/2523649.2523652"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N., Foster, J.S., Millstein, T.: Dr. android and mr. hide: fine-grained permissions in android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2012)","DOI":"10.1145\/2381934.2381938"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Sun, M., Tan, G.: Nativeguard: protecting android applications from third-party native libraries. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, pp. 165\u2013176. ACM (2014)","DOI":"10.1145\/2627393.2627396"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Kawabata, H., Isohara, T., Takemori, K., Kubota, A., Kani, J.-I., Agematsu, H., Nishigaki, M.: Sanadbox: sandboxing third party advertising libraries in a mobile application. In: 2013 IEEE International Conference on Communications (ICC), pp. 2150\u20132154. IEEE (2013)","DOI":"10.1109\/ICC.2013.6654845"},{"key":"23_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-33630-5_23","volume-title":"ICT Systems Security and Privacy Protection","author":"Y-Y Hong","year":"2016","unstructured":"Hong, Y.-Y., Wang, Y.-P., Yin, J.: NativeProtector: protecting android applications by isolating and intercepting third-party native libraries. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IFIP AICT, vol. 471, pp. 337\u2013351. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-33630-5_23"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Seo, J., Kim, D., Cho, D., Kim, T., Shin, I.: Flexdroid: enforcing in-app. privilege separation in android (2016)","DOI":"10.14722\/ndss.2016.23485"},{"key":"23_CR15","unstructured":"Backes, M., Bugiel, S., Hammer, C., Schranz, O., von Styp-Rekowsky, P.: Boxify: full-fledged app. sandboxing for stock android. In: 24th USENIX Security Symposium (USENIX Security 15) (2015)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Patel, K., Wu, L., Wang, Z., Jiang, X.: Hybrid user-level sandboxing of third-party android apps. Memory 2200(0500), 0e00 (2015)","DOI":"10.1145\/2714576.2714598"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Fratantonio, Y., Kruegel, C., Vigna, G.: Njas: sandboxing unmodified applications in non-rooted devices running stock android. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 27\u201338. ACM (2015)","DOI":"10.1145\/2808117.2808122"},{"key":"23_CR18","unstructured":"Android service element (2016). http:\/\/developer.android.com\/intl\/zh-cn\/guide\/topics\/manifest\/service-element.html"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: ACM SIGOPS Operating Systems Review, vol. 27, pp. 203\u2013216. ACM (1994)","DOI":"10.1145\/173668.168635"},{"key":"23_CR20","unstructured":"System permissions (2016). http:\/\/developer.android.com\/intl\/zh-cn\/guide\/topics\/security\/permissions.html#normal-dangerous"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217\u2013228 (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"23_CR22","unstructured":"Rubin, X., Saldi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: USENIX Security Symposium, pp. 539\u2013552 (2012)"},{"key":"23_CR23","unstructured":"Android 5.0 behavior changes (2016). http:\/\/developer.android.com\/intl\/zh-cn\/about\/versions\/android-5.0-changes.html"},{"key":"23_CR24","unstructured":"Redirecting functions in shared elf libraries (2016). http:\/\/www.codeproject.com\/Articles\/70302\/Redirecting-functions-in-shared-ELF-libraries#_Toc257815978"},{"key":"23_CR25","unstructured":"Top free in android apps (2016). https:\/\/play.google.com\/store\/apps\/top"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/978-3-642-33167-1_49","volume-title":"Computer Security \u2013 ESORICS 2012","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Sathyanarayan, S., Yap, R.H.C., Liang, Z.: Codejail: application-transparent isolation of libraries with tight program interactions. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 859\u2013876. Springer, Heidelberg (2012)"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Yee, B., Sehr, D., Dardyk, G., Chen Bradley, J., Muth, R., Ormandy, T., Okasaka, S., Narula, N., Fullagar, N.: Native client: a sandbox for portable, untrusted x86 native code. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 79\u201393. IEEE (2009)","DOI":"10.1109\/SP.2009.25"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T18:37:12Z","timestamp":1749580632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}