{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:20Z","timestamp":1725889880584},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_2","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"24-43","source":"Crossref","is-referenced-by-count":1,"title":["H-Binder: A Hardened Binder Framework on\u00a0Android Systems"],"prefix":"10.1007","author":[{"given":"Dong","family":"Shen","sequence":"first","affiliation":[]},{"given":"Zhangkai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xuhua","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"2_CR1","unstructured":"Architecture Reference Manual (ARMv7-A and ARMv7-R edition). ARM DDI C (2008)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Andrus, J., Dall, C., Hof, A.V., Laadan, O., Nieh, J.: Cells: a virtual mobile smartphone architecture. In: 23rd ACM Symposium on Operating Systems Principles, pp. 173\u2013187. ACM (2011)","DOI":"10.1145\/2043556.2043574"},{"key":"2_CR3","unstructured":"Fast Models - ARM. http:\/\/www.arm.com\/products\/tools\/models\/fast-models\/"},{"key":"2_CR4","unstructured":"Artenstein, N., Revivo, I.: Man in the Binder: He Who Controls IPC, Controls the Droid. Black Hat (2014)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Gerling, S.: Scippa: system-centric IPC provenance on android. In: 30th Annual Computer Security Applications Conference, pp. 36\u201345. ACM (2014)","DOI":"10.1145\/2664243.2664264"},{"issue":"5","key":"2_CR6","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., et al.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164\u2013177 (2003)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: 19th Annual Network and Distributed System Security Symposium, pp. 346\u2013360 (2012)","DOI":"10.1007\/978-3-642-18178-8_30"},{"key":"2_CR8","unstructured":"Bugiel, S., Heuser, S., Sadeghi, A.R.: Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In: 22nd USENIX Security Symposium, pp. 131\u2013146 (2013)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1353536.1346284","volume":"36","author":"X Chen","year":"2008","unstructured":"Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., et al.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGPLAN Not. 36(1), 2\u201313 (2008)","journal-title":"ACM SIGPLAN Not."},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-23822-2_13","volume-title":"Computer Security \u2013 ESORICS 2011","author":"Y Cheng","year":"2011","unstructured":"Cheng, Y., Ding, X., Deng, R.H.: DriverGuard: a fine-grained protection on I\/O flows. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 227\u2013244. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23822-2_13"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Ding, X., Deng, R.H.: Efficient virtualization-based application protection against untrusted operating system. In: 10th ACM Symposium on Information, Computer and Communications Security, pp. 345\u2013356. ACM (2015)","DOI":"10.1145\/2714576.2714618"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: 9th International Conference on Mobile Systems, Applications, and Services, pp. 239\u2013252. ACM (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Dall, C., Nieh, J.: KVM\/ARM: the design and implementation of the linux ARM hypervisor. ACM SIGPLAN Not. 49(4), 333\u2013348. ACM (2014)","DOI":"10.1145\/2541940.2541946"},{"key":"2_CR14","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: QUIRE: Lightweight Provenance for Smart Phone Operating Systems. USENIX Security Symposium (2011)"},{"key":"2_CR15","unstructured":"Ding, J.H., Lin, C.J., Chang, P.H., Tsang, C.H., Hsu, W.C., Chung, Y.C.: ARMvisor: system virtualization for ARM. In: Proceedings of the Ottawa Linux Symposium, pp. 93\u2013107 (2012)"},{"issue":"2","key":"2_CR16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., et al.: Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 99\u2013106 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"2_CR17","first-page":"12","volume":"6","author":"AP Felt","year":"2011","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defenses. USENIX Secur. Symp. 6, 12\u201316 (2011)","journal-title":"USENIX Secur. Symp."},{"key":"2_CR18","unstructured":"Grace, M.C., Zhou, Y., Wang, Z., Jiang, X.: Systematic detection of capability leaks in stock android smartphones. In: 19th Annual Network and Distributed System Security Symposium (2012)"},{"issue":"4","key":"2_CR19","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/54289.871709","volume":"22","author":"N Hardy","year":"1988","unstructured":"Hardy, N.: The confused deputy: (or Why capabilities might have been invented). ACM SIGOPS Oper. Syst. Rev. 22(4), 36\u201338 (1988)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: Inktag: secure applications on an untrusted operating system. ACM SIGARCH Comput. Archit. News 41(1), 265\u2013278. ACM (2013)","DOI":"10.1145\/2499368.2451146"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications. In: 18th ACM Conference on Computer and Communications Security, pp. 639\u2013652. ACM (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Hwang, J.Y., Suh, S.B., Heo, S.K., Park, C.J., Ryu, J.M., Park, S.Y., Kim, C.R.: Xen on ARM: system virtualization using Xen hypervisor for ARM-based secure mobile phones. In: 5th IEEE Consumer Communications and Networking Conference, pp. 257\u2013261. IEEE (2008)","DOI":"10.1109\/ccnc08.2007.64"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Lee, H.C., Kim, C.H., Yi, J.H.: Experimenting with system and Libc call interception attacks on ARM-based linux kernel. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 631\u2013632. ACM (2011)","DOI":"10.1145\/1982185.1982323"},{"key":"2_CR24","unstructured":"Li, W.X., Wang, J.B., Mu, D.J., Yuan, Y.: Survey on Android Rootkit. Microprocessors (2011)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H.J., Cowan, C.: User-driven access control: rethinking permission granting in modern operating systems. In: 33rd IEEE Security and Privacy, pp. 224\u2013238. IEEE (2012)","DOI":"10.1109\/SP.2012.24"},{"key":"2_CR26","unstructured":"Rosa, T.: Android binder security note: on passing binder through another binder (2011)"},{"key":"2_CR27","volume-title":"EmbeddedXEN: A Revisited Architecture of the Xen Hypervisor to Support ARM-Based Embedded Virtualization","author":"D Rossier","year":"2012","unstructured":"Rossier, D.: EmbeddedXEN: A Revisited Architecture of the Xen Hypervisor to Support ARM-Based Embedded Virtualization. White Paper, Switzerland (2012)"},{"key":"2_CR28","unstructured":"Schreiber, T.: Android binder-android interprocess communication. Seminar thesis, Ruhr-Universit\u00e4t Bochum (2011)"},{"key":"2_CR29","volume-title":"Designing the User Interface: Strategies for Effective Human-Computer Interaction","author":"B Shneiderman","year":"2010","unstructured":"Shneiderman, B.: Designing the User Interface: Strategies for Effective Human-Computer Interaction. Pearson Education, India (2010)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of android malware behaviors. In: 22nd Annual Network and Distributed System Security Symposium (2015)","DOI":"10.14722\/ndss.2015.23145"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Varanasi, P., Heiser, G.: Hardware-supported virtualization on ARM. In: 2nd Asia-Pacific Workshop on Systems (2011)","DOI":"10.1145\/2103799.2103813"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Y., Hariharan, S., Zhao, C., Liu, J., Du, W.: Compac: enforce component-level access control in android. In: 4th ACM Conference on Data and Application Security and Privacy, pp. 25\u201336. ACM (2014)","DOI":"10.1145\/2557547.2557560"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Permission evolution in the android ecosystem. In: 28th Annual Computer Security Applications Conference, pp. 31\u201340. ACM (2012)","DOI":"10.1145\/2420950.2420956"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"You, D.H., Noh, B.N.: Android platform based linux kernel rootkit. In: 6th International Conference on Malicious and Unwanted Software, pp. 79\u201387. IEEE (2011)","DOI":"10.1109\/MALWARE.2011.6112330"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yang, M., Xu, B., Yang, Z., Gu, G., Ning, P., et al.: Vetting undesirable behaviors in android apps with permission use analysis. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 611\u2013622. ACM (2013)","DOI":"10.1145\/2508859.2516689"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Gligor, V.D., Newsome, J., McCune, J.M.: Building verifiable trusted path on commodity x86 computers. In: 33rd IEEE Symposium on Security and Privacy, pp. 616\u2013630. IEEE (2012)","DOI":"10.1109\/SP.2012.42"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T16:43:35Z","timestamp":1659113015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}