{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:45Z","timestamp":1725889905733},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_3","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"44-62","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting Android System Services Through Bypassing Service Helpers"],"prefix":"10.1007","author":[{"given":"Yacong","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yao","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Lingyun","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Yemian","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Purui","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"3_CR1","unstructured":"Android open source project. \nhttps:\/\/android.googlesource.com\/"},{"key":"3_CR2","unstructured":"Android interface definition language. \nhttps:\/\/goo.gl\/UFrnT3"},{"key":"3_CR3","unstructured":"Gray, J.: Why do computers stop and what can be done about it? In: Symposium on Reliability in Distributed Software and Database Systems (1986)"},{"key":"3_CR4","unstructured":"Android API reference: Binder. \nhttps:\/\/goo.gl\/w2fXFH"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Shao, Y., Chen, Q.A., Mao, Z.M., Ott, J., Qian, Z.: Kratos: discovering inconsistent security policy enforcement in the android framework. In: Proceedings of the 23rd NDSS (2016)","DOI":"10.14722\/ndss.2016.23046"},{"key":"3_CR6","unstructured":"Soot. \nhttps:\/\/sable.github.io\/soot\/"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: analyzing the android permission specification. In: Proceedings of the 19th CCS (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"3_CR8","unstructured":"Compling with jack. \nhttps:\/\/goo.gl\/o9RYX8"},{"key":"3_CR9","unstructured":"Dex2jar. \nhttps:\/\/goo.gl\/skfQLl"},{"key":"3_CR10","volume-title":"Compilers, Principles, Techniques, and Tools","author":"AV Aho","year":"1986","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers, Principles, Techniques, and Tools. Addison Wesley, Boston (1986)"},{"key":"3_CR11","unstructured":"Android API reference: Parcel.writeexception(). \nhttps:\/\/goo.gl\/7zuXuR"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Rasthofer, S., Arzt, S., Bodden, E.: A machine-learning approach for classifying and categorizing android sources and sinks. In: Proceedings of the 21st NDSS (2014)","DOI":"10.14722\/ndss.2014.23039"},{"key":"3_CR13","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th HotSec (2011)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth WISEC (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the 28th ACSAC (2012)","DOI":"10.1145\/2420950.2420957"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Ying, L., Jiao, S., Su, P., Feng, D.: Bind your phone number with caution: automated user profiling through address book matching on smartphone. In: Proceedings of the 8th ASIACCS (2013)","DOI":"10.1145\/2484313.2484356"},{"key":"3_CR17","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: Proceedings of the 19th NDSS (2012)"},{"key":"3_CR18","unstructured":"Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universit\u00e4t Darmstadt, Technical Report TR-2011-04 (2011)"},{"key":"3_CR19","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defenses. In: Proceedings of the 20th USENIX Security (2011)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"Information Security","author":"L Davi","year":"2011","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346\u2013360. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-18178-8_30"},{"key":"3_CR21","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: lightweight provenance for smart phone operating systems. In: Proceedings of the 20th USENIX Security (2011)"},{"key":"3_CR22","unstructured":"Zhou, Y., Jiang, X.: Detecting passive content leaks and pollution in android applications. In: Proceedings of the 20th NDSS (2013)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Corbetta, J., Invernizzi, L., Fratantonio, Y., Kruegel, C., Vigna, G.: What the app is that? Deception and countermeasures in the android user interface. In: Proceedings of 36th IEEE Security and Privacy (2015)","DOI":"10.1109\/SP.2015.62"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th MobiSys (2011)","DOI":"10.1145\/1999995.2000018"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: Chex: statically vetting android apps for component hijacking vulnerabilities. In: Proceedings of the 19th CCS (2012)","DOI":"10.1145\/2382196.2382223"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Huang, H., Zhu, S., Chen, K., Liu, P.: From system services freezing to system server shutdown in android: all you need is a loop in an app. In: Proceedings of the 22nd CCS (2015)","DOI":"10.1145\/2810103.2813606"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Cao, C., Gao, N., Liu, P., Xiang, J.: Towards analyzing the input validation vulnerabilities associated with android system services. In: Proceedings of the 31st ACSAC (2015)","DOI":"10.1145\/2818000.2818033"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th CCS (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"3_CR29","unstructured":"Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android (2009)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: Riskranker: scalable and accurate zero-day android malware detection. In: Proceedings of the 10th MobiSys (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the Fifth WISEC (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the Second CODASPY (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-37300-8_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"S Hanna","year":"2013","unstructured":"Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: a scalable system for detecting code reuse among android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 62\u201381. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-37300-8_4"},{"key":"3_CR34","unstructured":"Androguard. \nhttp:\/\/code.google.com\/p\/androguard"},{"key":"3_CR35","unstructured":"Androbugs. \nhttp:\/\/www.androbugs.com"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:31:40Z","timestamp":1497353500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}