{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:30:13Z","timestamp":1773858613688,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642181771","type":"print"},{"value":"9783642181788","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_30","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"346-360","source":"Crossref","is-referenced-by-count":162,"title":["Privilege Escalation Attacks on Android"],"prefix":"10.1007","author":[{"given":"Lucas","family":"Davi","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"One, A.: Smashing the stack for fun and profit. Phrack Magazine\u00a049(14) (1996)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: ACM CCS 2010 (October 2010)","DOI":"10.1145\/1866307.1866317"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Chaudhuri, A.: Language-based security on Android. In: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS 2009, pp. 1\u20137 (2009)","DOI":"10.1145\/1554339.1554341"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: ACM CCS 2010 (October 2010)","DOI":"10.1145\/1866307.1866370"},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/ICDSC.2001.918971","volume-title":"International Conference on Distributed Computing Systems","author":"T. Chiueh","year":"2001","unstructured":"Chiueh, T., Hsu, F.-H.: RAD: A compile-time solution to buffer overflow attacks. In: International Conference on Distributed Computing Systems, pp. 409\u2013417. IEEE Computer Society, Los Alamitos (2001)"},{"key":"30_CR6","unstructured":"cnet news. First SMS-sending Android Trojan reported (August 2010), http:\/\/news.cnet.com\/8301-27080_3-20013222-245.html"},{"key":"30_CR7","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Return-oriented programming without returns on ARM. Technical Report HGI-TR-2010-002, Ruhr-University Bochum (July 2010)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.-R., Winandy, M.: ROPdefender: A detection tool to defend against return-oriented programming attacks (March 2010), http:\/\/www.trust.rub.de\/media\/trust\/veroeffentlichungen\/2010\/03\/20\/ROPdefender.pdf","DOI":"10.1145\/1966913.1966920"},{"key":"30_CR9","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: USENIX Symposium on Operating Systems Design and Implementation (October 2010)"},{"key":"30_CR10","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Mitigating Android software misuse before it happens. Technical Report NAS-TR-0094-2008, Pennsylvania State University (September 2008)"},{"key":"30_CR11","first-page":"235","volume-title":"ACM CCS 2009","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: ACM CCS 2009, pp. 235\u2013245. ACM, New York (2009)"},{"issue":"1","key":"30_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding Android security. IEEE Security and Privacy\u00a07(1), 50\u201357 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"30_CR13","first-page":"65","volume-title":"WODA 2006","author":"S. Gupta","year":"2006","unstructured":"Gupta, S., Pratap, P., Saran, H., Arun-Kumar, S.: Dynamic code instrumentation to detect and recover from return address corruption. In: WODA 2006, pp. 65\u201372. ACM, New York (2006)"},{"key":"30_CR14","unstructured":"Lineberry, A., Richardson, D.L., Wyatt, T.: These aren\u2019t the permissions you\u2019re looking for. In: BlackHat USA 2010 (2010), http:\/\/dtors.files.wordpress.com\/2010\/08\/blackhat-2010-slides.pdf"},{"key":"30_CR15","unstructured":"Microsoft. A detailed description of the data execution prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003 (2006), http:\/\/support.microsoft.com\/kb\/875352\/EN-US\/"},{"key":"30_CR16","unstructured":"Moore, H.D.: Cracking the iPhone (2007), http:\/\/blog.metasploit.com\/2007\/10\/cracking-iphone-part-1.html"},{"key":"30_CR17","unstructured":"Mulliner, C.: Fuzzing the phone in your phones. In: Black Hat USA (June 2009), http:\/\/www.blackhat.com\/presentations\/bh-usa-09\/MILLER\/BHUSA09-Miller-FuzzingPhone-PAPER.pdf"},{"key":"30_CR18","first-page":"328","volume-title":"ASIACCS 2010","author":"M. Nauman","year":"2010","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In: ASIACCS 2010, pp. 328\u2013332. ACM, New York (2010)"},{"key":"30_CR19","first-page":"340","volume-title":"ACSAC 2009","author":"M. Ongtang","year":"2009","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: ACSAC 2009, pp. 340\u2013349. IEEE Computer Society, Los Alamitos (2009)"},{"key":"30_CR20","unstructured":"Palm Source, Inc. Open Binder. Version 1 (2005), http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/index.html"},{"key":"30_CR21","unstructured":"PaX Team, http:\/\/pax.grsecurity.net\/"},{"issue":"4","key":"30_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2004.36","volume":"2","author":"J. Pincus","year":"2004","unstructured":"Pincus, J., Baker, B.: Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy\u00a02(4), 20\u201327 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 1\u20137 (2009)","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"30_CR24","unstructured":"Schmidt, A.-D., Schmidt, H.-G., Clausen, J., Yuksel, K.A., Kiraz, O., Camtepe, A., Albayrak, S.: Enhancing security of Linux-based Android devices. In: 15th International Linux Kongress, Lehmann (October 2008)"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSP.2009.144","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-powered mobile devices using SELinux. IEEE Security and Privacy\u00a08, 36\u201344 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"30_CR26","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A state-of-the-art review of security mechanisms. CoRR, abs\/0912.5101 (2009)"},{"issue":"2","key":"30_CR27","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A comprehensive security assessment. IEEE Security and Privacy\u00a08(2), 35\u201344 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: ACM CCS 2007, pp. 552\u2013561 (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. Invited paper. In: SecureCom 2010 (2010)","DOI":"10.1109\/SocialCom.2010.140"},{"key":"30_CR30","first-page":"365","volume-title":"Proceedings of the 17th Conference on Security Symposium, SS 2008","author":"G. Tan","year":"2008","unstructured":"Tan, G., Croft, J.: An empirical security study of the native code in the JDK. In: Proceedings of the 17th Conference on Security Symposium, SS 2008, pp. 365\u2013377. USENIX Association, Berkeley (2008)"},{"key":"30_CR31","unstructured":"Vendicator. Stack Shield: A \u201dstack smashing\u201d technique protection tool for Linux, http:\/\/www.angelfire.com\/sk\/stackshield"},{"key":"30_CR32","unstructured":"Vennon, T.: Android malware. A study of known and potential malware threats. Technical report, SMobile Global Threat Center (February 2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T22:11:40Z","timestamp":1559945500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}