{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:23:19Z","timestamp":1770358999554,"version":"3.49.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/ase51524.2021.9678843","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:33:49Z","timestamp":1642710829000},"page":"505-516","source":"Crossref","is-referenced-by-count":12,"title":["Finding the Missing Piece: Permission Specification Analysis for Android NDK"],"prefix":"10.1109","author":[{"given":"Hao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuohan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"443","article-title":"Confine: Automated system call policy generation for container attack surface reduction","author":"ghavamnia","year":"2020","journal-title":"Proc RAID"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref33","article-title":"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis","author":"backes","year":"2016","journal-title":"Proc Usenix Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref31","article-title":"Program analysis and specialization for the C programming language","author":"andersen","year":"1994","journal-title":"Ph D Dissertation"},{"key":"ref30","article-title":"Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps&#x2019; Native Code","author":"almanee","year":"2021","journal-title":"Proc ICSE"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23106"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243842"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23121"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"ref2","article-title":"Android API reference","year":"2021"},{"key":"ref1","article-title":"ACameraManager_openCamera","year":"2021"},{"key":"ref20","article-title":"PeX","year":"2021"},{"key":"ref22","article-title":"platform.xml","year":"2021"},{"key":"ref21","article-title":"Platform Architecture","year":"2021"},{"key":"ref24","article-title":"System Calls","year":"2021"},{"key":"ref23","article-title":"socket.S","year":"2021"},{"key":"ref26","article-title":"Whole Program LLVM","year":"2021"},{"key":"ref25","article-title":"unistd.h","year":"2021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.12"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/3324884.3416637","article-title":"Demystifying Diehard Android Apps","author":"zhou","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"ref57","article-title":"Pex: A permission check analysis framework for linux kernel","author":"zhang","year":"2019","journal-title":"Proc Usenix Security"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1145\/3324884.3416582","article-title":"Automated Third-Party Library Detection for Android Applications: Are We There Yet?","author":"zhan","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00150"},{"key":"ref54","article-title":"PPChecker: Towards Accessing the Trustworthiness of Android Apps&#x2019; Privacy Policies","author":"yu","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00105"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2996433"},{"key":"ref10","article-title":"CameraManager.openCamera","year":"2021"},{"key":"ref11","article-title":"Credentials in Linux","year":"2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300023"},{"key":"ref12","article-title":"Kernel Size Tuning Guide","year":"2021"},{"key":"ref13","article-title":"LLVM bitcode linker","year":"2021"},{"key":"ref14","article-title":"LLVM&#x2019;s object file dumper","year":"2021"},{"key":"ref15","article-title":"Mapping High Level Constructs to LLVM IR","year":"2021"},{"key":"ref16","article-title":"Mobile Android Version Market Share Worldwide","year":"2021"},{"key":"ref17","article-title":"NDK libraries","year":"2021"},{"key":"ref18","article-title":"Object file dumper","year":"2021"},{"key":"ref19","article-title":"Permissions overview","year":"2021"},{"key":"ref4","article-title":"Android Clang\/LLVM Toolchain","year":"2021"},{"key":"ref3","article-title":"Android Camera2 executable failed to get frames","year":"2021"},{"key":"ref6","article-title":"Android NDK API Reference","year":"2021"},{"key":"ref5","article-title":"Android Common Kernels","year":"2021"},{"key":"ref8","article-title":"Building Kernels","year":"2021"},{"key":"ref7","article-title":"Binder","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00069"},{"key":"ref9","article-title":"Camera API","year":"2021"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23046"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.25"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"ref42","article-title":"FANS: Fuzzing Android Native System Services via Automated Interface Analysis","author":"liu","year":"2020","journal-title":"Proc Usenix Security"},{"key":"ref41","article-title":"POSIX Access Control Lists on Linux","author":"gr\u00fcnbacher","year":"2003","journal-title":"Proc USENIX ATC"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054795"}],"event":{"name":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Melbourne, Australia","start":{"date-parts":[[2021,11,15]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9678507\/9678392\/09678843.pdf?arnumber=9678843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:43Z","timestamp":1652201863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/ase51524.2021.9678843","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]}}}