{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:45:50Z","timestamp":1767008750982,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054863","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T07:47:32Z","timestamp":1585900052000},"page":"47-58","source":"Crossref","is-referenced-by-count":5,"title":["Resource Race Attacks on Android"],"prefix":"10.1109","author":[{"given":"Yan","family":"Cai","sequence":"first","affiliation":[]},{"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Haicheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Le","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Liang","family":"He","sequence":"additional","affiliation":[]},{"given":"Purui","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"ref33","article-title":"Clickjacking revisited: A perceptual view of ui security","author":"akhawe","year":"0","journal-title":"Proceedings of the USENIX Workshop on Offensive Technologies"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.6"},{"key":"ref31","first-page":"945","article-title":"Towards discovering and understanding task hijacking in android","author":"ren","year":"2015","journal-title":"Proceedings of the 24th USENIX Security Symposium ser SEC '15"},{"key":"ref30","first-page":"1037","article-title":"Peeking into your app without actually seeing it: Ui state inference and novel android attacks","author":"chen","year":"0","journal-title":"Proceedings of the 23rd USENIX Security Symposium ser SEC &#x2018;14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_14"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664279"},{"key":"ref35","article-title":"On the fragility and limitations of current browser-provided clickjacking protection schemes","author":"lekies","year":"0","journal-title":"Proc 6th USENIX Workshop on Offensive Technologies"},{"key":"ref34","first-page":"413","article-title":"Clickjacking: Attacks and defenses","author":"huang","year":"0","journal-title":"Proceedings of the 21st Usenix Security Symposium Ser USENIX Security'12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323982"},{"key":"ref27","first-page":"280","article-title":"IccTA: detecting inter-component privacy leaks in Android apps","author":"li","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"journal-title":"Control the camera","year":"2018","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693097"},{"journal-title":"OCR","year":"0","key":"ref20"},{"journal-title":"Remove window obscurement information","year":"2018","key":"ref22"},{"journal-title":"ActivityManager","year":"2018","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2655034"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702135"},{"key":"ref50","article-title":"Placeraider: Virtual theft in physical spaces with smartphones","author":"templeman","year":"0","journal-title":"Proc 20th Annu Netw Distrib Syst Security Symp"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"ref53","first-page":"17","article-title":"Soundcomber: A stealthy and context-aware sound trojan for smartphones","author":"schlegel","year":"0","journal-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium ser NDSS &#x2018;11"},{"key":"ref52","article-title":"Security impact of high resolution smartphone cameras","author":"fiebig","year":"0","journal-title":"Proceedings of the 8th USENIX Workshop on Offensive Technologies-WOOT &#x2018;14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"},{"key":"ref12","first-page":"317","article-title":"Detecting repackaged smart-phone applications in third-party android marketplaces","author":"zhou","year":"0","journal-title":"Proceedings of the Second ACM Conference on Data and Application Security and Privacy"},{"journal-title":"Race condition","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338927"},{"journal-title":"Android camera2 overview","year":"0","key":"ref16"},{"journal-title":"A boon for privacy Android p will prevent idle background apps from accessing thecamera","year":"0","key":"ref17"},{"key":"ref18","article-title":"Quantifying the effects of removing permissions from android applications","author":"kennedy","year":"0","journal-title":"Mobile Security Technologies Workshop (MoST)"},{"journal-title":"QR-coder readers","year":"0","key":"ref19"},{"key":"ref4","first-page":"593","article-title":"Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment","author":"bai","year":"0","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref3","first-page":"1037","article-title":"Peeking into your app without actually seeing it: Ui state inference and novel android attacks","author":"chen","year":"0","journal-title":"Proceedings of the 23rd USENIX Conference on Security Symposium ser SEC'14"},{"key":"ref6","article-title":"Detecting passive content leaks and pollution in android applications","author":"jiang","year":"0","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2547385"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"key":"ref9","first-page":"50","article-title":"Hey, you, get off of my market: detecting malicious apps in official and alternative android markets","volume":"25","author":"zhou","year":"2012","journal-title":"NDSS"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"ref45","first-page":"97","article-title":"Securing embedded user interfaces: Android and beyond","author":"roesner","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium ser SEC&#x2019; 13"},{"key":"ref48","first-page":"9","article-title":"Touchlogger: Inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"0","journal-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"journal-title":"Ui redressing attacks on android devices","year":"2012","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054863.pdf?arnumber=9054863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:52:52Z","timestamp":1656453172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054863","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}