{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:51:28Z","timestamp":1762509088987,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["200100084","220102784"],"award-info":[{"award-number":["200100084","220102784"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3369479","type":"journal-article","created":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T18:53:51Z","timestamp":1708714431000},"page":"3733-3744","source":"Crossref","is-referenced-by-count":3,"title":["Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0647-4747","authenticated-orcid":false,"given":"Xiaogang","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0324-6870","authenticated-orcid":false,"given":"Siyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9118-5386","authenticated-orcid":false,"given":"Chaoran","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"volume-title":"Mobile Operating System Market Share Worldwide","year":"2022","key":"ref1"},{"volume-title":"Number of Apps Available in Leading App Stores As of 2022","year":"2022","key":"ref2"},{"volume-title":"New Crittercism Report Identifies Key Trends and Influences for M-Commerce Mobile App Adoption","year":"2022","key":"ref3"},{"volume-title":"Stack Overflow\u2014Where Developers Learn, Share, &Build Careers","year":"2022","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3512766"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397368"},{"key":"ref12","article-title":"BinderCracker: Assessing the robustness of Android system services","author":"Feng","year":"2016","journal-title":"arXiv:1604.06964"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.16"},{"key":"ref14","first-page":"307","article-title":"FANS: Fuzzing Android native system services via automated interface analysis","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Security)","author":"Liu"},{"volume-title":"JNI APIs and Developer Guides","year":"2022","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105860"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340456"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510045"},{"volume-title":"Download Android Studio &App Tools\u2014Android Developers","year":"2022","key":"ref21"},{"volume-title":"Using Debuggers | Android Open Source Project","year":"2022","key":"ref22"},{"volume-title":"Lldb Homepage\u2014The Lldb Debugger","year":"2022","key":"ref23"},{"volume-title":"Gdb: The GNU Project Debugger","year":"2022","key":"ref24"},{"volume-title":"Using Debuggers | Android Open Source Project","year":"2022","key":"ref25"},{"volume-title":"Soot\u2014Java Analysis Framework","year":"1999","key":"ref26"},{"volume-title":"Clang: A C Language Family Frontend for LLVM","year":"2000","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"volume-title":"Dalvik Executable Format | Android Open Source Project","year":"2022","key":"ref31"},{"key":"ref32","first-page":"1101","article-title":"On demystifying the Android application framework: Revisiting Android permission specification analysis","volume-title":"Proc. 25th USENIX Security Symp. (USENIX Security)","author":"Backes"},{"volume-title":"Coverage-guided, In-process Fuzzing for the JVM","year":"2022","key":"ref33"},{"volume-title":"Hex Rays\u2014State-of-the-Art Binary Code Analysis Solutions","year":"2022","key":"ref34"},{"volume-title":"Pin\u2014A Dynamic Binary Instrumentation Tool","year":"2022","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"volume-title":"The Ultimate Disassembly Framework\u2014Capstone\u2014The Ultimate Disassembler","year":"2022","key":"ref37"},{"volume-title":"Github\u2014Dyninst\/Dyninst: Dyninstapi: Tools for Binary Instrumentation, Analysis, and Modification","year":"2022","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3512766"},{"key":"ref43","article-title":"Fuzzing the phone in your phone","author":"Mulliner","year":"2009","journal-title":"Black Hat USA"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536881"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2012.6228986"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263963"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590316"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896925"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23106"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346897"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510228"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10443912.pdf?arnumber=10443912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T04:20:27Z","timestamp":1714796427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10443912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3369479","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}