{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:27Z","timestamp":1773409527667,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T00:00:00Z","timestamp":1291593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-ICT-216026-WOMBATFP7-ICT-257007 SYSSEC"],"award-info":[{"award-number":["FP7-ICT-216026-WOMBATFP7-ICT-257007 SYSSEC"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,6]]},"DOI":"10.1145\/1920261.1920313","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"347-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":216,"title":["Paranoid Android"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Portokalidis","sequence":"first","affiliation":[{"name":"Columbia University, NY"}]},{"given":"Philip","family":"Homburg","sequence":"additional","affiliation":[{"name":"Vrije Universiteit, Amsterdam, The Netherlands"}]},{"given":"Kostas","family":"Anagnostakis","sequence":"additional","affiliation":[{"name":"Niometris R&amp;D, Singapore"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit, Amsterdam, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2010,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of USENIX'05","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . QEMU, a fast and portable dynamic translator . In Proc. of USENIX'05 , April 2005 . F. Bellard. QEMU, a fast and portable dynamic translator. In Proc. of USENIX'05, April 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_1_3_1","unstructured":"BlackBerry Inc. BlackBerry Enterprise Server. http:\/\/na.blackberry.com\/eng\/services\/business\/server\/full\/.  BlackBerry Inc. BlackBerry Enterprise Server. http:\/\/na.blackberry.com\/eng\/services\/business\/server\/full\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proc. of USENIX'08","author":"Chow J.","year":"2008","unstructured":"J. Chow , T. Garfinkel , and P. M. Chen . Decoupling dynamic program analysis from execution in virtual environments . In Proc. of USENIX'08 , pages 1 -- 14 , June 2008 . J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In Proc. of USENIX'08, pages 1--14, June 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of HotOS XII","author":"Chun B.-G.","year":"2009","unstructured":"B.-G. Chun and P. Maniatis . Augmented smartphone applications through clone cloud execution . In Proc. of HotOS XII , May 2009 . B.-G. Chun and P. Maniatis. Augmented smartphone applications through clone cloud execution. In Proc. of HotOS XII, May 2009."},{"key":"e_1_3_2_1_7_1","unstructured":"A. T. W. I. company. Top 500 global sites. http:\/\/www.alexa.com\/topsites.  A. T. W. I. company. Top 500 global sites. http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362759.362813"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_14_1","volume-title":"F-Secure. \"sexy view\" trojan on symbian s60","year":"2008","unstructured":"F-Secure. \"sexy view\" trojan on symbian s60 3 rd edition. http:\/\/www.f-secure.com\/weblog\/archives\/00001609.html, February 2008 . F-Secure. \"sexy view\" trojan on symbian s60 3rd edition. http:\/\/www.f-secure.com\/weblog\/archives\/00001609.html, February 2008.","edition":"3"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc of NDSS'04","author":"Giffin J.","year":"2004","unstructured":"J. Giffin , S. Jha , and B. Miller . Efficient context-sensitive intrusion detection . In Proc of NDSS'04 , February 2004 . J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In Proc of NDSS'04, February 2004."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of OSDI","author":"Guo Z.","year":"2008","unstructured":"Z. Guo , X. Wang , J. Tang , X. Liu , Z. Xu , M. Wu , M. F. Kaashoek , and Z. Zhang . R2: An application-level kernel for record and replay . In Proc. of OSDI , 2008 . Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu, M. Wu, M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In Proc. of OSDI, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.582978"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676929"},{"key":"e_1_3_2_1_20_1","unstructured":"G. Legg. The bluejacking bluesnarfing bluebugging blues: Bluetooth faces perception of vulnerability. http:\/\/www.wirelessnetdesignline.com\/192200279?printableArticle=true August 2005.  G. Legg. The bluejacking bluesnarfing bluebugging blues: Bluetooth faces perception of vulnerability. http:\/\/www.wirelessnetdesignline.com\/192200279?printableArticle=true August 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.888632"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508254"},{"key":"e_1_3_2_1_24_1","unstructured":"H. Moore. Cracking the iPhone (part 1). http:\/\/blog.metasploit.com\/2007\/10\/cracking-iphone-part-1.html October 2007.  H. Moore. Cracking the iPhone (part 1). http:\/\/blog.metasploit.com\/2007\/10\/cracking-iphone-part-1.html October 2007."},{"key":"e_1_3_2_1_25_1","unstructured":"R. Naraine. Google Android vulnerable to drive-by browser exploit. http:\/\/blogs.zdnet.com\/security\/?p=2067 October 2008.  R. Naraine. Google Android vulnerable to drive-by browser exploit. http:\/\/blogs.zdnet.com\/security\/?p=2067 October 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080695.1069994"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of NDSS'05","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proc. of NDSS'05 , February 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of NDSS'05, February 2005."},{"key":"e_1_3_2_1_28_1","volume-title":"October","author":"Dre Niacin","year":"2007","unstructured":"Niacin and Dre . The iPhone\/iTouch tif exploit is now officially released. Available at http:\/\/toc2rta.com\/?q=node\/23 , October 2007 . Niacin and Dre. The iPhone\/iTouch tif exploit is now officially released. Available at http:\/\/toc2rta.com\/?q=node\/23, October 2007."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 17th USENIX Security Symposium","author":"Oberheide J.","year":"2008","unstructured":"J. Oberheide , E. Cooke , and F. Jahanian . CloudAV: N-version antivirus in the network cloud . In Proc. of the 17th USENIX Security Symposium , San Jose, CA , July 2008 . J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-version antivirus in the network cloud. In Proc. of the 17th USENIX Security Symposium, San Jose, CA, July 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"e_1_3_2_1_31_1","unstructured":"oCERT. CVE-2009-0475: OpenCORE insufficient boundary checking during MP3 decoding. http:\/\/www.ocert.org\/advisories\/ocert-2009-002.html January 2009.  oCERT. CVE-2009-0475: OpenCORE insufficient boundary checking during MP3 decoding. http:\/\/www.ocert.org\/advisories\/ocert-2009-002.html January 2009."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of the 15th USENIX Security Symposium","author":"Ozment A.","year":"2006","unstructured":"A. Ozment and S. E. Schechter . Milk or wine: Does software security improve with age ? In Proc. of the 15th USENIX Security Symposium , July 2006 . A. Ozment and S. E. Schechter. Milk or wine: Does software security improve with age? In Proc. of the 15th USENIX Security Symposium, July 2006."},{"key":"e_1_3_2_1_33_1","volume-title":"http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/index.html","author":"PalmSource I.","year":"2005","unstructured":"I. PalmSource . OpenBinder. http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/index.html , 2005 . I. PalmSource. OpenBinder. http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/index.html, 2005."},{"key":"e_1_3_2_1_34_1","volume-title":"Vrije Universiteit Amsterdam","author":"Portokalidis G.","year":"2010","unstructured":"G. Portokalidis , P. Homburg , K. Anagnostakis , and H. Bos . Paranoid Android: Zero-day protection for smartphones using the cloud. Technical report , Vrije Universiteit Amsterdam , 2010 . G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: Zero-day protection for smartphones using the cloud. Technical report, Vrije Universiteit Amsterdam, 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of the 12th USENIX Security Symposium","author":"Provos N.","year":"2003","unstructured":"N. Provos . Improving host security with system call policies . In Proc. of the 12th USENIX Security Symposium , August 2003 . N. Provos. Improving host security with system call policies. In Proc. of the 12th USENIX Security Symposium, August 2003."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231432"},{"key":"e_1_3_2_1_39_1","unstructured":"V3.co.uk. BlackBerry 'kill pill' vital for IT security. http:\/\/www.v3.co.uk\/vnunet\/news\/2159105\/blackberry-kill-pill-vital.  V3.co.uk. BlackBerry 'kill pill' vital for IT security. http:\/\/www.v3.co.uk\/vnunet\/news\/2159105\/blackberry-kill-pill-vital."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653685"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.36"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/871656.859633"}],"event":{"name":"ACSAC '10: 2010 Annual Computer Security Applications Conference","location":"Austin Texas USA","acronym":"ACSAC '10","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 26th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1920261.1920313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:43Z","timestamp":1750244383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920313"}},"subtitle":["versatile protection for smartphones"],"short-title":[],"issued":{"date-parts":[[2010,12,6]]},"references-count":42,"alternative-id":["10.1145\/1920261.1920313","10.1145\/1920261"],"URL":"https:\/\/doi.org\/10.1145\/1920261.1920313","relation":{},"subject":[],"published":{"date-parts":[[2010,12,6]]},"assertion":[{"value":"2010-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}