{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:03Z","timestamp":1771697463114,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2185448.2185464","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":318,"title":["Unsafe exposure analysis of mobile in-app advertisements"],"prefix":"10.1145","author":[{"given":"Michael C.","family":"Grace","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Wu","family":"Zhou","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Permission Protection Levels. http:\/\/developer.android.com\/reference\/android\/R.styleable.html#Android\/ManifestPermission_protectionLevel.  Android Permission Protection Levels. http:\/\/developer.android.com\/reference\/android\/R.styleable.html#Android\/ManifestPermission_protectionLevel."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Security and Permissions. http:\/\/developer.android.com\/guide\/topics\/security\/security.html.  Android Security and Permissions. http:\/\/developer.android.com\/guide\/topics\/security\/security.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Baksmali: A Disassembler for Android's Dex Format. http:\/\/code.google.com\/p\/smali\/.  Baksmali: A Disassembler for Android's Dex Format. http:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Dalvik. http:\/\/sites.google.com\/site\/io\/dalvik-vm-internals\/.  Dalvik. http:\/\/sites.google.com\/site\/io\/dalvik-vm-internals\/."},{"key":"e_1_3_2_1_5_1","volume-title":"April","author":"Report Distmo","year":"2011","unstructured":"Distmo Report : April , 2011 and May, 2011. http:\/\/www.distimo.com\/publications. Distmo Report: April, 2011 and May, 2011. http:\/\/www.distimo.com\/publications."},{"key":"e_1_3_2_1_6_1","unstructured":"Gartner Says Sales of Mobile Devices in Second Quarter of 2011 Grew 16.5 Percent Year-on-Year. http:\/\/www.gartner.com\/it\/page.jsp?id=1764714.  Gartner Says Sales of Mobile Devices in Second Quarter of 2011 Grew 16.5 Percent Year-on-Year. http:\/\/www.gartner.com\/it\/page.jsp?id=1764714."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12","author":"Bindschaedler L.","year":"2012","unstructured":"L. Bindschaedler , M. Jadliwala , I. Bilogrevic , I. Aad , P. Ginzboorg , V. Niemi , and J.-P. Hubaux . Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks . In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12 , February 2012 . L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, P. Ginzboorg, V. Niemi, and J.-P. Hubaux. Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards Taming Privilege-Escalation Attacks on Android . In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12 , February 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . QUIRE: Lightweight Provenance for Smart Phone Operating Systems . In Proceedings of the 20th USENIX Security Symposium , August 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium, August 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11","author":"Egele M.","year":"2011","unstructured":"M. Egele , C. Kruegel , E. Kirda , and G. Vigna . PiOS: Detecting Privacy Leaks in iOS Applications . In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11 , February 2011 . M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS'11, February 2011."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI '10","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI '10 , pages 1 -- 6 , February 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI '10, pages 1--6, February 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. Wang , A. Moschuk , S. Hanna , and E. Chin . Permission Re-Delegation: Attacks and Defenses . In Proceedings of the 20th USENIX Security Symposium , August 2011 . A. P. Felt, H. Wang, A. Moschuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium, August 2011."},{"key":"e_1_3_2_1_19_1","unstructured":"A. P. Fuchs A. Chaudhuri and J. S. Foster. SCanDroid: Automated Security Certification of Android Applications. http:\/\/www.cs.umd.edu\/ avik\/papers\/scandroidascaa.pdf.  A. P. Fuchs A. Chaudhuri and J. S. Foster. SCanDroid: Automated Security Certification of Android Applications. http:\/\/www.cs.umd.edu\/ avik\/papers\/scandroidascaa.pdf."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12 , February 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, NDSS '12, February 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11","author":"Guha S.","year":"2011","unstructured":"S. Guha , B. Cheng , and P. Francis . Privad: Practical Privacy in Online Advertising . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11 , March 2011 . S. Guha, B. Cheng, and P. Francis. Privad: Practical Privacy in Online Advertising. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI '11, March 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859993"},{"key":"e_1_3_2_1_23_1","first-page":"36","volume-title":"ACM Operating Systems Review","volume":"22","author":"Hardy N.","year":"1988","unstructured":"N. Hardy . The Confused Deputy, or Why Capabilities Might Have Been Invented . In ACM Operating Systems Review , volume 22 , pages 36 -- 38 , 1988 . N. Hardy. The Confused Deputy, or Why Capabilities Might Have Been Invented. In ACM Operating Systems Review, volume 22, pages 36--38, 1988."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_25_1","unstructured":"IDC. Android Rises Symbian 3 and Windows Phone 7 Launch as Worldwide Smartphone Shipments Increase 87.2% Year Over Year. http:\/\/www.idc.com\/about\/viewpressrelease.jsp?containerId=prUS22689111.  IDC. Android Rises Symbian 3 and Windows Phone 7 Launch as Worldwide Smartphone Shipments Increase 87.2% Year Over Year. http:\/\/www.idc.com\/about\/viewpressrelease.jsp?containerId=prUS22689111."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046782"},{"key":"e_1_3_2_1_31_1","first-page":"17","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11","author":"Schlegel R.","year":"2011","unstructured":"R. Schlegel , K. Zhang , X. Zhou , M. Intwala , A. Kapadia , and X. Wang . Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones . In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11 , pages 17 -- 33 , February 2011 . R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium, NDSS '11, pages 17--33, February 2011."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS '10","author":"Toubiana V.","year":"2010","unstructured":"V. Toubiana , H. Nissenbaum , A. Narayanan , S. Barocas , and D. Boneh . Adnostic: Privacy Preserving Targeted Advertising . In Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS '10 , February 2010 . V. Toubiana, H. Nissenbaum, A. Narayanan, S. Barocas, and D. Boneh. Adnostic: Privacy Preserving Targeted Advertising. In Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS '10, February 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"WISEC'12: Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Tucson Arizona USA","acronym":"WISEC'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2185448.2185464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:46Z","timestamp":1750241206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2185448.2185464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":32,"alternative-id":["10.1145\/2185448.2185464","10.1145\/2185448"],"URL":"https:\/\/doi.org\/10.1145\/2185448.2185464","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}