{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:03:06Z","timestamp":1752282186559,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484317","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["On the effectiveness of API-level access control using bytecode rewriting in Android"],"prefix":"10.1145","author":[{"given":"Hao","family":"Hao","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Vicky","family":"Singh","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android developer. http:\/\/www.developer.android.com\/about\/versions\/android-4.0.3.html.  Android developer. http:\/\/www.developer.android.com\/about\/versions\/android-4.0.3.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android reverse engineering honeynet project. http:\/\/www.honeynet.org\/node\/783.  Android reverse engineering honeynet project. http:\/\/www.honeynet.org\/node\/783."},{"key":"e_1_3_2_1_3_1","unstructured":"Binder. http:\/\/www.developer.android.com\/reference\/andrdoid\/os\/Binder.html.  Binder. http:\/\/www.developer.android.com\/reference\/andrdoid\/os\/Binder.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Bytecode for the dalvik vm. http:\/\/www.source.android.com\/tech\/dalvik-bytecode.html.  Bytecode for the dalvik vm. http:\/\/www.source.android.com\/tech\/dalvik-bytecode.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Commonsware camera application. http:\/\/github.com\/commonsguy\/cw-omnibus.  Commonsware camera application. http:\/\/github.com\/commonsguy\/cw-omnibus."},{"key":"e_1_3_2_1_6_1","unstructured":"Jni tips. http:\/\/www.developers.android.com.guide\/practices\/jni.html.  Jni tips. http:\/\/www.developers.android.com.guide\/practices\/jni.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Naming a package. http:\/\/www.docs.oracle.com\/javase\/tutorial\/package\/namingpkgs.html.  Naming a package. http:\/\/www.docs.oracle.com\/javase\/tutorial\/package\/namingpkgs.html."},{"key":"e_1_3_2_1_8_1","unstructured":"smali: An assembler\/disassembler for android's dex format. http:\/\/www.code.google.com\/p\/smali.  smali: An assembler\/disassembler for android's dex format. http:\/\/www.code.google.com\/p\/smali."},{"key":"e_1_3_2_1_9_1","unstructured":"Swi handlers. http:\/\/www.infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0040d\/Cacdfeci.html.  Swi handlers. http:\/\/www.infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0040d\/Cacdfeci.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Android binder: Android interprocess communication. 2011.  Android binder: Android interprocess communication. 2011."},{"key":"e_1_3_2_1_11_1","unstructured":"A. Bartel J. Klein K. Allix Y. Traon and M. Monperrus. Improving privacy on android smartphones through in-vivo bytecode instrumentation. CoRR abs\/1208.4536 2012.  A. Bartel J. Klein K. Allix Y. Traon and M. Monperrus. Improving privacy on android smartphones through in-vivo bytecode instrumentation. CoRR abs\/1208.4536 2012."},{"key":"e_1_3_2_1_12_1","unstructured":"A. Chander J. C. Mitchell and I. Shin. Mobile code security by java bytecode instrumentation. pages 1027--1040 2001.  A. Chander J. C. Mitchell and I. Shin. Mobile code security by java bytecode instrumentation. pages 1027--1040 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"volume-title":"IEEE Mobile Security Technologies","year":"2012","author":"Davis B.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_16_1","unstructured":"U. Erlingsson. The inlined reference monitor approach to security policy enforcement. 2004.  U. Erlingsson. The inlined reference monitor approach to security policy enforcement. 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D. Poo D. Kiong and S. Ashok. Object-oriented programming and java 2nd edition. 2007.   D. Poo D. Kiong and S. Ashok. Object-oriented programming and java 2nd edition. 2007.","DOI":"10.1007\/978-1-84628-963-7"},{"volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","year":"2012","author":"Reynaud D.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A. Rudys and D. S. Wallach. Enforceing java run-time properties using bytecode rewriting. 2002.  A. Rudys and D. S. Wallach. Enforceing java run-time properties using bytecode rewriting. 2002.","DOI":"10.1007\/3-540-36532-X_12"},{"key":"e_1_3_2_1_25_1","unstructured":"S. Shekhar M. Dietz and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. CoRR abs\/102.4030 2012.  S. Shekhar M. Dietz and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. CoRR abs\/102.4030 2012."},{"volume-title":"Proceedings of the 21st USENIX Security Symposium","year":"2012","author":"Xu R.","key":"e_1_3_2_1_26_1"},{"volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","year":"2012","author":"Zhou Y.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hangzhou China","acronym":"ASIA CCS '13"},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:19Z","timestamp":1750235959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":26,"alternative-id":["10.1145\/2484313.2484317","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484317","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}