{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T12:29:10Z","timestamp":1779020950241,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Auckland UniServices Limited"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523678","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"319-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["FireDroid"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Russello","sequence":"first","affiliation":[{"name":"University of Auckland"}]},{"given":"Arturo Blas","family":"Jimenez","sequence":"additional","affiliation":[{"name":"University of Auckland"}]},{"given":"Habib","family":"Naderi","sequence":"additional","affiliation":[{"name":"University of Auckland"}]},{"given":"Wannes","family":"van der Mark","sequence":"additional","affiliation":[{"name":"University of Auckland"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.gartner.com\/it\/page.jsp?id= 2227215.  http:\/\/www.gartner.com\/it\/page.jsp?id= 2227215."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.gartner.com\/newsroom\/id\/2482816.  http:\/\/www.gartner.com\/newsroom\/id\/2482816."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/news.cnet.com\/8301-1035_3-57545513-94\/five-years-of-android-by-the-numbers\/.  http:\/\/news.cnet.com\/8301-1035_3-57545513-94\/five-years-of-android-by-the-numbers\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.appbrain.com\/stats\/number-of-android-apps.  http:\/\/www.appbrain.com\/stats\/number-of-android-apps."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.ibtimes.co.uk\/articles\/401395\/20121105\/android-malware-increae-ten-fold.htm.  http:\/\/www.ibtimes.co.uk\/articles\/401395\/20121105\/android-malware-increae-ten-fold.htm."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.computerworld.com\/s\/article\/9231758\/USSD_attack_hit_SIM_cards_and_Samsung_Android_devices.  http:\/\/www.computerworld.com\/s\/article\/9231758\/USSD_attack_hit_SIM_cards_and_Samsung_Android_devices."},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/theunderstatement.com\/post\/11982112928\/android-orphans-visualizing-a-sad_history-of-support.  http:\/\/theunderstatement.com\/post\/11982112928\/android-orphans-visualizing-a-sad_history-of-support."},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/BinderIPCMechanism.html.  http:\/\/www.angryredplanet.com\/~hackbod\/openbinder\/docs\/html\/BinderIPCMechanism.html."},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/www.citi.umich.edu\/u\/provos\/systrace\/index.html.  http:\/\/www.citi.umich.edu\/u\/provos\/systrace\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Magnuson%E2%80%93Moss_Warranty_Act.  http:\/\/en.wikipedia.org\/wiki\/Magnuson%E2%80%93Moss_Warranty_Act."},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/eur-lex.europa.eu\/Notice.do?val=330258:cs&lang=en&list=340508:cs 330258:cs &pos=2&page=1&nbl=2&pgs=10&hwords=&checktexte=checkbox&visu=#texte.  http:\/\/eur-lex.europa.eu\/Notice.do?val=330258:cs&lang=en&list=340508:cs 330258:cs &pos=2&page=1&nbl=2&pgs=10&hwords=&checktexte=checkbox&visu=#texte."},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/www.malgenomeproject.org\/.  http:\/\/www.malgenomeproject.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-2094.  http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-2094."},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/source.android.com\/compatibility\/overview.html.  http:\/\/source.android.com\/compatibility\/overview.html."},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/static.googleusercontent.com\/external_content\/untrusted_dlcp\/source.android.com\/en\/\/compatibility\/4.2\/android-4.2-cdd.pdf.  http:\/\/static.googleusercontent.com\/external_content\/untrusted_dlcp\/source.android.com\/en\/\/compatibility\/4.2\/android-4.2-cdd.pdf."},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/tomoyo.sourceforge.jp\/.  http:\/\/tomoyo.sourceforge.jp\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Android Project. http:\/\/www.android.com.  Android Project. http:\/\/www.android.com."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb.","author":"Bugiel S.","year":"2012","unstructured":"Bugiel , S. , Davi , L. , and et al. Towards taming privilege-escalation attacks on Android . In Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb. 2012 ). Bugiel, S., Davi, L., and et al. Towards taming privilege-escalation attacks on Android. In Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb. 2012)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949355"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949356"},{"key":"e_1_3_2_1_26_1","volume-title":"I-arm-droid: A rewriting framework for in-app reference monitors for android applications","author":"Davis B.","year":"2012","unstructured":"Davis , B. , Sanders , B. , and I-arm-droid: A rewriting framework for in-app reference monitors for android applications . IEEE Mobile Security Technologies , San Francisco, CA ( 2012 ). Davis, B., Sanders, B., and et al. I-arm-droid: A rewriting framework for in-app reference monitors for android applications. IEEE Mobile Security Technologies, San Francisco, CA (2012)."},{"key":"e_1_3_2_1_27_1","volume-title":"20th USENIX Security Symposium","author":"Dietz M.","year":"2011","unstructured":"Dietz , M. , Shekhar , S. , and et al. Quire: Lightweight provenance for smart phone operating systems . In 20th USENIX Security Symposium ( 2011 ). Dietz, M., Shekhar, S., and et al. Quire: Lightweight provenance for smart phone operating systems. In 20th USENIX Security Symposium (2011)."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of OSDI 2010 (Oct.","author":"Enck W.","year":"2010","unstructured":"Enck , W. , Gilbert , P. , and et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proc. of OSDI 2010 (Oct. 2010 ). Enck, W., Gilbert, P., and et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. of OSDI 2010 (Oct. 2010)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_34_1","first-page":"163","volume-title":"In Proc. Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2003","unstructured":"Garfinkel , T. Traps and pitfalls: Practical problems in system call interposition based security tools . In In Proc. Network and Distributed Systems Security Symposium ( 2003 ), pp. 163 -- 176 . Garfinkel, T. Traps and pitfalls: Practical problems in system call interposition based security tools. In In Proc. Network and Distributed Systems Security Symposium (2003), pp. 163--176."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS) (Feb.","author":"Grace M.","year":"2012","unstructured":"Grace , M. , Zhou , Y. , and et al. Systematic detection of capability leaks in stock Android smartphones . In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS) (Feb. 2012 ). Grace, M., Zhou, Y., and et al. Systematic detection of capability leaks in stock Android smartphones. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS) (Feb. 2012)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_42_1","first-page":"18","volume-title":"Proc. of the 12th conf. on USENIX Security Symposium","volume":"12","author":"Provos N.","year":"2003","unstructured":"Provos , N. Improving host security with system call policies . In Proc. of the 12th conf. on USENIX Security Symposium ( Washington, DC , 2003 ), vol. 12 , pp. 18 -- 18 . Provos, N. Improving host security with system call policies. In Proc. of the 12th conf. on USENIX Security Symposium (Washington, DC, 2003), vol. 12, pp. 18--18."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of the 20th Network and Distributed System Security Symposium (NDSS 2013)","author":"Smalley S.","year":"2013","unstructured":"Smalley , S. , and Craig , R . Security enhanced (se) android: Bringing flexible mac to android . In Proc. of the 20th Network and Distributed System Security Symposium (NDSS 2013) ( 2013 ). Smalley, S., and Craig, R. Security enhanced (se) android: Bringing flexible mac to android. In Proc. of the 20th Network and Distributed System Security Symposium (NDSS 2013) (2013)."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 21st conf. on USENIX Security Symposium","volume":"21","author":"Xu R.","year":"2012","unstructured":"Xu , R. , and Anderson , H. S. R. Aurasium: Practical policy enforcement for android applications . In Proceedings of the 21st conf. on USENIX Security Symposium ( 2012 ), vol. 21 . Xu, R., and Anderson, H. S. R. Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st conf. on USENIX Security Symposium (2012), vol. 21."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb.","author":"Zhou Y.","year":"2012","unstructured":"Zhou , Y. , Wang , Z. , and et al. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets . In Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb. 2012 ). Zhou, Y., Wang, Z., and et al. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In Proc. of the 19th Annual Network & Distributed System Security Symposium (Feb. 2012)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523678"}},"subtitle":["hardening security in almost-stock Android"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":50,"alternative-id":["10.1145\/2523649.2523678","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523678","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}