{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:04:17Z","timestamp":1767337457639,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1116777"],"award-info":[{"award-number":["CNS-1116777"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141310102"],"award-info":[{"award-number":["N000141310102"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Secure Business Austria"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523679","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"259-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["PatchDroid"],"prefix":"10.1145","author":[{"given":"Collin","family":"Mulliner","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Jon","family":"Oberheide","sequence":"additional","affiliation":[{"name":"DuoSecurity"}]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DynInst. http:\/\/www.dyninst.org\/.  DynInst. http:\/\/www.dyninst.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Altekar G.","year":"2005","unstructured":"Altekar , G. , Bagrak , I. , Burstein , P. , and Schultz , A . OPUS: Online Patches and Updates for Security . In Proceedings of the USENIX Security Symposium ( 2005 ). Altekar, G., Bagrak, I., Burstein, P., and Schultz, A. OPUS: Online Patches and Updates for Security. In Proceedings of the USENIX Security Symposium (2005)."},{"key":"e_1_3_2_1_3_1","first-page":"287","volume-title":"OPUS: Online Patches and Updates for Security. In In 14th USENIX Security Symposium","author":"Altekar G.","year":"2005","unstructured":"Altekar , G. , Bagrak , I. , Burstein , P. , and Schultz , A . OPUS: Online Patches and Updates for Security. In In 14th USENIX Security Symposium ( 2005 ), pp. 287 -- 302 . Altekar, G., Bagrak, I., Burstein, P., and Schultz, A. OPUS: Online Patches and Updates for Security. In In 14th USENIX Security Symposium (2005), pp. 287--302."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2010070101"},{"key":"e_1_3_2_1_6_1","volume-title":"Android SMS Spoofer. https:\/\/github.com\/thomascannon\/android-sms-spoof","author":"Cannon T.","year":"2012","unstructured":"Cannon , T. Android SMS Spoofer. https:\/\/github.com\/thomascannon\/android-sms-spoof , 2012 . Cannon, T. Android SMS Spoofer. https:\/\/github.com\/thomascannon\/android-sms-spoof, 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.65"},{"key":"e_1_3_2_1_8_1","unstructured":"CVE Details. Google: Android: Security Vulnerabilities. http:\/\/cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html 2013.  CVE Details. Google: Android: Security Vulnerabilities. http:\/\/cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html 2013."},{"key":"e_1_3_2_1_9_1","unstructured":"Duo Securtiy. X-Ray for Android. http:\/\/xray.io.  Duo Securtiy. X-Ray for Android. http:\/\/xray.io."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)","author":"Grace M.","year":"2012","unstructured":"Grace , M. , Zhou , Y. , Wang , Z. , and Jiang , X . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012) ( February 2012 ). Grace, M., Zhou, Y., Wang, Z., and Jiang, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012) (February 2012)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378798"},{"key":"e_1_3_2_1_12_1","unstructured":"Intel. Pin - A Dynamic Binary Instrumentation Tool. http:\/\/software.intel.com\/en-us\/articles\/pintool.  Intel. Pin - A Dynamic Binary Instrumentation Tool. http:\/\/software.intel.com\/en-us\/articles\/pintool."},{"key":"e_1_3_2_1_13_1","unstructured":"Jeff Forristal. Uncovering Android Master Key that makes 99% of devices vulnerable. http:\/\/bluebox.com\/corporate-blog\/bluebox-uncovers-android-master-key\/ July 2013.  Jeff Forristal. Uncovering Android Master Key that makes 99% of devices vulnerable. http:\/\/bluebox.com\/corporate-blog\/bluebox-uncovers-android-master-key\/ July 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.41"},{"key":"e_1_3_2_1_15_1","unstructured":"Kramer S. Rage aginst the cage - adbd root exploit. http:\/\/stealth.openwall.net\/xSports\/RageAgainstTheCage.tgz 2010.  Kramer S. Rage aginst the cage - adbd root exploit. http:\/\/stealth.openwall.net\/xSports\/RageAgainstTheCage.tgz 2010."},{"key":"e_1_3_2_1_16_1","unstructured":"Kramer S. Zimperlich zygote root exploit. http:\/\/c-skills.blogspot.com\/2011\/02\/zimperlich-sources.html 2010.  Kramer S. Zimperlich zygote root exploit. http:\/\/c-skills.blogspot.com\/2011\/02\/zimperlich-sources.html 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"March","author":"Lookout Inc. DroidDream.","year":"2011","unstructured":"Lookout Inc. DroidDream. http:\/\/blog.mylookout.com\/2011\/03\/security-alert-malware-found-in-official-android-market-droiddream\/ , March 2011 . Lookout Inc. DroidDream. http:\/\/blog.mylookout.com\/2011\/03\/security-alert-malware-found-in-official-android-market-droiddream\/, March 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855807.1855838"},{"key":"e_1_3_2_1_19_1","unstructured":"Martin J. X-Ray App Identifies Android Vulnerabilities But Doesn't Fix Them. http:\/\/blogs.cio.com\/smartphones\/17286\/x-ray-app-identifies-android-vulnerabilities-doesnt-fix-them 2012.  Martin J. X-Ray App Identifies Android Vulnerabilities But Doesn't Fix Them. http:\/\/blogs.cio.com\/smartphones\/17286\/x-ray-app-identifies-android-vulnerabilities-doesnt-fix-them 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1133991"},{"key":"e_1_3_2_1_21_1","unstructured":"Oracle. Java Native Interface (JNI). http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/jni\/spec\/jniTOC.html.  Oracle. Java Native Interface (JNI). http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/jni\/spec\/jniTOC.html."},{"key":"e_1_3_2_1_22_1","volume-title":"In Proceedings of the 12th Usenix Security Symposium","author":"Provos N.","year":"2002","unstructured":"Provos , N. Improving host security with system call policies . In In Proceedings of the 12th Usenix Security Symposium ( 2002 ). Provos, N. Improving host security with system call policies. In In Proceedings of the 12th Usenix Security Symposium (2002)."},{"key":"e_1_3_2_1_23_1","unstructured":"Sotirov A. Hotpatching and the Rise of Third-Party Patches. http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Sotirov.pdf July 2006.  Sotirov A. Hotpatching and the Rise of Third-Party Patches. http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Sotirov.pdf July 2006."},{"key":"e_1_3_2_1_24_1","unstructured":"T-Mobile. SMiShing and SMS Spam. http:\/\/www.t-mobile.com\/Company\/PrivacyResources.aspx?tp=Abt_Tab_PhishingSMishing&tsp=Abt_Sub_IdentityTheft_SMiShing 2013.  T-Mobile. SMiShing and SMS Spam. http:\/\/www.t-mobile.com\/Company\/PrivacyResources.aspx?tp=Abt_Tab_PhishingSMishing&tsp=Abt_Sub_IdentityTheft_SMiShing 2013."},{"key":"e_1_3_2_1_25_1","unstructured":"The Android Exploid Crew. CVE-2011-1823 - vold vulnerability \"GingerBreak\". http:\/\/www.cvedetails.com\/cve\/CVE-2011-1823\/.  The Android Exploid Crew. CVE-2011-1823 - vold vulnerability \"GingerBreak\". http:\/\/www.cvedetails.com\/cve\/CVE-2011-1823\/."},{"key":"e_1_3_2_1_26_1","volume-title":"CVE-2011-3874 - libsysutils rooting vulnerability \"zergRush\". https:\/\/code.google.com\/p\/android\/issues\/detail?id=21681","author":"The Revolutionary","year":"2011","unstructured":"The Revolutionary development team. CVE-2011-3874 - libsysutils rooting vulnerability \"zergRush\". https:\/\/code.google.com\/p\/android\/issues\/detail?id=21681 , 2011 . The Revolutionary development team. CVE-2011-3874 - libsysutils rooting vulnerability \"zergRush\". https:\/\/code.google.com\/p\/android\/issues\/detail?id=21681, 2011."}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523679"}},"subtitle":["scalable third-party security patches for Android devices"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":26,"alternative-id":["10.1145\/2523649.2523679","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523679","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}