{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:39:40Z","timestamp":1762033180675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557557","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Systematic audit of third-party android phones"],"prefix":"10.1145","author":[{"given":"Michael","family":"Mitchell","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Guanyu","family":"Tian","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"An Assembler\/Disassembler for Android's dex Format. http:\/\/code.google.com\/p\/smali\/.  An Assembler\/Disassembler for Android's dex Format. http:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Subgraph Isomorphism Problem. http:\/\/en.wikipedia.org\/wiki\/Subgraph_isomorphism_problem.  Subgraph Isomorphism Problem. http:\/\/en.wikipedia.org\/wiki\/Subgraph_isomorphism_problem."},{"volume-title":"Prentice Hall","year":"2006","author":"Aho Alfred V.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_5_1","unstructured":"Apache. Apache Harmony: Open Source Java Platform. http:\/\/harmony.apache.org\/.  Apache. Apache Harmony: Open Source Java Platform. http:\/\/harmony.apache.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"AT&T. Graphviz - Graph Visualization Software. http:\/\/www.graphviz.org\/.  AT&T. Graphviz - Graph Visualization Software. http:\/\/www.graphviz.org\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"volume-title":"Proceedings of the 1998 USENIX ATC","year":"1998","author":"Baker Brenda S.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_11_1","unstructured":"Anthony Desnos. androguard:Reverse engineering Malware and goodware analysis of Android applications... and more (ninja!). https:\/\/code.google.com\/p\/androguard\/.  Anthony Desnos. androguard:Reverse engineering Malware and goodware analysis of Android applications... and more (ninja!). https:\/\/code.google.com\/p\/androguard\/."},{"volume-title":"Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Dietz Michael","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Trevor Eckhart. CarrierIQ. http:\/\/androidsecuritytest.com\/features\/logs-and-services\/loggers\/carrieriq\/.  Trevor Eckhart. CarrierIQ. http:\/\/androidsecuritytest.com\/features\/logs-and-services\/loggers\/carrieriq\/."},{"volume-title":"Proceedings of the 18th NDSS","year":"2011","author":"Egele Manuel","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of 9th USENIX OSDI","year":"2010","author":"Enck William","key":"e_1_3_2_1_15_1"},{"volume-title":"Swarat Chaudhuri. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Enck William","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"volume-title":"Erika Chin. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium","year":"2011","author":"Felt Adrienne Porter","key":"e_1_3_2_1_19_1"},{"volume-title":"Flake. Structural Comparison of Executable Objects. In Proceedings of the 1st DIMVA","year":"2004","author":"Halvar","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_22_1","unstructured":"Gartner. Gartner Says Worldwide Sales of Mobile Phones Declined 2.3 Percent in Second Quarter of 2012. http:\/\/www.gartner.com\/it\/page.jsp?id=2120015.  Gartner. Gartner Says Worldwide Sales of Mobile Phones Declined 2.3 Percent in Second Quarter of 2012. http:\/\/www.gartner.com\/it\/page.jsp?id=2120015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. Android Developers. http:\/\/developer.android.com.  Google. Android Developers. http:\/\/developer.android.com."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. Android Device Gallery. http:\/\/www.android.com\/devices\/?f=phone.  Google. Android Device Gallery. http:\/\/www.android.com\/devices\/?f=phone."},{"key":"e_1_3_2_1_26_1","unstructured":"Google. Android Open Source Project. http:\/\/source.android.com.  Google. Android Open Source Project. http:\/\/source.android.com."},{"key":"e_1_3_2_1_27_1","unstructured":"Google. Dalvik Technical Information. http:\/\/source.android.com\/tech\/dalvik\/.  Google. Dalvik Technical Information. http:\/\/source.android.com\/tech\/dalvik\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Google. Software Updates: Courgette. http:\/\/dev.chromium.org\/developers\/design-documents\/software-updates-courgette.  Google. Software Updates: Courgette. http:\/\/dev.chromium.org\/developers\/design-documents\/software-updates-courgette."},{"volume-title":"Xuxian Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th NDSS","year":"2012","author":"Grace Michael","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"volume-title":"ACM SIGOPS Operating Systems Review","year":"1998","author":"Hardy Norman","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_34_1","unstructured":"HTC. HTC EVO 4G. http:\/\/www.htc.com\/us\/smartphones\/htc-evo-4g-sprint\/.  HTC. HTC EVO 4G. http:\/\/www.htc.com\/us\/smartphones\/htc-evo-4g-sprint\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_36_1","unstructured":"Intel. Intel 64 and IA-32 Architectures Software Developer Manuals. August 2012.  Intel. Intel 64 and IA-32 Architectures Software Developer Manuals. August 2012."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_40_1","unstructured":"Xuxian Jiang. SEND_SMS Capability Leak in Android Open Source Project (AOSP) Affecting Gingerbread Ice Cream Sandwich and Jelly Bean. http:\/\/www.cs.ncsu.edu\/faculty\/jiang\/send_sms_leak.html.  Xuxian Jiang. SEND_SMS Capability Leak in Android Open Source Project (AOSP) Affecting Gingerbread Ice Cream Sandwich and Jelly Bean. http:\/\/www.cs.ncsu.edu\/faculty\/jiang\/send_sms_leak.html."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.588"},{"key":"e_1_3_2_1_43_1","unstructured":"Eric Lafortune. ProGuard. http:\/\/proguard.sourceforge.net\/.  Eric Lafortune. ProGuard. http:\/\/proguard.sourceforge.net\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"volume-title":"Tao Xie. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the 22th USENIX Security Symposium","year":"2013","author":"Pandita Rahul","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_49_1","unstructured":"Colin Percival. Naive Differences of Executable Code. http:\/\/www.daemonology.net\/bsdiff\/.  Colin Percival. Naive Differences of Executable Code. http:\/\/www.daemonology.net\/bsdiff\/."},{"key":"e_1_3_2_1_50_1","unstructured":"Artem Russakovskii. Massive Security Vulnerability In HTC Android Devices (EVO 3D 4G Thunderbolt Others) Exposes Phone Numbers GPS SMS Emails Addresses Much More. http:\/\/www.androidpolice.com\/2011\/10\/01\/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more.  Artem Russakovskii. Massive Security Vulnerability In HTC Android Devices (EVO 3D 4G Thunderbolt Others) Exposes Phone Numbers GPS SMS Emails Addresses Much More. http:\/\/www.androidpolice.com\/2011\/10\/01\/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"volume-title":"Proceedings of the 21th USENIX Security Symposium","year":"2012","author":"Shekhar Shashi","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","unstructured":"VirusTotal. VirusTotal - Free Online Virus Malware and URL Scanner. http:\/\/www.virustotal.com\/.  VirusTotal. VirusTotal - Free Online Virus Malware and URL Scanner. http:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_55_1","unstructured":"Wikipedia. Assignment Problem. http:\/\/en.wikipedia.org\/wiki\/Assignment_problem.  Wikipedia. Assignment Problem. http:\/\/en.wikipedia.org\/wiki\/Assignment_problem."},{"key":"e_1_3_2_1_56_1","unstructured":"Wikipedia. Feature Hashing. http:\/\/en.wikipedia.org\/wiki\/Feature_hashing.  Wikipedia. Feature Hashing. http:\/\/en.wikipedia.org\/wiki\/Feature_hashing."},{"key":"e_1_3_2_1_57_1","unstructured":"Wikipedia. Hungarian algorithm. http:\/\/en.wikipedia.org\/wiki\/Hungarian_algorithm.  Wikipedia. Hungarian algorithm. http:\/\/en.wikipedia.org\/wiki\/Hungarian_algorithm."},{"key":"e_1_3_2_1_58_1","unstructured":"Allan Wojciechowski. DexDiff. https:\/\/github.com\/allanwoj\/DexDiff.  Allan Wojciechowski. DexDiff. https:\/\/github.com\/allanwoj\/DexDiff."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"volume-title":"Proceedings of the 19th NDSS","year":"2012","author":"Zhou Yajin","key":"e_1_3_2_1_61_1"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":62,"alternative-id":["10.1145\/2557547.2557557","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557557","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}