{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:18Z","timestamp":1763468178124,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557560","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Compac"],"prefix":"10.1145","author":[{"given":"Yifei","family":"Wang","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Srinivas","family":"Hariharan","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Chenxi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Jiaming","family":"Liu","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abusing webview javascript bridges. http:\/\/50.56.33.56\/blog\/?m=201212.  Abusing webview javascript bridges. http:\/\/50.56.33.56\/blog\/?m=201212."},{"key":"e_1_3_2_1_2_1","unstructured":"Android malware genome project. http:\/\/www.malgenomeproject.org.  Android malware genome project. http:\/\/www.malgenomeproject.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Android marks fourth anniversary since launch with 75.0 quarter according to idc. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23771812.  Android marks fourth anniversary since launch with 75.0 quarter according to idc. https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23771812."},{"key":"e_1_3_2_1_4_1","unstructured":"Android ndk. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html.  Android ndk. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Android open source project. android security overview. http:\/\/source.android.com\/tech\/security.  Android open source project. android security overview. http:\/\/source.android.com\/tech\/security."},{"key":"e_1_3_2_1_6_1","unstructured":"Angry birds. http:\/\/www.angrybirds.com.  Angry birds. http:\/\/www.angrybirds.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Linpack for android - android apps on google play. https:\/\/play.google.com\/store\/apps\/details?id=com.greenecomputing.linpack&hl=en.  Linpack for android - android apps on google play. https:\/\/play.google.com\/store\/apps\/details?id=com.greenecomputing.linpack&hl=en."},{"key":"e_1_3_2_1_8_1","unstructured":"Package java.lang.instrument. http:\/\/docs.oracle.com\/javase\/6\/docs\/api\/java\/lang\/instrument\/package-summary.html.  Package java.lang.instrument. http:\/\/docs.oracle.com\/javase\/6\/docs\/api\/java\/lang\/instrument\/package-summary.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Phonegap. http:\/\/phonegap.com.  Phonegap. http:\/\/phonegap.com."},{"key":"e_1_3_2_1_10_1","unstructured":"The security manager. http:\/\/docs.oracle.com\/javase\/tutorial\/essential\/environment\/security.html.  The security manager. http:\/\/docs.oracle.com\/javase\/tutorial\/essential\/environment\/security.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Testing fundamentals. http:\/\/developer.android.com\/tools\/testing\/testing_android.html.  Testing fundamentals. http:\/\/developer.android.com\/tools\/testing\/testing_android.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"volume-title":"Mandatory Access Control for the Android Dalvik Virtual Machine. In Workshop on Embedded Self-Organizing Systems (ESOS)","year":"2013","author":"Bousquet A.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proceedings of 19th Annual Network & Distributed System Security Symposium (Feb 2012), NDSS '12.","author":"Bugiel S.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534778"},{"first-page":"331","volume-title":"Proceedings of the 13th international conference on Information security (Berlin, Heidelberg, 2011), ISC '10, Springer-Verlag","author":"Conti M.","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the Workshop on Mobile Security Technologies","year":"2012","author":"Davis B.","key":"e_1_3_2_1_20_1"},{"volume-title":"Proceedings of the 20th USENIX conference on Security symposium","year":"2011","author":"Dietz M.","key":"e_1_3_2_1_21_1"},{"volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation","year":"2010","author":"Enck W.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Proceedings of the 20th USENIX conference on Security symposium","year":"2011","author":"Felt A. P.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Gong L. Java security architecture (jdk1.2). http:\/\/docs.oracle.com\/javase\/1.4.2\/docs\/guide\/security\/spec\/security-spec.doc.html 1998.  Gong L. Java security architecture (jdk1.2). http:\/\/docs.oracle.com\/javase\/1.4.2\/docs\/guide\/security\/spec\/security-spec.doc.html 1998."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484317"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"volume-title":"Proceedings of the 21st USENIX conference on Security symposium","year":"2012","author":"Shekhar S.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"volume-title":"Proceedings of 20th Annual Network & Distributed System Security Symposium (Feb 2013), NDSS '13.","author":"Smalley S.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","series-title":"ESORICS '12","first-page":"842","volume-title":"Proceedings of the 17th European Symposium on Research in Computer Security","author":"Sun M.","year":"2012"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"volume-title":"Proceedings of the 21st USENIX conference on Security symposium","year":"2012","author":"Xu R.","key":"e_1_3_2_1_41_1"},{"volume-title":"Proceedings of the 21st USENIX conference on Security symposium","year":"2012","author":"Yan L. K.","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"volume-title":"Proceedings of 19th Annual Network & Distributed System Security Symposium (Feb 2012), NDSS '12.","author":"Zhou Y.","key":"e_1_3_2_1_46_1"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557560"}},"subtitle":["enforce component-level access control in android"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":44,"alternative-id":["10.1145\/2557547.2557560","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557560","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}