{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:31Z","timestamp":1750306831922,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557571","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"257-264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["DroidBarrier"],"prefix":"10.1145","author":[{"given":"Hussain M.J.","family":"Almohri","sequence":"first","affiliation":[{"name":"Kuwait University, Kuwait City, Kuwait"}]},{"given":"Danfeng (Daphne)","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Dennis","family":"Kafura","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.29"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133635"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899945"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_5_1","volume-title":"22nd USENIX Security Symposium (USENIX Security '13)","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A.-R. Sadeghi . Flexible and fine-grained mandatory access control on android for diverse security and privacy policies . In 22nd USENIX Security Symposium (USENIX Security '13) . USENIX, Aug. 2013 . S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In 22nd USENIX Security Symposium (USENIX Security '13). USENIX, Aug. 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2324876.2324877"},{"key":"e_1_3_2_1_8_1","first-page":"23","volume-title":"Proceedings of the 20th USENIX Conference on Security, SEC'11","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: lightweight provenance for smart phone operating systems . In Proceedings of the 20th USENIX Conference on Security, SEC'11 , pages 23 -- 23 , Berkeley, CA, USA , 2011 . USENIX Association. M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: lightweight provenance for smart phone operating systems. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 23--23, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Workshop on Mobile Security Technologies (MoST)","author":"Elish K. O.","year":"2012","unstructured":"K. O. Elish , D. Yao , and B. G. Ryder . User-centric dependence analysis for identifying malicious mobile apps . In Proceedings of the Workshop on Mobile Security Technologies (MoST) , May 2012 . In conjunction with the IEEE Symposium on Security and Privacy. K. O. Elish, D. Yao, and B. G. Ryder. User-centric dependence analysis for identifying malicious mobile apps. In Proceedings of the Workshop on Mobile Security Technologies (MoST), May 2012. In conjunction with the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10 , pages 1 -- 6 , Berkeley, CA, USA , 2010 . USENIX Association. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046622"},{"key":"e_1_3_2_1_16_1","first-page":"383","volume-title":"Proceedings of the 18th conference on USENIX security symposium, SSYM'09","author":"Hund R.","year":"2009","unstructured":"R. Hund , T. Holz , and F. C. Freiling . Return-oriented rootkits: bypassing kernel code integrity protection mechanisms . In Proceedings of the 18th conference on USENIX security symposium, SSYM'09 , pages 383 -- 398 , Berkeley, CA, USA , 2009 . USENIX Association. R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 383--398, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_3_2_1_19_1","first-page":"9","volume-title":"Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12","author":"Park Y.","year":"2012","unstructured":"Y. Park , C. Lee , C. Lee , J. Lim , S. Han , M. Park , and S.-J. Cho . RGBDroid : a novel response-based approach to Android privilege escalation attacks . In Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12 , pages 9 -- 9 , Berkeley, CA, USA , 2012 . USENIX Association. Y. Park, C. Lee, C. Lee, J. Lim, S. Han, M. Park, and S.-J. Cho. RGBDroid: a novel response-based approach to Android privilege escalation attacks. In Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12, pages 9--9, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.23"},{"key":"e_1_3_2_1_22_1","first-page":"16","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium -","volume":"13","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 , SSYM'04, pages 16 -- 16 , Berkeley, CA, USA , 2004 . USENIX Association. R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 16--16, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.144"},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS","author":"Smalley S.","year":"2013","unstructured":"S. Smalley and R. Craig . Security enhanced (se) android: Bringing flexible mac to android . In NDSS , 2013 . S. Smalley and R. Craig. Security enhanced (se) android: Bringing flexible mac to android. In NDSS, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026665"},{"key":"e_1_3_2_1_26_1","first-page":"10","volume-title":"Proceedings of the 5th USENIX conference on Offensive technologies, WOOT'11","author":"Vidas T.","year":"2011","unstructured":"T. Vidas , D. Votipka , and N. Christin . All your droid are belong to us: a survey of current Android attacks . In Proceedings of the 5th USENIX conference on Offensive technologies, WOOT'11 , pages 10 -- 10 , Berkeley, CA, USA , 2011 . USENIX Association. T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: a survey of current Android attacks. In Proceedings of the 5th USENIX conference on Offensive technologies, WOOT'11, pages 10--10, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_27_1","first-page":"57","volume-title":"5th International Conference on Network and System Security (NSS)","author":"Xu K.","year":"2011","unstructured":"K. Xu , D. Yao , Q. Ma , and A. Crowell . Detecting infection onset with behavior-based policies . In 5th International Conference on Network and System Security (NSS) , pages 57 -- 64 , 2011 . K. Xu, D. Yao, Q. Ma, and A. Crowell. Detecting infection onset with behavior-based policies. In 5th International Conference on Network and System Security (NSS), pages 57--64, 2011."},{"key":"e_1_3_2_1_28_1","first-page":"27","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Sa\u00efdi , and R. Anderson . Aurasium: practical policy enforcement for Android applications . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , pages 27 -- 27 , Berkeley, CA, USA , 2012 . USENIX Association. R. Xu, H. Sa\u00efdi, and R. Anderson. Aurasium: practical policy enforcement for Android applications. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 27--27, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_29_1","first-page":"29","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . DroidScope: seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , pages 29 -- 29 , Berkeley, CA, USA , 2012 . USENIX Association. L. K. Yan and H. Yin. DroidScope: seamlessly reconstructing the os and dalvik semantic views for dynamic Android malware analysis. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 29--29, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557571"}},"subtitle":["know what is executing on your android"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":30,"alternative-id":["10.1145\/2557547.2557571","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557571","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}