{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:35Z","timestamp":1763507675069,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590313","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"471-482","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["DroidRay"],"prefix":"10.1145","author":[{"given":"Min","family":"Zheng","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Mingshen","family":"Sun","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"http:\/\/c-skills.blogspot.hk\/2011\/04\/yummy-yummy-gingerbreak.html","year":"2011","key":"e_1_3_2_1_2_1","unstructured":"C-skill. Gingerbreak. http:\/\/c-skills.blogspot.hk\/2011\/04\/yummy-yummy-gingerbreak.html , 2011 . C-skill. Gingerbreak. http:\/\/c-skills.blogspot.hk\/2011\/04\/yummy-yummy-gingerbreak.html, 2011."},{"volume-title":"https:\/\/github.com\/bibanon\/android-development-codex\/wiki\/rageagainstthecage","year":"2011","key":"e_1_3_2_1_3_1","unstructured":"C-skill. Rageagainstthecage. https:\/\/github.com\/bibanon\/android-development-codex\/wiki\/rageagainstthecage , 2011 . C-skill. Rageagainstthecage. https:\/\/github.com\/bibanon\/android-development-codex\/wiki\/rageagainstthecage, 2011."},{"key":"e_1_3_2_1_4_1","unstructured":"A. Central. Android central (rom market). http:\/\/www.androidcentral.com\/tags\/firmware 2013.  A. Central. Android central (rom market). http:\/\/www.androidcentral.com\/tags\/firmware 2013."},{"key":"e_1_3_2_1_5_1","unstructured":"C. Daily. Low-end smartphone fight. http:\/\/www.chinadaily.com.cn\/bizchina\/2012smartphone\/2012-07\/16\/content_15703750.htm 2012.  C. Daily. Low-end smartphone fight. http:\/\/www.chinadaily.com.cn\/bizchina\/2012smartphone\/2012-07\/16\/content_15703750.htm 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2009-1185","author":"Database N. V.","year":"2009","unstructured":"N. V. Database . Cve-2009-1185. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2009-1185 , 2009 . N. V. Database. Cve-2009-1185. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2009-1185, 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/downloadandroidrom.com\/","author":"ROM.","year":"2013","unstructured":"DownloadAndroid ROM. Downloadandroidrom (rom market). http:\/\/downloadandroidrom.com\/ , 2013 . DownloadAndroidROM. Downloadandroidrom (rom market). http:\/\/downloadandroidrom.com\/, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_10_1","unstructured":"Google. Android open source project. http:\/\/source.android.com 2008.  Google. Android open source project. http:\/\/source.android.com 2008."},{"volume-title":"virustotal. https:\/\/www.virustotal.com\/","year":"2013","key":"e_1_3_2_1_11_1","unstructured":"Google. virustotal. https:\/\/www.virustotal.com\/ , 2013 . Google. virustotal. https:\/\/www.virustotal.com\/, 2013."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proceedings of the 19th Annual Network & Distributed System Security Symposium , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012."},{"key":"e_1_3_2_1_13_1","unstructured":"I. D. C. (IDC). Apple cedes market share in smartphone operating system market as android surges and windows phone gains according to idc. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24257413 2013.  I. D. C. (IDC). Apple cedes market share in smartphone operating system market as android surges and windows phone gains according to idc. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24257413 2013."},{"key":"e_1_3_2_1_14_1","unstructured":"G. Inc. Google map apis. http:\/\/developers.google.com\/maps\/ 2012.  G. Inc. Google map apis. http:\/\/developers.google.com\/maps\/ 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Security alert: Malware found targeting custom roms (jsmshider). https:\/\/blog.lookout.com\/blog\/2011\/06\/15\/security-alert-malware-found-targeting-custom-roms-jsmshider\/","author":"L. Inc.","year":"2011","unstructured":"L. Inc. Security alert: Malware found targeting custom roms (jsmshider). https:\/\/blog.lookout.com\/blog\/2011\/06\/15\/security-alert-malware-found-targeting-custom-roms-jsmshider\/ , 2011 . L. Inc. Security alert: Malware found targeting custom roms (jsmshider). https:\/\/blog.lookout.com\/blog\/2011\/06\/15\/security-alert-malware-found-targeting-custom-roms-jsmshider\/, 2011."},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.ipmart-forum.com\/forum.php","author":"Ipmart","year":"2013","unstructured":"Ipmart. Ipmart (rom forum). http:\/\/www.ipmart-forum.com\/forum.php , 2013 . Ipmart. Ipmart (rom forum). http:\/\/www.ipmart-forum.com\/forum.php, 2013."},{"key":"e_1_3_2_1_17_1","unstructured":"J. Janego. The security implications of custom android roms. http:\/\/labs.neohapsis.com\/2011\/12\/21\/the-security-implications-of-custom-android-roms\/ 2012.  J. Janego. The security implications of custom android roms. http:\/\/labs.neohapsis.com\/2011\/12\/21\/the-security-implications-of-custom-android-roms\/ 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Computer Security?ESORICS 2013:  18th European Symposium on Research in Computer Security","author":"Jia L.","year":"2013","unstructured":"L. Jia , J. Aljuraidan , E. Fragkaki , L. Bauer , M. Stroucken , K. Fukushima , S. Kiyomoto , and Y. Miyake . Run-time enforcement of information-flow properties on Android (extended abstract) . In Computer Security?ESORICS 2013: 18th European Symposium on Research in Computer Security , Sept. 2013 . L. Jia, J. Aljuraidan, E. Fragkaki, L. Bauer, M. Stroucken, K. Fukushima, S. Kiyomoto, and Y. Miyake. Run-time enforcement of information-flow properties on Android (extended abstract). In Computer Security?ESORICS 2013: 18th European Symposium on Research in Computer Security, Sept. 2013."},{"key":"e_1_3_2_1_19_1","unstructured":"Jidi. Rom jidi (rom market). http:\/\/www.romjd.com\/ 2013.  Jidi. Rom jidi (rom market). http:\/\/www.romjd.com\/ 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_21_1","volume-title":"Blackhat","author":"McNamee K.","year":"2013","unstructured":"K. McNamee . How to build a spyphone . Blackhat , 2013 . K. McNamee. How to build a spyphone. Blackhat, 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"http:\/\/www.cyanogenmod.org\/","author":"Mod C.","year":"2013","unstructured":"C. Mod . Cyanogen mod (rom forum). http:\/\/www.cyanogenmod.org\/ , 2013 . C. Mod. Cyanogen mod (rom forum). http:\/\/www.cyanogenmod.org\/, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"volume-title":"http:\/\/forum.xda-developers.com\/showthread.php?t=1296916","year":"2011","key":"e_1_3_2_1_24_1","unstructured":"Revolutionary. Zergrush. http:\/\/forum.xda-developers.com\/showthread.php?t=1296916 , 2011 . Revolutionary. Zergrush. http:\/\/forum.xda-developers.com\/showthread.php?t=1296916, 2011."},{"key":"e_1_3_2_1_25_1","unstructured":"saurik. Android bug superior to master key. http:\/\/www.saurik.com\/id\/18 2009.  saurik. Android bug superior to master key. http:\/\/www.saurik.com\/id\/18 2009."},{"key":"e_1_3_2_1_26_1","unstructured":"saurik. Exploit and fix android master key. http:\/\/www.saurik.com\/id\/17 2009.  saurik. Exploit and fix android master key. http:\/\/www.saurik.com\/id\/17 2009."},{"key":"e_1_3_2_1_27_1","unstructured":"saurik. Yet another android master key bug. http:\/\/www.saurik.com\/id\/19 2009.  saurik. Yet another android master key bug. http:\/\/www.saurik.com\/id\/19 2009."},{"key":"e_1_3_2_1_28_1","unstructured":"D. Security. Xray for android. http:\/\/www.xray.io\/#vulnerabilities.  D. Security. Xray for android. http:\/\/www.xray.io\/#vulnerabilities."},{"key":"e_1_3_2_1_29_1","unstructured":"Shendu. Rom shendu (rom market). http:\/\/www.shendu.com\/android\/ 2013.  Shendu. Rom shendu (rom market). http:\/\/www.shendu.com\/android\/ 2013."},{"key":"e_1_3_2_1_30_1","unstructured":"VR-ZONE. Research shows chinese manufacturers account for 20 percent of smartphones worldwide india on the rise. http:\/\/vr-zone.com\/articles\/research-shows-chinese-manufacturers-account-for-20-percent-of-smartphones-worldwide-india-on-the-rise\/49868.html 2013.  VR-ZONE. Research shows chinese manufacturers account for 20 percent of smartphones worldwide india on the rise. http:\/\/vr-zone.com\/articles\/research-shows-chinese-manufacturers-account-for-20-percent-of-smartphones-worldwide-india-on-the-rise\/49868.html 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"http:\/\/www.scmagazine.com\/pay-per-install-pays-big-bucks-in-the-mobile-world\/article\/258731\/","author":"Walker D.","year":"2012","unstructured":"D. Walker . Pay-per-install pays big bucks in the mobile world. http:\/\/www.scmagazine.com\/pay-per-install-pays-big-bucks-in-the-mobile-world\/article\/258731\/ , 2012 . D. Walker. Pay-per-install pays big bucks in the mobile world. http:\/\/www.scmagazine.com\/pay-per-install-pays-big-bucks-in-the-mobile-world\/article\/258731\/, 2012."},{"volume-title":"http:\/\/www.xda-developers.com\/","year":"2013","key":"e_1_3_2_1_32_1","unstructured":"Xda. Xda-developers (rom forum). http:\/\/www.xda-developers.com\/ , 2013 . Xda. Xda-developers (rom forum). http:\/\/www.xda-developers.com\/, 2013."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381940"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_36_1","unstructured":"Zhijia. Rom zhijia (rom market). http:\/\/www.romzj.com\/ 2013.  Zhijia. Rom zhijia (rom market). http:\/\/www.romzj.com\/ 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 20th Annual Symposium on Network and Distributed System Security","author":"Zhou Y.","year":"2013","unstructured":"Y. Zhou and X. Jiang . Detecting passive content leaks and pollution in android applications . In Proceedings of the 20th Annual Symposium on Network and Distributed System Security , 2013 . Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium , 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012."},{"key":"e_1_3_2_1_41_1","unstructured":"H. Z. Zihang Xiao Qing Dong and X. Jiang. Oldboot: the first bootkit on Android. http:\/\/blogs.360.cn\/360mobile\/2014\/01\/17\/oldboot-the-first-bootkit-on-android\/ 2014.  H. Z. Zihang Xiao Qing Dong and X. Jiang. Oldboot: the first bootkit on Android. http:\/\/blogs.360.cn\/360mobile\/2014\/01\/17\/oldboot-the-first-bootkit-on-android\/ 2014."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590313"}},"subtitle":["a security evaluation system for customized android firmwares"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":41,"alternative-id":["10.1145\/2590296.2590313","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590313","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}