{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:24:45Z","timestamp":1772749485392,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006831","name":"U.S. Air Force","doi-asserted-by":"publisher","award":["FA8650-10-C-7025"],"award-info":[{"award-number":["FA8650-10-C-7025"]}],"id":[{"id":"10.13039\/100006831","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1149051"],"award-info":[{"award-number":["CNS-1149051"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1017265"],"award-info":[{"award-number":["CNS-1017265"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0831300"],"award-info":[{"award-number":["CNS-0831300"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000140911042"],"award-info":[{"award-number":["N000140911042"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["N66001-12-C-0133"],"award-info":[{"award-number":["N66001-12-C-0133"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660295","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"103-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["A11y Attacks"],"prefix":"10.1145","author":[{"given":"Yeongjin","family":"Jang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Simon P.","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Tielei","family":"Wang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Developers. Security tips. http:\/\/developer.android.com\/training\/articles\/security-tips.html.  Android Developers. Security tips. http:\/\/developer.android.com\/training\/articles\/security-tips.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Inc. Accessibility. http:\/\/www.apple.com\/accessibility\/resources\/ .  Apple Inc. Accessibility. http:\/\/www.apple.com\/accessibility\/resources\/ ."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple Inc. The ios environment. https:\/\/developer.apple.com\/library\/ios\/documentation\/iphone\/conceptual\/iphoneosprogrammingguide\/TheiOSEnvironment\/TheiOSEnvironment.html .  Apple Inc. The ios environment. https:\/\/developer.apple.com\/library\/ios\/documentation\/iphone\/conceptual\/iphoneosprogrammingguide\/TheiOSEnvironment\/TheiOSEnvironment.html ."},{"key":"e_1_3_2_1_4_1","unstructured":"O. Begemann. Remote View Controllers in iOS6. http:\/\/oleb.net\/blog\/2012\/10\/remote-view-controllers-in-ios-6\/.  O. Begemann. Remote View Controllers in iOS6. http:\/\/oleb.net\/blog\/2012\/10\/remote-view-controllers-in-ios-6\/."},{"key":"e_1_3_2_1_5_1","volume-title":"DTIC Document","author":"Biba K. J.","year":"1977"},{"key":"e_1_3_2_1_6_1","first-page":"18","volume-title":"19th Annual Network & Distributed System Security Symposium (NDSS)","volume":"17","author":"Bugiel S.","year":"2012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Cook. {patch} security: Yama lsm. http:\/\/lwn.net\/Articles\/393012\/.  K. Cook. {patch} security: Yama lsm. http:\/\/lwn.net\/Articles\/393012\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949356"},{"key":"e_1_3_2_1_10_1","unstructured":"L. Davidson. Windows 7 uac whitelist: Proof-of-concept source code. http:\/\/www.pretentiousname.com\/misc\/W7E_Source\/win7_uac_poc_details.html.  L. Davidson. Windows 7 uac whitelist: Proof-of-concept source code. http:\/\/www.pretentiousname.com\/misc\/W7E_Source\/win7_uac_poc_details.html."},{"key":"e_1_3_2_1_11_1","unstructured":"J. Edwards. There's a huge password security quirk in ios 7 that lets siri control your iphone. http:\/\/www.businessinsider.com\/password-security-flaw-in-ios-7-lets-siri-control-your-iphone-2013--9.  J. Edwards. There's a huge password security quirk in ios 7 that lets siri control your iphone. http:\/\/www.businessinsider.com\/password-security-flaw-in-ios-7-lets-siri-control-your-iphone-2013--9."},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"OSDI","volume":"10","author":"Enck W.","year":"2010"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","author":"Felt A. P.","year":"2011"},{"key":"e_1_3_2_1_14_1","unstructured":"Go Launcher Dev Team. Go launcher ex notification. https:\/\/play.google.com\/store\/apps\/details?id=com.gau.golauncherex.notification.  Go Launcher Dev Team. Go launcher ex notification. https:\/\/play.google.com\/store\/apps\/details?id=com.gau.golauncherex.notification."},{"key":"e_1_3_2_1_15_1","unstructured":"Google Inc. Section 508 Compliance (VPAT). https:\/\/www.google.com\/sites\/accessibility.html.  Google Inc. Section 508 Compliance (VPAT). https:\/\/www.google.com\/sites\/accessibility.html."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","author":"Grace M.","year":"2012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of Black Hat USA","author":"Lau B.","year":"2013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"63","article-title":"Leveling the accessibility playing field: Section 508 of the rehabilitation act","volume":"3","author":"McLawhorn C.","year":"2001","journal-title":"NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY"},{"key":"e_1_3_2_1_22_1","unstructured":"Microsoft. Windows integrity mechanism design. http:\/\/msdn.microsoft.com\/en-us\/library\/bb625963.aspx  Microsoft. Windows integrity mechanism design. http:\/\/msdn.microsoft.com\/en-us\/library\/bb625963.aspx"},{"key":"e_1_3_2_1_23_1","unstructured":"Microsoft. Windows vista integrity mechanism technical reference. http:\/\/msdn.microsoft.com\/en-us\/library\/bb625964.aspx .  Microsoft. Windows vista integrity mechanism technical reference. http:\/\/msdn.microsoft.com\/en-us\/library\/bb625964.aspx ."},{"key":"e_1_3_2_1_24_1","unstructured":"Microsoft Corporation. Microsoft and section 508. http:\/\/www.microsoft.com\/enable\/microsoft\/section508.aspx .  Microsoft Corporation. Microsoft and section 508. http:\/\/www.microsoft.com\/enable\/microsoft\/section508.aspx ."},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft Corporation. User account control. http:\/\/windows.microsoft.com\/en-us\/windows7\/products\/features\/user-account-control .  Microsoft Corporation. User account control. http:\/\/windows.microsoft.com\/en-us\/windows7\/products\/features\/user-account-control ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837112"},{"key":"e_1_3_2_1_27_1","unstructured":"Motorola Inc. Moto X Features: Touchless Control. http:\/\/www.motorola.com\/us\/Moto-X-Features-Touchless-Control\/motox-features-2-touchless.html.  Motorola Inc. Moto X Features: Touchless Control. http:\/\/www.motorola.com\/us\/Moto-X-Features-Touchless-Control\/motox-features-2-touchless.html."},{"key":"e_1_3_2_1_28_1","unstructured":"G. Ou. Vista Speech Command exposes remote exploit. http:\/\/www.zdnet.com\/blog\/ou\/vista-speech-command-exposes-remote-exploit\/416.  G. Ou. Vista Speech Command exposes remote exploit. http:\/\/www.zdnet.com\/blog\/ou\/vista-speech-command-exposes-remote-exploit\/416."},{"key":"e_1_3_2_1_29_1","unstructured":"PoPs. Pops ringtons & notifications. https:\/\/play.google.com\/store\/apps\/details?id=com.pops.app.  PoPs. Pops ringtons & notifications. https:\/\/play.google.com\/store\/apps\/details?id=com.pops.app."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_1_31_1","volume-title":"NDSS","author":"Schlegel R.","year":"2011"},{"key":"e_1_3_2_1_32_1","unstructured":"The United States Government. Section 508 Of The Rehabilitation Act. http:\/\/www.section508.gov\/Section-508-Of-The-Rehabilitation-Act.  The United States Government. Section 508 Of The Rehabilitation Act. http:\/\/www.section508.gov\/Section-508-Of-The-Rehabilitation-Act."},{"key":"e_1_3_2_1_33_1","volume-title":"The 22nd USENIX Security Symposium (SECURITY)","author":"Wang T.","year":"2013"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514285"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 20th Annual Symposium on Network and Distributed System Security","author":"Zhou Y.","year":"2013"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660295"}},"subtitle":["Exploiting Accessibility in Operating Systems"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":36,"alternative-id":["10.1145\/2660267.2660295","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660295","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}