{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:22Z","timestamp":1761611362376,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2664243.2664245","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"226-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Design and implementation of an Android host-based intrusion prevention system"],"prefix":"10.1145","author":[{"given":"Mingshen","family":"Sun","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Min","family":"Zheng","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"Qihoo &amp; NC State University"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"360\n    one click root. http:\/\/shuaji.360.cn\/root\/index.html.  360 one click root. http:\/\/shuaji.360.cn\/root\/index.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Malware Genome Project. http:\/\/malgenomeproject.org.  Android Malware Genome Project. http:\/\/malgenomeproject.org."},{"key":"e_1_3_2_1_3_1","unstructured":"APKfuscator. https:\/\/github.com\/strazzere\/APKfuscator.  APKfuscator. https:\/\/github.com\/strazzere\/APKfuscator."},{"key":"e_1_3_2_1_4_1","unstructured":"Apktool. https:\/\/code.google.com\/p\/android-apktool\/.  Apktool. https:\/\/code.google.com\/p\/android-apktool\/."},{"key":"e_1_3_2_1_5_1","unstructured":"App Shield. http:\/\/www.wandoujia.com\/apps\/com.gmail.exathink.appshield.  App Shield. http:\/\/www.wandoujia.com\/apps\/com.gmail.exathink.appshield."},{"key":"e_1_3_2_1_6_1","unstructured":"Aurora Softworks quadrant standard edition. https:\/\/play.google.com\/store\/apps\/details?id=com. aurorasoftworks.quadrant.ui.standard.  Aurora Softworks quadrant standard edition. https:\/\/play.google.com\/store\/apps\/details?id=com. aurorasoftworks.quadrant.ui.standard."},{"key":"e_1_3_2_1_7_1","unstructured":"cyanogenmod. http:\/\/www.cyanogenmod.org.  cyanogenmod. http:\/\/www.cyanogenmod.org."},{"key":"e_1_3_2_1_8_1","unstructured":"DroidBox. https:\/\/code.google.com\/p\/droidbox\/.  DroidBox. https:\/\/code.google.com\/p\/droidbox\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Jinshan mobile duba. http:\/\/m.duba.net\/.  Jinshan mobile duba. http:\/\/m.duba.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Lbe secrity guard. http:\/\/www.lbesec.com\/.  Lbe secrity guard. http:\/\/www.lbesec.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"mobile malware mini dump. http:\/\/contagiominidump.blogspot.com\/.  mobile malware mini dump. http:\/\/contagiominidump.blogspot.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html.  monkey. http:\/\/developer.android.com\/tools\/help\/monkey.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Qihoo 360 mobile guard. http:\/\/shouji.360.cn\/.  Qihoo 360 mobile guard. http:\/\/shouji.360.cn\/."},{"key":"e_1_3_2_1_14_1","unstructured":"smali\/baksmali. https:\/\/code.google.com\/p\/smali\/.  smali\/baksmali. https:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_16_1","volume-title":"NDSS","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on android . In NDSS , 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A.-R. Sadeghi . Flexible and fine-grained mandatory access control on android for diverse security and privacy policies . In USENIX Security , 2013 . S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In USENIX Security, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462100"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . QUIRE: Lightweight provenance for smart phone operating systems . In USENIX Security , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight provenance for smart phone operating systems. In USENIX Security, 2011."},{"key":"e_1_3_2_1_23_1","volume-title":"NDSS","author":"Egele M.","year":"2011","unstructured":"M. Egele , C. Kruegel , E. Kirda , and G. Vigna . PiOS: Detecting privacy leaks in ios applications . In NDSS , 2011 . M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in ios applications. In NDSS, 2011."},{"key":"e_1_3_2_1_24_1","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. McDaniel , and S. Chaudhuri . A study of android application security . In USENIX Security , 2011 . W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In USENIX Security, 2011."},{"volume-title":"Threat report h2","year":"2013","key":"e_1_3_2_1_26_1","unstructured":"F-Secure. Threat report h2 2013 . F-Secure. Threat report h2 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: attacks and defenses . In USENIX Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: attacks and defenses. In USENIX Security, 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"Blackhat USA 2013","author":"Forristal J.","year":"2013","unstructured":"J. Forristal . Android : One root to own them all . In Blackhat USA 2013 , 2013 . J. Forristal. Android: One root to own them all. In Blackhat USA 2013, 2013."},{"key":"e_1_3_2_1_30_1","unstructured":"Google. Platform versions. http:\/\/developer.android.com\/about\/dashboards\/index.html.  Google. Platform versions. http:\/\/developer.android.com\/about\/dashboards\/index.html."},{"key":"e_1_3_2_1_31_1","volume-title":"NDSS","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In NDSS , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_34_1","volume-title":"DEFCON","author":"Harbour N.","year":"2009","unstructured":"N. Harbour . Win at reversing: Api tracing and sandboxing through inline hooking . In DEFCON , 2009 . N. Harbour. Win at reversing: Api tracing and sandboxing through inline hooking. In DEFCON, 2009."},{"key":"e_1_3_2_1_35_1","unstructured":"IDC. Apple cedes market share in smartphone operating system market as android surges and windows phone gains. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24257413.  IDC. Apple cedes market share in smartphone operating system market as android surges and windows phone gains. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24257413."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484417.2484422"},{"key":"e_1_3_2_1_39_1","volume-title":"McAfee threats report: Second quarter","author":"Labs McAfee","year":"2013","unstructured":"McAfee Labs . McAfee threats report: Second quarter 2013 . Technical report, McAfee Labs , 2013. McAfee Labs. McAfee threats report: Second quarter 2013. Technical report, McAfee Labs, 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"The 11th Annual HITB Security Conference in ASIA","author":"Mulliner C.","year":"2013","unstructured":"C. Mulliner . Android DDI : Introduction to dynamic dalvik instrumentation . In The 11th Annual HITB Security Conference in ASIA , 2013 . C. Mulliner. Android DDI: Introduction to dynamic dalvik instrumentation. In The 11th Annual HITB Security Conference in ASIA, 2013."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523679"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_43_1","volume-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . Internet Society , 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Internet Society, 2005."},{"key":"e_1_3_2_1_44_1","unstructured":"P. Olson. Your smartphone is hackers' next big target. http:\/\/edition.cnn.com\/2013\/08\/26\/opinion\/olson-mobile-hackers August 2013.  P. Olson. Your smartphone is hackers' next big target. http:\/\/edition.cnn.com\/2013\/08\/26\/opinion\/olson-mobile-hackers August 2013."},{"key":"e_1_3_2_1_45_1","unstructured":"A. Police. App Ops: Android 4.3's hidden app permission manager control permissions for individual apps.  A. Police. App Ops: Android 4.3's hidden app permission manager control permissions for individual apps."},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security","author":"Provos N.","year":"2003","unstructured":"N. Provos . Improving host security with system call policies . In USENIX Security , 2003 . N. Provos. Improving host security with system call policies. In USENIX Security, 2003."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523678"},{"key":"e_1_3_2_1_50_1","volume-title":"Blackhat USA 2012","author":"Strazzere T.","year":"2012","unstructured":"T. Strazzere . Dex education : Practicing safe dex . In Blackhat USA 2012 , 2012 . T. Strazzere. Dex education: Practicing safe dex. In Blackhat USA 2012, 2012."},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security","author":"Wang T.","year":"2013","unstructured":"T. Wang , K. Lu , L. Lu , S. Chung , and W. Lee . Jekyll on iOS: when benign apps become evil . In USENIX Security , 2013 . T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on iOS: when benign apps become evil. In USENIX Security, 2013."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_53_1","unstructured":"xda-developers. PDroid. http:\/\/forum.xda-developers.com\/showthread.php?t=1357056.  xda-developers. PDroid. http:\/\/forum.xda-developers.com\/showthread.php?t=1357056."},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX Security","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Sa\u00efdi , and R. Anderson . Aurasium: practical policy enforcement for android applications . In USENIX Security , 2012 . R. Xu, H. Sa\u00efdi, and R. Anderson. Aurasium: practical policy enforcement for android applications. In USENIX Security, 2012."},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX Security","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . DroidScope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis . In USENIX Security , 2012 . L. K. Yan and H. Yin. DroidScope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security, 2012."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590313"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_64_1","volume-title":"NDSS","author":"Zhou Y.","year":"2013","unstructured":"Y. Zhou and X. Jiang . Detecting passive content leaks and pollution in android applications . In NDSS , 2013 . Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In NDSS, 2013."},{"key":"e_1_3_2_1_65_1","volume-title":"NDSS","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets . In NDSS , 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012."}],"event":{"name":"ACSAC '14: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '14"},"container-title":["Proceedings of the 30th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664245","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2664243.2664245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:01Z","timestamp":1750227121000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":65,"alternative-id":["10.1145\/2664243.2664245","10.1145\/2664243"],"URL":"https:\/\/doi.org\/10.1145\/2664243.2664245","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}