{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:20:16Z","timestamp":1772670016994,"version":"3.50.1"},"reference-count":118,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T00:00:00Z","timestamp":1431302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2015,7,21]]},"abstract":"<jats:p>Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. However, Android\u2019s widespread adoption is marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices. Based on Android app deployment stages, the taxonomy enables us to analyze schemes that share similar objective and approach and to inspect their key differences. Additionally, this article highlights the limitations of existing works and current challenges. It thus distills the state of the art in Android security research and identifies potential research directions for safeguarding billions (and keep counting) of Android-run devices.<\/jats:p>","DOI":"10.1145\/2733306","type":"journal-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:30:57Z","timestamp":1431361857000},"page":"1-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Securing Android"],"prefix":"10.1145","volume":"47","author":[{"family":"Sufatrio","sequence":"first","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]},{"given":"Darell J. J.","family":"Tan","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]},{"given":"Tong-Wei","family":"Chua","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]},{"given":"Vrizlynn L. L.","family":"Thing","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,5,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_14"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899928.1899945"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 1021--1036","author":"Bhoraskar R."},{"key":"e_1_2_1_10_1","volume-title":"Retrieved","author":"Bray T.","year":"2011"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS\u201912)","author":"Bugiel S."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 131--146","author":"Bugiel S.","year":"2013"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium (NDSS\u201913)","author":"Chen K. Z."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_2_1_18_1","volume-title":"Retrieved","year":"2014"},{"key":"e_1_2_1_19_1","volume-title":"Technical Report 148. University of Auckland, Auckland, New Zealand.","author":"Collberg C.","year":"1997"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2204249"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 13th Information Security Conference (ISC\u201910)","author":"Conti M."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS\u201912)","author":"Crussell J."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS\u201913)","author":"Crussell J."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of Mobile Security Technologies (MoST\u201912)","author":"Davis B."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 20th USENIX Security Symposium. 347--362","author":"Dietz M."},{"key":"e_1_2_1_27_1","unstructured":"J. J. Drake Z. Lanier C. Mulliner P. Oliva S. A. Ridley and G. Wicherski. 2014. Android Hacker\u2019s Handbook. Wiley Hoboken NJ.  J. J. Drake Z. Lanier C. Mulliner P. Oliva S. A. Ridley and G. Wicherski. 2014. Android Hacker\u2019s Handbook. Wiley Hoboken NJ."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_3"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)","author":"Enck W."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 20th USENIX Security Symposium. 315--330","author":"Enck W."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_2_1_36_1","volume-title":"Retrieved","year":"2013"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516655"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 20th USENIX Security Symposium. 331--346","author":"Felt A. P."},{"key":"e_1_2_1_44_1","volume-title":"Technical Report CS-TR-4991. University of Maryland","author":"Fuchs A. P.","year":"2009"},{"key":"e_1_2_1_45_1","volume-title":"Retrieved","author":"Inc.","year":"2014"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS\u201912)","author":"Grace M."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484317"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 1005--1019","author":"Heuser S.","year":"2014"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480672"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_2_1_55_1","volume-title":"Retrieved","author":"Jiang X.","year":"2012"},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"X. Jiang and Y. Zhou. 2013. Android Malware. Springer New York NY.   X. Jiang and Y. Zhou. 2013. Android Malware. Springer New York NY.","DOI":"10.1007\/978-1-4614-7394-7"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381948"},{"key":"e_1_2_1_58_1","unstructured":"K. Kennedy E. Gustafson and H. Chen. 2013. Quantifying the effects of removing permissions from Android applications. In Mobile Security Technologies (MoST).  K. Kennedy E. Gustafson and H. Chen. 2013. Quantifying the effects of removing permissions from Android applications. In Mobile Security Technologies (MoST)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 21st USENIX Security Symposium. 569--584","author":"Lok K. Y."},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (USENIX ATC\u201901)","author":"Loscocco P."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1201\/b14672"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523679"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_2_1_67_1","doi-asserted-by":"crossref","unstructured":"G. Nolan. 2012. Decompiling Android. Apress New York NY.   G. Nolan. 2012. Decompiling Android. Apress New York NY.","DOI":"10.1007\/978-1-4302-4249-9"},{"key":"e_1_2_1_68_1","volume-title":"Dissecting the Android Bouncer. Summercon. Retrieved","author":"Oberheide J.","year":"2015"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 543--558","author":"Octeau D."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920295"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 527--542","author":"Pandita R."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_2_1_77_1","volume-title":"Black Hat USA. Retrieved","author":"Percoco N. J.","year":"2015"},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (NDSS\u201914)","author":"Poeplau S."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (NDSS\u201914)","author":"Rasthofer S."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 97--112","author":"Roesner F."},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT\u201913)","author":"Sarwar G.","year":"2013"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the 18th Network and Distributed System Security Symposium (NDSS\u201911)","author":"Schlegel R."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.144"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.046"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_2_1_90_1","volume-title":"Proceedings of the 21st USENIX Security Symposium. 553--567","author":"Shekhar S."},{"key":"e_1_2_1_91_1","volume-title":"Application Security for the Android Platform: Processes, Permissions, and Other Safeguards. O\u2019Reilly Media","author":"Six J."},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium (NDSS\u201913)","author":"Smalley S."},{"key":"e_1_2_1_93_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (NDSS\u201914)","author":"Sounthiraraj D."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535505"},{"key":"e_1_2_1_97_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 175--190","author":"Tripp O."},{"key":"e_1_2_1_98_1","volume-title":"Retrieved","author":"Dept U.S.","year":"2013"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT\u201911)","author":"Vidas T."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_2_1_103_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (NDSS\u201914)","author":"Wu C."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the 21st USENIX Security Symposium. 539--552","author":"Xu R."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (NDSS\u201914)","author":"Zhang M."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_5"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium (NDSS\u201913)","author":"Zhou Y."},{"key":"e_1_2_1_119_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS\u201912)","author":"Zhou Y."},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST\u201911)","author":"Zhou Y."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2733306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2733306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:47Z","timestamp":1750227407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2733306"}},"subtitle":["A Survey, Taxonomy, and Challenges"],"short-title":[],"issued":{"date-parts":[[2015,5,11]]},"references-count":118,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7,21]]}},"alternative-id":["10.1145\/2733306"],"URL":"https:\/\/doi.org\/10.1145\/2733306","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,11]]},"assertion":[{"value":"2014-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-05-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}