{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:22Z","timestamp":1773510922933,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2742647.2742668","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"89-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps"],"prefix":"10.1145","author":[{"given":"Bin","family":"Liu","sequence":"first","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/techcrunch.com\/2013\/07\/26\/android-app-ops\/","author":"Includes Hidden App Permissions Android","year":"2013","unstructured":"Android 4.3 Includes Hidden App Permissions Manager That Could Bolster Privacy & Security. http:\/\/techcrunch.com\/2013\/07\/26\/android-app-ops\/ , 2013 . Android 4.3 Includes Hidden App Permissions Manager That Could Bolster Privacy & Security. http:\/\/techcrunch.com\/2013\/07\/26\/android-app-ops\/, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.howtogeek.com\/177915\/how-to-restore-access-to-app-ops......-in-android-4.4.2\/","author":"Restore How","year":"2013","unstructured":"How to Restore Access to App Ops in Android 4.4.2+. http:\/\/www.howtogeek.com\/177915\/how-to-restore-access-to-app-ops......-in-android-4.4.2\/ , 2013 . How to Restore Access to App Ops in Android 4.4.2+. http:\/\/www.howtogeek.com\/177915\/how-to-restore-access-to-app-ops......-in-android-4.4.2\/, 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/developer.android.com\/google\/play-services\/id.html","author":"Advertising","year":"2014","unstructured":"Advertising ID. https:\/\/developer.android.com\/google\/play-services\/id.html , 2014 . Advertising ID. https:\/\/developer.android.com\/google\/play-services\/id.html, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/developer.android.com\/guide\/index.html","author":"Guides Android API","year":"2014","unstructured":"Android API Guides . https:\/\/developer.android.com\/guide\/index.html , 2014 . Android API Guides. https:\/\/developer.android.com\/guide\/index.html, 2014."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/developer.android.com\/guide\/components\/fundamentals.html","author":"Fundamentals Android Application","year":"2014","unstructured":"Android Application Fundamentals . http:\/\/developer.android.com\/guide\/components\/fundamentals.html , 2014 . Android Application Fundamentals. http:\/\/developer.android.com\/guide\/components\/fundamentals.html, 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html","author":"Android","year":"2014","unstructured":"Android NDK. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html , 2014 . Android NDK. http:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html, 2014."},{"key":"e_1_3_2_1_7_1","unstructured":"AppBrain Statistics on Android Libraries: Ad Networks. http:\/\/www.appbrain.com\/stats\/libraries\/ad 2014.  AppBrain Statistics on Android Libraries: Ad Networks. http:\/\/www.appbrain.com\/stats\/libraries\/ad 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Read Write Android Binary XML and resources.arsc Files. https:\/\/code.google.com\/p\/axml\/","author":"AXML","year":"2014","unstructured":"AXML : Read Write Android Binary XML and resources.arsc Files. https:\/\/code.google.com\/p\/axml\/ , 2014 . AXML: Read Write Android Binary XML and resources.arsc Files. https:\/\/code.google.com\/p\/axml\/, 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.chartboost.com\/","year":"2014","unstructured":"Chartboost. http:\/\/www.chartboost.com\/ , 2014 . Chartboost. http:\/\/www.chartboost.com\/, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/en.wikipedia.org\/wiki\/Component-based_software_engineering","author":"Engineering Software","year":"2014","unstructured":"Component-based Software Engineering . http:\/\/en.wikipedia.org\/wiki\/Component-based_software_engineering , 2014 . Component-based Software Engineering. http:\/\/en.wikipedia.org\/wiki\/Component-based_software_engineering, 2014."},{"key":"e_1_3_2_1_11_1","unstructured":"Distribution of Free vs. Paid Android Apps. http:\/\/www.appbrain.com\/stats\/free-and-paid-android-applications 2014.  Distribution of Free vs. Paid Android Apps. http:\/\/www.appbrain.com\/stats\/free-and-paid-android-applications 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent","author":"Worldwide Gartner Says","year":"2014","unstructured":"Gartner Says Worldwide Traditional PC , Tablet , Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014 . http:\/\/www.gartner.com\/newsroom\/id\/2791017, 2014. Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014. http:\/\/www.gartner.com\/newsroom\/id\/2791017, 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/play.google.com\/store","author":"Play Google","year":"2014","unstructured":"Google Play . https:\/\/play.google.com\/store , 2014 . Google Play. https:\/\/play.google.com\/store, 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/adblockplus.org\/en\/android-install","author":"Android Install Adblock","year":"2014","unstructured":"Install Adblock Plus for Android . https:\/\/adblockplus.org\/en\/android-install , 2014 . Install Adblock Plus for Android. https:\/\/adblockplus.org\/en\/android-install, 2014."},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/developer.android.com\/tools\/help\/proguard.html","year":"2014","unstructured":"ProGuard. http:\/\/developer.android.com\/tools\/help\/proguard.html , 2014 . ProGuard. http:\/\/developer.android.com\/tools\/help\/proguard.html, 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Secure Android Proxy. https:\/\/code.google.com\/p\/sandrop\/","author":"Sandrop","year":"2014","unstructured":"Sandrop : Secure Android Proxy. https:\/\/code.google.com\/p\/sandrop\/ , 2014 . Sandrop: Secure Android Proxy. https:\/\/code.google.com\/p\/sandrop\/, 2014."},{"key":"e_1_3_2_1_17_1","unstructured":"Soot: a Java Optimization Framework. http:\/\/www.sable.mcgill.ca\/soot\/ 2014.  Soot: a Java Optimization Framework. http:\/\/www.sable.mcgill.ca\/soot\/ 2014."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/github.com\/M66B\/XPrivacy#xprivacy","year":"2014","unstructured":"XPricacy. https:\/\/github.com\/M66B\/XPrivacy#xprivacy , 2014 . XPricacy. https:\/\/github.com\/M66B\/XPrivacy#xprivacy, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2646584.2646585"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_22_1","volume-title":"Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395","author":"Backes M.","year":"2014","unstructured":"M. Backes , S. Bugiel , S. Gerling , and P. Styp-Rekowsky . Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395 , 2014 . M. Backes, S. Bugiel, S. Gerling, and P. Styp-Rekowsky. Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395, 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_1_24_1","volume-title":"Improving privacy on android smartphones through in-vivo bytecode instrumentation. arXiv preprint arXiv:1208.4536","author":"Bartel A.","year":"2012","unstructured":"A. Bartel , J. Klein , M. Monperrus , K. Allix , and Y. Traon . Improving privacy on android smartphones through in-vivo bytecode instrumentation. arXiv preprint arXiv:1208.4536 , 2012 . A. Bartel, J. Klein, M. Monperrus, K. Allix, and Y. Traon. Improving privacy on android smartphones through in-vivo bytecode instrumentation. arXiv preprint arXiv:1208.4536, 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"ACM HotMobile","author":"Beresfordand A. R.","year":"2011","unstructured":"A. R. Beresfordand , A. Rice , N. Skehin , and R. Sohan . MockDroid: Trading Privacy for Application Functionality on Smartphones . In ACM HotMobile , 2011 . A. R. Beresfordand, A. Rice, N. Skehin, and R. Sohan. MockDroid: Trading Privacy for Application Functionality on Smartphones. In ACM HotMobile, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. IEEE MoST","author":"Book T.","year":"2013","unstructured":"T. Book , A. Pridgen , and D. Wallach . Longitudinal Analysis of Android Ad Library Permissions . In Proc. IEEE MoST , 2013 . T. Book, A. Pridgen, and D. Wallach. Longitudinal Analysis of Android Ad Library Permissions. In Proc. IEEE MoST, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516762"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. USENIX security","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A. Sadeghi . Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies . In Proc. USENIX security , 2013 . S. Bugiel, S. Heuser, and A. Sadeghi. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In Proc. USENIX security, 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. IEEE MoST","author":"Davis B.","year":"2012","unstructured":"B. Davis , B. Sanders , A. Khodaverdian , and H. Chen . I-ARM-Droid: A Rewriting Framework for In-app Reference Monitors for Android Applications . In Proc. IEEE MoST , 2012 . B. Davis, B. Sanders, A. Khodaverdian, and H. Chen. I-ARM-Droid: A Rewriting Framework for In-app Reference Monitors for Android Applications. In Proc. IEEE MoST, 2012."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. Chun , L. Cox , J. Jung , P. McDaniel , and A. Sheth . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proc. OSDI , 2010 . W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI, 2010."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465430"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979299"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. USENIX Security","author":"Kiriansky V.","year":"2002","unstructured":"V. Kiriansky , D. Bruening , and S. Amarasinghe . Secure execution via program shepherding . In Proc. USENIX Security , 2002 . V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In Proc. USENIX Security, 2002."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. SOUPS","author":"Lin J.","year":"2014","unstructured":"J. Lin , B. Liu , J. Hong , and N. Sadeh . Modeling Users? Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings . In Proc. SOUPS , 2014 . J. Lin, B. Liu, J. Hong, and N. Sadeh. Modeling Users? Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proc. SOUPS, 2014."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX NSDI","author":"Liu B.","year":"2014","unstructured":"B. Liu , S. Nath , R. Govindan , and J. Liu . DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps . In USENIX NSDI , 2014 . B. Liu, S. Nath, R. Govindan, and J. Liu. DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. In USENIX NSDI, 2014."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. USENIX security","author":"Nadkarni A.","year":"2014","unstructured":"A. Nadkarni and W. Enck . ASM: A Programmable Interface for Extending Android Security . In Proc. USENIX security , 2014 . A. Nadkarni and W. Enck. ASM: A Programmable Interface for Extending Android Security. In Proc. USENIX security, 2014."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. UKUUG Linux Developer's Conference","author":"Probst M.","year":"2002","unstructured":"M. Probst . Dynamic Binary Translation . In Proc. UKUUG Linux Developer's Conference , 2002 . M. Probst. Dynamic Binary Translation. In Proc. UKUUG Linux Developer's Conference, 2002."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. USENIX Security","author":"Roesner F.","year":"2013","unstructured":"F. Roesner and T. Kohno . Securing embedded user interfaces: Android and beyond . In Proc. USENIX Security , 2013 . F. Roesner and T. Kohno. Securing embedded user interfaces: Android and beyond. In Proc. USENIX Security, 2013."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. USENIX Security","author":"Shekhar S.","year":"2012","unstructured":"S. Shekhar , M. Dietz , and D. Wallach . AdSplit: Separating Smartphone Advertising from Applications . In Proc. USENIX Security , 2012 . S. Shekhar, M. Dietz, and D. Wallach. AdSplit: Separating Smartphone Advertising from Applications. In Proc. USENIX Security, 2012."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. IEEE MoST","author":"Stevens R.","year":"2012","unstructured":"R. Stevens , C. Gibler , J. Crussell , J. Erickson , and H. Chen . Investigating User Privacy in Android Ad Libraries . In Proc. IEEE MoST , 2012 . R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating User Privacy in Android Ad Libraries. In Proc. IEEE MoST, 2012."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_7"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484316"},{"key":"e_1_3_2_1_61_1","unstructured":"D. Wetherall D. Choffnes B. Greenstein S. Han P. Hornyack J. Jung S. Schechter and X. Wang. Privacy Revelations for Web and Mobile Apps.  D. Wetherall D. Choffnes B. Greenstein S. Han P. Hornyack J. Jung S. Schechter and X. Wang. Privacy Revelations for Web and Mobile Apps."},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. USENIX Security","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Saidi , and R. Anderson . Aurasium: Practical Policy Enforcement for Android Applications . In Proc. USENIX Security , 2012 . R. Xu, H. Saidi, and R. Anderson. Aurasium: Practical Policy Enforcement for Android Applications. In Proc. USENIX Security, 2012."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services","location":"Florence Italy","acronym":"MobiSys'15","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2742647.2742668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:33Z","timestamp":1750227393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":62,"alternative-id":["10.1145\/2742647.2742668","10.1145\/2742647"],"URL":"https:\/\/doi.org\/10.1145\/2742647.2742668","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}