{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:39Z","timestamp":1763468259654,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HKU Seed Fundings for Applied Research","award":["201409160030"],"award-info":[{"award-number":["201409160030"]}]},{"name":"HKU Seed Fundings for Basic Research","award":["201311159149, 201411159122"],"award-info":[{"award-number":["201311159149, 201411159122"]}]},{"name":"Huawei"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2766498.2766509","type":"proceedings-article","created":{"date-parts":[[2015,6,23]],"date-time":"2015-06-23T13:03:05Z","timestamp":1435064585000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["WeChecker"],"prefix":"10.1145","author":[{"given":"Xingmin","family":"Cui","sequence":"first","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Jingxuan","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Zhongwei","family":"Xie","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Tian","family":"Zeng","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_2_1","volume-title":"Report (Bericht)","author":"Backes M.","year":"2014","unstructured":"M. Backes , S. Bugiel , E. Derr , and C. Hammer . Taking android app vetting to the next level with path-sensitive value analysis . Report (Bericht) , 2014 . M. Backes, S. Bugiel, E. Derr, and C. Hammer. Taking android app vetting to the next level with path-sensitive value analysis. Report (Bericht), 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"19th Annual Network & Distributed System Security Symposium (NDSS)","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on android . In 19th Annual Network & Distributed System Security Symposium (NDSS) , Feb. 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185466"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_31"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949356"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/262004.262006"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX conference on Operating systems design and implementation , pages 1 -- 6 , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1--6, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_11_1","first-page":"22","volume-title":"Proceedings of the 20th USENIX Conference on Security, SEC'11","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In Proceedings of the 20th USENIX Conference on Security, SEC'11 , pages 22 -- 22 , Berkeley, CA, USA , 2011 . USENIX Association. A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 22--22, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_12_1","volume-title":"Scandroid: Automated security certification of android applications. Manuscript","author":"Fuchs A. P.","year":"2009","unstructured":"A. P. Fuchs , A. Chaudhuri , and J. S. Foster . Scandroid: Automated security certification of android applications. Manuscript , Univ. of Maryland , http:\/\/www.cs.umd.edu\/~avik\/projects\/scandroidascaa, 2009 . A. P. Fuchs, A. Chaudhuri, and J. S. Foster. Scandroid: Automated security certification of android applications. Manuscript, Univ. of Maryland, http:\/\/www.cs.umd.edu\/~avik\/projects\/scandroidascaa, 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_14_1","unstructured":"Google. Android. http:\/\/source.android.com\/.  Google. Android. http:\/\/source.android.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Google. Android Developers. http:\/\/developer.android.com\/index.html.  Google. Android Developers. http:\/\/developer.android.com\/index.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. Intent. http:\/\/developer.android.com\/reference\/android\/content\/Intent.html.  Google. Intent. http:\/\/developer.android.com\/reference\/android\/content\/Intent.html."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In Proceedings of the 19th Annual Symposium on Network and Distributed System Security , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0086-1"},{"key":"e_1_3_2_1_19_1","unstructured":"IDC. Smartphone OS Market Share Q3 2014. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp.  IDC. Smartphone OS Market Share Q3 2014. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766902"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596550.1596592"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. Le Traon . Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis . In Proceedings of the 22nd USENIX Security Symposium , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In Proceedings of the 22nd USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_16"},{"key":"e_1_3_2_1_24_1","unstructured":"G. Play. Ulysses Gizmons. https:\/\/play.google.com\/store\/apps\/details?id=com.binarytoys.ulysse.  G. Play. Ulysses Gizmons. https:\/\/play.google.com\/store\/apps\/details?id=com.binarytoys.ulysse."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_26_1","unstructured":"E. Spride. DroidBench. https:\/\/github.com\/secure-software-engineering\/DroidBench.  E. Spride. DroidBench. https:\/\/github.com\/secure-software-engineering\/DroidBench."},{"key":"e_1_3_2_1_27_1","unstructured":"E. Spride. DroidBench test case for inter-component communication. https:\/\/github.com\/secure-software-engineering\/DroidBench\/tree\/master\/eclipse-project\/InterComponentCommunication\/ActivityCommunication1.  E. Spride. DroidBench test case for inter-component communication. https:\/\/github.com\/secure-software-engineering\/DroidBench\/tree\/master\/eclipse-project\/InterComponentCommunication\/ActivityCommunication1."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2554511.2554523"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_15"},{"key":"e_1_3_2_1_30_1","first-page":"13","volume-title":"Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research","author":"Vall\u00e9e-Rai R.","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. Hendren , P. Lam , and V. Sundaresan . Soot-a java bytecode optimization framework . In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research , page 13 . IBM Press, 1999. R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot-a java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research, page 13. IBM Press, 1999."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"}],"event":{"name":"WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","US Army Research Office US Army Research Office","NSF National Science Foundation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New York New York","acronym":"WiSec'15"},"container-title":["Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2766498.2766509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:31Z","timestamp":1750223251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2766498.2766509"}},"subtitle":["efficient and precise detection of privilege escalation vulnerabilities in Android apps"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":32,"alternative-id":["10.1145\/2766498.2766509","10.1145\/2766498"],"URL":"https:\/\/doi.org\/10.1145\/2766498.2766509","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}