{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:18Z","timestamp":1776681318126,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Army Research Lab","award":["4939-UCR-ARMY-0045"],"award-info":[{"award-number":["4939-UCR-ARMY-0045"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813714","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1093-1104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Android Root and its Providers"],"prefix":"10.1145","author":[{"given":"Hang","family":"Zhang","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Dongdong","family":"She","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Vulnerabilities -- All vulnerabilities. http:\/\/androidvulnerabilities.org\/all.html.  Android Vulnerabilities -- All vulnerabilities. http:\/\/androidvulnerabilities.org\/all.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Beating up on Android. http:\/\/titanium.immunityinc.com\/infiltrate\/archives\/Android_Attacks.pdf.  Beating up on Android. http:\/\/titanium.immunityinc.com\/infiltrate\/archives\/Android_Attacks.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Contagio minidump. http:\/\/contagiominidump.blogspot.com.  Contagio minidump. http:\/\/contagiominidump.blogspot.com."},{"key":"e_1_3_2_1_4_1","unstructured":"CVE-2014--3153 aka towelroot. https:\/\/github.com\/timwr\/CVE-2014--3153.  CVE-2014--3153 aka towelroot. https:\/\/github.com\/timwr\/CVE-2014--3153."},{"key":"e_1_3_2_1_5_1","unstructured":"Don't Root Robots: Breaks in Google's Android Platform. https:\/\/jon.oberheide.org\/files\/bsides11-dontrootrobots.pdf.  Don't Root Robots: Breaks in Google's Android Platform. https:\/\/jon.oberheide.org\/files\/bsides11-dontrootrobots.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"Exploit DB database. https:\/\/exploit-db.com\/.  Exploit DB database. https:\/\/exploit-db.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"How To Root An AT&T HTC One X. http:\/\/rootzwiki.com\/topic\/26320-how-to-root-an-att-htc-one-x-this-exploit-supports-185\/.  How To Root An AT&T HTC One X. http:\/\/rootzwiki.com\/topic\/26320-how-to-root-an-att-htc-one-x-this-exploit-supports-185\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved on","year":"2015","unstructured":"iRoot , Retrieved on May 10, 2015 . http:\/\/www.mgyun.com\/m\/en. iRoot, Retrieved on May 10, 2015. http:\/\/www.mgyun.com\/m\/en."},{"key":"e_1_3_2_1_9_1","unstructured":"It's Bugs All the Way Down. http:\/\/vulnfactory.org\/.  It's Bugs All the Way Down. http:\/\/vulnfactory.org\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved on","author":"Android One Click","year":"2015","unstructured":"One Click Root for Android , Retrieved on May 10, 2015 . http:\/\/www.oneclickroot.com\/. One Click Root for Android, Retrieved on May 10, 2015. http:\/\/www.oneclickroot.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Rage Against the Cage. http:\/\/stealth.openwall.net\/xSports\/RageAgainstTheCage.tgz.  Rage Against the Cage. http:\/\/stealth.openwall.net\/xSports\/RageAgainstTheCage.tgz."},{"key":"e_1_3_2_1_12_1","unstructured":"Razr Blade Root. http:\/\/vulnfactory.org\/public\/razr_blade.zip.  Razr Blade Root. http:\/\/vulnfactory.org\/public\/razr_blade.zip."},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved on","author":"Genius Root","year":"2015","unstructured":"Root Genius , Retrieved on May 10, 2015 . http:\/\/www.shuame.com\/en\/root\/. Root Genius, Retrieved on May 10, 2015. http:\/\/www.shuame.com\/en\/root\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Root the Droid 3. http:\/\/vulnfactory.org\/blog\/2011\/08\/25\/rooting-the-droid-3\/.  Root the Droid 3. http:\/\/vulnfactory.org\/blog\/2011\/08\/25\/rooting-the-droid-3\/."},{"key":"e_1_3_2_1_15_1","unstructured":"{Root} ZTE z990g Merit (An avail variant). http:\/\/forum.xda-developers.com\/showthread.php?t=1714299.  {Root} ZTE z990g Merit (An avail variant). http:\/\/forum.xda-developers.com\/showthread.php?t=1714299."},{"key":"e_1_3_2_1_16_1","unstructured":"{Root\/Write Protection Bypass} MotoX (no unlock needed). http:\/\/forum.xda-developers.com\/moto-x\/orig-development\/root-write-protection-bypass-motox-t2444957.  {Root\/Write Protection Bypass} MotoX (no unlock needed). http:\/\/forum.xda-developers.com\/moto-x\/orig-development\/root-write-protection-bypass-motox-t2444957."},{"key":"e_1_3_2_1_17_1","unstructured":"Samsung Knox. https:\/\/www.samsungknox.com\/.  Samsung Knox. https:\/\/www.samsungknox.com\/."},{"key":"e_1_3_2_1_18_1","unstructured":"TacoRoot. https:\/\/github.com\/CunningLogic\/TacoRoot.  TacoRoot. https:\/\/github.com\/CunningLogic\/TacoRoot."},{"key":"e_1_3_2_1_19_1","unstructured":"Virus Profile: Exploit\/MempoDroid.B. http:\/\/home.mcafee.com\/virusinfo\/virusprofile.aspx?key=1003986.  Virus Profile: Exploit\/MempoDroid.B. http:\/\/home.mcafee.com\/virusinfo\/virusprofile.aspx?key=1003986."},{"key":"e_1_3_2_1_20_1","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/.  VirusTotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Xoom FE: Stupid Bugs and More Plagiarism. http:\/\/vulnfactory.org\/blog\/2012\/02\/18\/xoom-fe-stupid-bugs-and-more-plagiarism\/.  Xoom FE: Stupid Bugs and More Plagiarism. http:\/\/vulnfactory.org\/blog\/2012\/02\/18\/xoom-fe-stupid-bugs-and-more-plagiarism\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_23_1","author":"Averbuch A.","year":"2013","unstructured":"A. Averbuch , M. Kiperberg , and N. Zaidenberg . Truly-Protect: An Efficient VM-Based Software Protection. Systems Journal, IEEE , 2013 . A. Averbuch, M. Kiperberg, and N. Zaidenberg. Truly-Protect: An Efficient VM-Based Software Protection. Systems Journal, IEEE, 2013.","journal-title":"Truly-Protect: An Efficient VM-Based Software Protection. Systems Journal, IEEE"},{"key":"e_1_3_2_1_24_1","volume-title":"A Taxonomy of Obfuscating Transformations. Technical report","author":"Collberg C.","year":"1997","unstructured":"C. Collberg , C. Thomborson , and D. Low . A Taxonomy of Obfuscating Transformations. Technical report , The University of Auckland , 1997 . C. Collberg, C. Thomborson, and D. Low. A Taxonomy of Obfuscating Transformations. Technical report, The University of Auckland, 1997."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_26_1","volume-title":"Android Hacker's Handbook","author":"Drake J. J.","year":"2014","unstructured":"J. J. Drake , Z. Lanier , C. Mulliner , P. O. Fora , S. A. Ridley , and G. Wicherski . Android Hacker's Handbook . Wiley , 2014 . J. J. Drake, Z. Lanier, C. Mulliner, P. O. Fora, S. A. Ridley, and G. Wicherski. Android Hacker's Handbook. Wiley, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"Symanetic","author":"Falliere N.","year":"2011","unstructured":"N. Falliere , L. O. Murchu , and E. Chien . W32.Stuxnet Dossier. Technical report , Symanetic , 2011 . N. Falliere, L. O. Murchu, and E. Chien. W32.Stuxnet Dossier. Technical report, Symanetic, 2011."},{"key":"e_1_3_2_1_28_1","volume-title":"Blackhat EU","author":"Guido D.","year":"2012","unstructured":"D. Guido and M. Arpaia . The Mobile Exploit Intelligence Project . Blackhat EU , 2012 . D. Guido and M. Arpaia. The Mobile Exploit Intelligence Project. Blackhat EU, 2012."},{"key":"e_1_3_2_1_29_1","volume-title":"SAM","author":"Ham Y. J.","year":"2013","unstructured":"Y. J. Ham , W.-B. Choi , and H.-W. Lee . Mobile Root Exploit Detection based on System Events Extracted from Android Platform . In SAM , 2013 . Y. J. Ham, W.-B. Choi, and H.-W. Lee. Mobile Root Exploit Detection based on System Events Extracted from Android Platform. In SAM, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655583"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of USENIX Security Symposium","author":"Kruegel C.","year":"2004","unstructured":"C. Kruegel , W. Robertson , F. Valeur , and G. Vigna . Static Disassembly of Obfuscated Binaries . In Proc. of USENIX Security Symposium , 2004 . C. Kruegel, W. Robertson, F. Valeur, and G. Vigna. Static Disassembly of Obfuscated Binaries. In Proc. of USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"BADGERS","author":"Lindorfer M.","year":"2014","unstructured":"M. Lindorfer , M. Neugschwandtner , L. Weichselbaum , Y. Fratantonio , V. van der Veen, and C. Platzer. Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors . In BADGERS , 2014 . M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, and C. Platzer. Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In BADGERS, 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_34_1","unstructured":"OpenSignal. Android Fragmentation Visualized. http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/ 2015.  OpenSignal. Android Fragmentation Visualized. http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/ 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"LEET","author":"Park Y.","year":"2012","unstructured":"Y. Park , C. Lee , C. Lee , J. Lim , S. Han , M. Park , and S.-J. Cho . RGBDroid : A Novel Response-Based Approach to Android Privilege Escalation Attacks . In LEET , 2012 . Y. Park, C. Lee, C. Lee, J. Lim, S. Han, M. Park, and S.-J. Cho. RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. In LEET, 2012."},{"key":"e_1_3_2_1_36_1","volume-title":"WOOT","author":"Rolles R.","year":"2009","unstructured":"R. Rolles . Unpacking Virtualization Obfuscators . In WOOT , 2009 . R. Rolles. Unpacking Virtualization Obfuscators. In WOOT, 2009."},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS","author":"Smalley S.","year":"2013","unstructured":"S. Smalley and R. Craig . Security Enhanced (SE) Android: Bringing Flexible MAC to Android . In NDSS , 2013 . S. Smalley and R. Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS, 2013."},{"key":"e_1_3_2_1_38_1","volume-title":"Assured Information Security","author":"Torrey J. I.","year":"2015","unstructured":"J. I. Torrey . HARES: Hardened Anti-Reverse Engineering System. Technical report , Assured Information Security , Inc ., 2015 . J. I. Torrey. HARES: Hardened Anti-Reverse Engineering System. Technical report, Assured Information Security, Inc., 2015."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of USENIX Security Symposium","author":"Wang T.","year":"2014","unstructured":"T. Wang , Y. Jang , Y. Chen , S. Chung , B. Lau , and W. Lee . On the Feasibility of Large-Scale Infections of iOS Devices . In Proc. of USENIX Security Symposium , 2014 . T. Wang, Y. Jang, Y. Chen, S. Chung, B. Lau, and W. Lee. On the Feasibility of Large-Scale Infections of iOS Devices. In Proc. of USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_40_1","unstructured":"W. Xu. Ah! Universal Android Rooting is Back. Blackhat 2015.  W. Xu. Ah! Universal Android Rooting is Back. Blackhat 2015."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516664"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_44_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS , 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, 2012."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813714"}},"subtitle":["A Double-Edged Sword"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":44,"alternative-id":["10.1145\/2810103.2813714","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813714","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}