{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:47Z","timestamp":1761611387124,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818005","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"181-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["AuDroid"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Petracca","sequence":"first","affiliation":[{"name":"Dept. of Computer Science and Engineering, The Pennsylvania State University"}]},{"given":"Yuqiong","family":"Sun","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, The Pennsylvania State University"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, The Pennsylvania State University"}]},{"given":"Ahmad","family":"Atamli","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science, University of Oxford"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. Heuser A. Nadkarni W. Enck and A. Sadeghi. ASM: A Programmable Interface for Extending Android Security USENIX Security'14.   S. Heuser A. Nadkarni W. Enck and A. Sadeghi. ASM: A Programmable Interface for Extending Android Security USENIX Security'14."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664265"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660295"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_1_7_1","volume-title":"Intel","author":"Li X.F.","year":"2011","unstructured":"X.F. Li . AWS : Android Workload Suite for User Interaction Measurement , Intel , 2011 . X.F. Li. AWS: Android Workload Suite for User Interaction Measurement, Intel, 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"Georgia Tech","author":"Chayong L.","year":"2012","unstructured":"L. Chayong , K. Euna , and K. Hyesoon . The AM-Bench: An Android Multimedia Benchmark Suite , Georgia Tech , 2012 . L. Chayong, K. Euna, and K. Hyesoon. The AM-Bench: An Android Multimedia Benchmark Suite, Georgia Tech, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2124400"},{"key":"e_1_3_2_1_10_1","unstructured":"A. Bianchi J. Corbetta L. Invernizzi Y. Frantantonio C. Kruegel and G. Vigna. What the App is That? Deception and Countermeasures in the Android User Interface Oakland'15.  A. Bianchi J. Corbetta L. Invernizzi Y. Frantantonio C. Kruegel and G. Vigna. What the App is That? Deception and Countermeasures in the Android User Interface Oakland'15."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_12_1","volume-title":"MITRE","author":"Biba K.J.","year":"1977","unstructured":"K.J. Biba . Integrity Considerations for Secure Computer Systems , MITRE , 1977 . K.J. Biba. Integrity Considerations for Secure Computer Systems, MITRE, 1977."},{"key":"e_1_3_2_1_13_1","volume-title":"Secure Computer System: Unified Exposition and Multics Interpretation. Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC)","author":"Bell D.E.","year":"1976","unstructured":"D.E. Bell and L.J. LaPadula . Secure Computer System: Unified Exposition and Multics Interpretation. Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC) , 1976 . D.E. Bell and L.J. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), 1976."},{"volume-title":"NDSS'11","author":"Schlegel R.","key":"e_1_3_2_1_14_1","unstructured":"R. Schlegel , K. Zhang , X.Y. Zhou , M. Intwala , A. Kapadia , and X. Wang . Soundcomber: A stealthy and context-aware sound trojan for smartphones . NDSS'11 . R. Schlegel, K. Zhang, X.Y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. NDSS'11."},{"key":"e_1_3_2_1_15_1","unstructured":"Trusted Computer System Evaluation Criteria (Orange Book). NCSC 1985.  Trusted Computer System Evaluation Criteria (Orange Book). NCSC 1985."},{"key":"e_1_3_2_1_16_1","unstructured":"Android Accessibility - TalkBack. http:\/\/developer.android.com\/design\/patterns\/acces-sibility.html  Android Accessibility - TalkBack. http:\/\/developer.android.com\/design\/patterns\/acces-sibility.html"},{"key":"e_1_3_2_1_17_1","unstructured":"Android Accessibility - TextToSpeech. http:\/\/developer.android.com\/reference\/android\/speech\/tts\/TextToSpeech.html  Android Accessibility - TextToSpeech. http:\/\/developer.android.com\/reference\/android\/speech\/tts\/TextToSpeech.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Security Enhancements for Android. http:\/\/selinuxproject.org\/page\/NB_SEforAndroid_1  Security Enhancements for Android. http:\/\/selinuxproject.org\/page\/NB_SEforAndroid_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Smartphone OS Market Share. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp  Smartphone OS Market Share. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp"},{"key":"e_1_3_2_1_20_1","unstructured":"Android 5.0 APIs. http:\/\/developer.android.com\/about\/versions\/android-5.0.html  Android 5.0 APIs. http:\/\/developer.android.com\/about\/versions\/android-5.0.html"},{"key":"e_1_3_2_1_21_1","unstructured":"Java Native Interface. http:\/\/en.wikipedia.org\/wiki\/Java_Native_Interface  Java Native Interface. http:\/\/en.wikipedia.org\/wiki\/Java_Native_Interface"},{"key":"e_1_3_2_1_22_1","unstructured":"Android Verified Boot. https:\/\/source.android.com\/devices\/tech\/security\/ve-rifiedboot\/index.html  Android Verified Boot. https:\/\/source.android.com\/devices\/tech\/security\/ve-rifiedboot\/index.html"},{"key":"e_1_3_2_1_23_1","unstructured":"Android Open Source Project. https:\/\/source.android.com\/  Android Open Source Project. https:\/\/source.android.com\/"},{"key":"e_1_3_2_1_24_1","unstructured":"What if smart devices could be hacked with just a voice? http:\/\/now.avg.com\/voice-hacking-devices\/  What if smart devices could be hacked with just a voice? http:\/\/now.avg.com\/voice-hacking-devices\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Android System Permission. http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html  Android System Permission. http:\/\/developer.android.com\/guide\/topics\/security\/permissions.html"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"J.P. Anderson. Computer Security Technology Planning Study 1972 II","DOI":"10.21236\/AD0772806"},{"volume-title":"NDSS'13","author":"Smalley S.","key":"e_1_3_2_1_28_1","unstructured":"S. Smalley and R. Craig . Security Enhanced (SE) Android: Bringing Flexible MAC to Android , NDSS'13 . S. Smalley and R. Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android, NDSS'13."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818005"}},"subtitle":["Preventing Attacks on Audio Channels in Mobile Devices"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":28,"alternative-id":["10.1145\/2818000.2818005","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818005","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}