{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:30Z","timestamp":1772164050437,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T00:00:00Z","timestamp":1458864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2872362.2872403","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"713-725","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PIFT"],"prefix":"10.1145","author":[{"given":"Man-Ki","family":"Yoon","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Negin","family":"Salajegheh","sequence":"additional","affiliation":[{"name":"Qualcomm Research, Santa Clara, CA, USA"}]},{"given":"Yin","family":"Chen","sequence":"additional","affiliation":[{"name":"Qualcomm Research, Santa Clara, CA, USA"}]},{"given":"Mihai","family":"Christodorescu","sequence":"additional","affiliation":[{"name":"Qualcomm Research, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Run-time ABI for the ARM architecture. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0043d\/IHI0043D_rtabi.pdf.  Run-time ABI for the ARM architecture. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0043d\/IHI0043D_rtabi.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Bbench-gem5. http:\/\/www.m5sim.org\/BBench-gem5.  Bbench-gem5. http:\/\/www.m5sim.org\/BBench-gem5."},{"key":"e_1_3_2_1_3_1","unstructured":"Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html.  Dalvik bytecode. https:\/\/source.android.com\/devices\/tech\/dalvik\/dalvik-bytecode.html."},{"key":"e_1_3_2_1_4_1","unstructured":"DroidBench Version 1.1. http:\/\/sseblog.ec-spride.de\/tools\/droidbench\/.  DroidBench Version 1.1. http:\/\/sseblog.ec-spride.de\/tools\/droidbench\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_12_1","volume-title":"NDSS","author":"Kang M. G.","year":"2011","unstructured":"M. G. Kang , S. McCamant , P. Poosankam , and D. Song . Dta+: Dynamic taint analysis with targeted control-flow propagation. In phProceedings of the 18th Network and Distributed System Security Symposium , NDSS , 2011 . M. G. Kang, S. McCamant, P. Poosankam, and D. Song. Dta+: Dynamic taint analysis with targeted control-flow propagation. In phProceedings of the 18th Network and Distributed System Security Symposium, NDSS, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 12th Network and Distributed System Security Symposium, NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proceedings of the 12th Network and Distributed System Security Symposium, NDSS , 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th Network and Distributed System Security Symposium, NDSS, 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771782"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis . In Proceedings of the 21st USENIX Conference on Security Symposium , Security , 2012 . L. K. Yan and H. Yin. Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Conference on Security Symposium, Security, 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"}],"event":{"name":"ASPLOS '16: Architectural Support for Programming Languages and Operating Systems","location":"Atlanta Georgia USA","acronym":"ASPLOS '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:39:04Z","timestamp":1750207144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872403"}},"subtitle":["Predictive Information-Flow Tracking"],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":23,"alternative-id":["10.1145\/2872362.2872403","10.1145\/2872362"],"URL":"https:\/\/doi.org\/10.1145\/2872362.2872403","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2954679.2872403","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2980024.2872403","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}