{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:20:18Z","timestamp":1772670018688,"version":"3.50.1"},"reference-count":215,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,8,13]],"date-time":"2017-08-13T00:00:00Z","timestamp":1502582400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"crossref","award":["N000141512162"],"award-info":[{"award-number":["N000141512162"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1500084"],"award-info":[{"award-number":["DGE-1500084"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"crossref","award":["DARPA-15-15-TC-FP-006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP-006"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003696","name":"Electronics and Telecommunications Research Institute","doi-asserted-by":"crossref","award":["MSIP\/IITP[B0101-15-0644]"],"award-info":[{"award-number":["MSIP\/IITP[B0101-15-0644]"]}],"id":[{"id":"10.13039\/501100003696","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2017,6,30]]},"abstract":"<jats:p>The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or fun. To mitigate these threats, numerous issue-specific solutions have been proposed. With the increasing number and complexity of security problems and solutions, we believe this is the right moment to step back and systematically re-evaluate the Android security architecture and security practices in the ecosystem. We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem. For each category, we provide a comprehensive narrative of the problem space, highlight the limitations of the proposed solutions, and identify open problems for future research. Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.<\/jats:p>","DOI":"10.1145\/2963145","type":"journal-article","created":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T14:17:46Z","timestamp":1471270666000},"page":"1-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Toward Engineering a Secure Android Ecosystem"],"prefix":"10.1145","volume":"49","author":[{"given":"Meng","family":"Xu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Yang","family":"Ji","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Ming-Wei","family":"Shih","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Kangjie","family":"Lu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Cong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Ruian","family":"Duan","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Byoungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Chenxiong","family":"Qian","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Sangho","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta GA, United States"}]}],"member":"320","published-online":{"date-parts":[[2016,8,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813648"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_2_1_4_1","unstructured":"Adobe Systems Inc. 2016. PhoneGap. (Feb. 2016). http:\/\/phonegap.com."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_2_1_6_1","first-page":"947","article-title":"On the best sensor for keystrokes inference attack on android","volume":"8","author":"Al-Haiqi Ahmed","year":"2013","unstructured":"Ahmed Al-Haiqi, Mahamod Ismail, and Rosdiadee Nordin. 2013. On the best sensor for keystrokes inference attack on android. Procedia Technology 8 (2013), 947--953.","journal-title":"Procedia Technology"},{"key":"e_1_2_1_7_1","volume-title":"Machine Learning-Based Malware Detection for Android Applications: History Matters&excl","author":"Allix Kevin","unstructured":"Kevin Allix, Tegawend\u00e9 Fran\u00e7ois D. Assise Bissyande, Jacques Klein, and Yves Le Traon. 2014. Machine Learning-Based Malware Detection for Android Applications: History Matters&excl; Technical Report. University of Luxembourg."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"e_1_2_1_9_1","unstructured":"Android Developers. 2016a. Android\u2014AccessibilityService. (Feb. 2016). http:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityService.html."},{"key":"e_1_2_1_10_1","volume-title":"Android Security Overview. (Feb","author":"Developers Android","year":"2016","unstructured":"Android Developers. 2016b. Android Security Overview. (Feb. 2016). https:\/\/source.android.com\/security."},{"key":"e_1_2_1_11_1","unstructured":"Android Developers. 2016c. WebView. (Feb. 2016). http:\/\/developer.android.com\/reference\/android\/webkit\/WebView.html."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_2_1_13_1","volume-title":"Appcelerator Titanium SDK. (Feb","author":"Appcelerator Inc. 2016.","year":"2016","unstructured":"Appcelerator Inc. 2016. Appcelerator Titanium SDK. (Feb. 2016). http:\/\/www.appcelerator.com\/titanium\/titanium-sdk."},{"key":"e_1_2_1_14_1","volume-title":"New Drive-By Download Android Malware. (Oct","author":"Apvrille Axelle","year":"2014","unstructured":"Axelle Apvrille. 2014. New Drive-By Download Android Malware. (Oct. 2014). http:\/\/blog.fortinet.com\/xbrk post\/new-drive-by-download-Android-malware."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_2_1_22_1","volume-title":"KillingInTheNameOf ashmem. (Jan","author":"AVO.","year":"2011","unstructured":"AVO. 2011. KillingInTheNameOf ashmem. (Jan. 2011). http:\/\/androidvulnerabilities.org\/vulnerabilities\/KillingInTheNameOf&percnt;5Fpsneuter&percnt;5Fashmem."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664265"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831187"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_2_1_27_1","unstructured":"Anestis Bechtsoudis. 2015. Fuzzing Objects d'ART\u2014Digging Into the New Android L Runtime Internals. (2015). https:\/\/census-labs.com\/media\/Fuzzing&percnt;5FObjects&percnt;5Fd&percnt;5FART &percnt;5Fhitbsecconf2015ams&percnt;5FWP.pdf."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671290"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808122"},{"key":"e_1_2_1_30_1","unstructured":"Sven Bugiel Lucas Davi Alexandra Dmitrienko Thomas Fischer and Ahmad-Reza Sadeghi. 2011. XmAndroid: A New ANdroid Evolution to Mitigate Privilege Escalation Attacks. Technical Report TR-2011-04. Technische Universit\u00e4t Darmstadt."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Bugiel Sven","year":"2012","unstructured":"Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. 2012. Towards taming privilege-escalation attacks on android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 19:1--19:18."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534778"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_2_1_34_1","unstructured":"Gopinath K. N. Hemant Chaskar. 2009. All You Wanted to Know About WiFi Rogue Access Points. (2009). http:\/\/www.rogueap.com\/rogue-ap-docs\/RogueAP-FAQ.pdf."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660323"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Chen Kevin Zhijie","year":"2013","unstructured":"Kevin Zhijie Chen, Noah Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Tom Magrino, Edward XueJun Wu, Martin Rinard, and Dawn Song. 2013. Contextual policy enforcement in android applications with permission event graphs. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 28:1--28:19."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671291"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251398.1251410"},{"key":"e_1_2_1_39_1","unstructured":"Eric Chien. 2011. Motivations of Recent Android Malware. Technical Report. Symantec Corporation."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_9"},{"key":"e_1_2_1_41_1","volume-title":"Rooting Android Manually. (March","author":"Choong Allen","year":"2012","unstructured":"Allen Choong. 2012. Rooting Android Manually. (March 2012). https:\/\/allencch.wordpress.com\/2012\/03\/14\/rooting-android-manually\/."},{"key":"e_1_2_1_42_1","volume-title":"Issue 166704: Security: Use a seccomp-bpf Sandbox on Android. (Dec","author":"Community Chromium Dev","year":"2012","unstructured":"Chromium Dev Community. 2012. Issue 166704: Security: Use a seccomp-bpf Sandbox on Android. (Dec. 2012). https:\/\/code.google.com\/p\/chromium\/issues\/detail?id=166704."},{"key":"e_1_2_1_43_1","unstructured":"Lucian Constantin. 2016. Malvertising Attack Silently Infects Old Android Devices with Ransomware. (2016). http:\/\/www.itworld.com\/article\/3060191\/malvertising-attack-silently-infects-old-android-devices-with-ransomware.html."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949355"},{"key":"e_1_2_1_45_1","unstructured":"Corelan Team. 2014. State of the ART: Exploring the New Android KitKat Runtime. (2014). https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-state-of-the-art-exploring-the-new-android-kitkat-runtime\/."},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the 2016 Innovations in Mobile Privacy and Security (IMPS). Springer, 24--32","author":"Costamagna Valerio","year":"2016","unstructured":"Valerio Costamagna and Cong Zheng. 2016. ARTDroid: A virtual-method hooking framework on android ART runtime. In Proceedings of the 2016 Innovations in Mobile Privacy and Security (IMPS). Springer, 24--32."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_2_1_50_1","volume-title":"Android's Update Woes. (Aug","author":"Cunningham Andrew","year":"2014","unstructured":"Andrew Cunningham. 2014. Android's Update Woes. (Aug. 2014). http:\/\/arstechnica.com\/gadgets\/2014\/08\/to-solve-androids-update-woes-google-should-look-to-the-pc\/."},{"key":"e_1_2_1_51_1","unstructured":"CyanogenMod Team. 2016. Cyanogenmod. (Feb. 2016). http:\/\/www.cyanogenmod.org."},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Davi Lucas","year":"2012","unstructured":"Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan N\u00fcrnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 18:1--18:17."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671251"},{"key":"e_1_2_1_54_1","unstructured":"Guillaume Delugre. 2011. Reverse Engineering a Qualcomm Baseband. (2011). http:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/attachments\/2022&percnt;5F11-ccc-qcombbdbg.pdf."},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 2015 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Demetriou Soteris","unstructured":"Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A. Gunter. 2015. What's in your dongle and bank account? Mandatory and discretionary protection of android external resources. In Proceedings of the 2015 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 7:1--7:15."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671293.2671309"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.114"},{"key":"e_1_2_1_58_1","volume-title":"Step in Android Application Analysis. (Nov.","author":"Desnos Anthony","year":"2012","unstructured":"Anthony Desnos and Geoffroy Gueguen. 2012. New \u201cOpen Source\u201d Step in Android Application Analysis. (Nov. 2012). https:\/\/androguard.googlecode.com\/files\/pacsec2012.pdf."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028090"},{"key":"e_1_2_1_60_1","volume-title":"Linux Local Privilege Escalation via SUID \/proc\/pid\/mem Write. (Jan","author":"Donenfeld Jason A.","year":"2012","unstructured":"Jason A. Donenfeld. 2012. Linux Local Privilege Escalation via SUID \/proc\/pid\/mem Write. (Jan. 2012). https:\/\/git.zx2c4.com\/CVE-2012-0056\/about\/."},{"key":"e_1_2_1_61_1","volume-title":"Stagefright: Scary Code in the Heart of Android. (Aug.","author":"Drake Joshua","year":"2015","unstructured":"Joshua Drake. 2015. Stagefright: Scary Code in the Heart of Android. (Aug. 2015)."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924971"},{"key":"e_1_2_1_63_1","unstructured":"Raoul Estourgie and Erik Poll. 2013. Analysis of Android Authenticators. B.S. thesis. Radboud Universiteit Nijmegen."},{"key":"e_1_2_1_64_1","volume-title":"Exploit Description Exploit:Android\/GingerBreak. (April","year":"2011","unstructured":"F-Secure. 2011a. Exploit Description Exploit:Android\/GingerBreak. (April 2011). https:\/\/www.f-secure.com\/v-descs\/exploit&percnt;5Fandroid&percnt;5Fgingerbreak.shtml."},{"key":"e_1_2_1_65_1","volume-title":"Exploit Description Exploit:Android\/Zergrush. (Oct","year":"2011","unstructured":"F-Secure. 2011b. Exploit Description Exploit:Android\/Zergrush. (Oct. 2011). https:\/\/www.f-secure.com\/v-descs\/exploit&percnt;5Fandroid&percnt;5Fzergrush.shtml."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372387.2372394"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028089"},{"key":"e_1_2_1_72_1","volume-title":"Google Fixes Sandbox Escape in Chrome. (May","author":"Fisher Dennis","year":"2015","unstructured":"Dennis Fisher. 2015. Google Fixes Sandbox Escape in Chrome. (May 2015). https:\/\/threatpost.com\/google-fixes-sandbox-escape-in-chrome\/112899\/."},{"key":"e_1_2_1_73_1","volume-title":"mempodroid Details. (Aug","author":"Freeman Jay","year":"2012","unstructured":"Jay Freeman. 2012. mempodroid Details. (Aug. 2012). https:\/\/github.com\/saurik\/mempodroid."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.29"},{"key":"e_1_2_1_75_1","volume-title":"towelroot by geohot. (June","year":"2014","unstructured":"geohot. 2014. towelroot by geohot. (June 2014). https:\/\/towelroot.com\/."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_2_1_77_1","volume-title":"ART and Dalvik. (Feb","author":"Google Inc. 2016c.","year":"2016","unstructured":"Google Inc. 2016c. ART and Dalvik. (Feb. 2016). https:\/\/source.android.com\/devices\/tech\/dalvik."},{"key":"e_1_2_1_78_1","unstructured":"Google Inc. 2016a. Brillo. (Feb. 2016). https:\/\/developers.google.com\/brillo."},{"key":"e_1_2_1_79_1","volume-title":"Chrome Extension\u2014Declare Permissions. (Feb","author":"Google Inc. 2016b.","year":"2016","unstructured":"Google Inc. 2016b. Chrome Extension\u2014Declare Permissions. (Feb. 2016). https:\/\/developer.chrome.com\/extensions\/declare&percnt;5Fpermissions."},{"key":"e_1_2_1_80_1","unstructured":"Google Inc. 2016d. Codenames Tags and Build Numbers. (Feb. 2016). https:\/\/source.android.com\/source\/build-numbers.html."},{"key":"e_1_2_1_81_1","volume-title":"Put Android to work. (Feb","author":"Google Inc. 2016e.","year":"2016","unstructured":"Google Inc. 2016e. Put Android to work. (Feb. 2016). https:\/\/www.android.com\/work."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Grace Michael","year":"2012","unstructured":"Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 20:1--20:15."},{"key":"e_1_2_1_85_1","unstructured":"Lion Gu. 2014. The Mobile Cybercriminal Underground Market in China. Technical Report. Trend Micro."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671289"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_2_1_91_1","volume-title":"HTCDev Unlock Bootloader. (Feb","author":"HTC Corporation","year":"2016","unstructured":"HTC Corporation. 2016. HTCDev Unlock Bootloader. (Feb. 2016). http:\/\/www.htcdev.com\/bootloader."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_2_1_94_1","volume-title":"Intel Identity Protection Technology. (Feb","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation. 2016. Intel Identity Protection Technology. (Feb. 2016). http:\/\/ipt.intel.com."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660295"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_43"},{"key":"e_1_2_1_98_1","volume-title":"Droidpak: A Sneak Attack on Android Devices via PC Malware. (Feb.","author":"Kassner Michael","year":"2014","unstructured":"Michael Kassner. 2014. Droidpak: A Sneak Attack on Android Devices via PC Malware. (Feb. 2014). http:\/\/www.techrepublic.com\/blog\/it-security\/droidpak-a-sneak-attack-on-android-devices-via-pc-malware\/."},{"key":"e_1_2_1_99_1","volume-title":"Creating Better User Experiences on Google Play. (March","author":"Kim Eunice","year":"2015","unstructured":"Eunice Kim. 2015. Creating Better User Experiences on Google Play. (March 2015). http:\/\/android-developers.blogspot.com\/2015\/03\/creating-better-user-experiences-on.html."},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 2015 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Kimberly Tam","year":"2015","unstructured":"Tam Kimberly, J. Khan Salahuddin, Fattori Aristide, and Cavallaro Lorenzo. 2015. CopperDroid: Automatic reconstruction of android malware behaviors. In Proceedings of the 2015 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 9:1--9:15."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671244"},{"key":"e_1_2_1_102_1","volume-title":"International Journal of Computer Science and Mobile Computing 4 (May","author":"Kumar Krishan","year":"2015","unstructured":"Krishan Kumar and Prabhpreet Kaur. 2015. Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number. International Journal of Computer Science and Mobile Computing 4 (May 2015), 527--533."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924959"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685061"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2731186.2731198"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.20"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_4"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534777"},{"key":"e_1_2_1_110_1","volume-title":"Security Alert: Hacked Websites Serve Suspicious Android Apps (NotCompatible). (May","author":"Lookout","year":"2012","unstructured":"Lookout, Inc. 2012a. Security Alert: Hacked Websites Serve Suspicious Android Apps (NotCompatible). (May 2012). https:\/\/blog.lookout.com\/blog\/2012\/05\/02\/security-alert-hacked-websites-serve-suspicious-Android-apps-noncompatible."},{"key":"e_1_2_1_111_1","unstructured":"Lookout Inc. 2012b. State of Mobile Security 2012. Technical Report. Lookout Inc."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046762"},{"key":"e_1_2_1_115_1","volume-title":"Android: Practical Security from the Ground Up. (Oct.","author":"Ludwig Adrian","year":"2013","unstructured":"Adrian Ludwig. 2013. Android: Practical Security from the Ground Up. (Oct. 2013). https:\/\/docs.google.com\/presentation\/d\/1YDYUrD22Xq12nKkhBfwoJBfw2Q-OReMr0BrDfHyfyPw."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076781"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_15"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635896"},{"key":"e_1_2_1_119_1","unstructured":"Claudio Marforio Aur\u00e9lien Francillon Srdjan Capkun. 2011. Application Collusion Attack on the Permission-Based Security Model and Its Implications for Modern Smartphone Systems. Technical Report. ETH Zurich."},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"e_1_2_1_121_1","volume-title":"Exploring the NFC attack surface. (Aug","author":"Miller Charlie","year":"2012","unstructured":"Charlie Miller. 2012. Exploring the NFC attack surface. (Aug. 2012)."},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"e_1_2_1_124_1","unstructured":"Adwait Pravin Nadkarni. 2012. Workflow Based Information Flow Control (IFC) in Modern Operating Systems. (2012)."},{"key":"e_1_2_1_125_1","volume-title":"Android Drive-by Download Attack via Phishing SMS. (Feb","author":"Naraine Ryan","year":"2012","unstructured":"Ryan Naraine. 2012. Android Drive-by Download Attack via Phishing SMS. (Feb. 2012). http:\/\/www.zdnet.com\/blog\/security\/Android-drive-by-download-attack-via-phishing-sms\/10422."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_2_1_127_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Naveed Muhammad","unstructured":"Muhammad Naveed, Xiaoyong Zhou, Soteris Demetriou, XiaoFeng Wang, and Carl A. Gunter. 2014. Inside job: Understanding and mitigating the threat of external device mis-bonding on android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 15:1--15:14."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534813"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_2_1_130_1","unstructured":"Open Source Security Inc. 2016. grsecurity features. (Feb. 2016). https:\/\/grsecurity.net\/features.php."},{"key":"e_1_2_1_131_1","volume-title":"Android Fragmentation Report. (Aug","author":"OpenSignal Inc. 2015.","year":"2015","unstructured":"OpenSignal Inc. 2015. Android Fragmentation Report. (Aug. 2015). http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation."},{"key":"e_1_2_1_132_1","unstructured":"Dan Page. 2005. Partitioned Cache Architecture as a Side-Channel Defence Mechanism. (2005). http:\/\/eprint.iacr.org\/2005\/280."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534812"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_2"},{"key":"e_1_2_1_136_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Poeplau Sebastian","year":"2014","unstructured":"Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, and Giovanni Vigna. 2014. Execute this&excl; Analyzing unsafe and malicious dynamic code loading in android applications. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 46:1--46:16."},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Rajab Moheeb Abu","year":"2013","unstructured":"Moheeb Abu Rajab, Lucas Ballard, No\u00e9 Lutz, Panayiotis Mavrommatis, and Niels Provos. 2013. CAMP: Content-agnostic malware protection. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 24:1--24:17."},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23066"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_2_1_144_1","first-page":"1","article-title":"A systematic security evaluation of android's multi-user framework. In Proceedings of the Mobile Security Technologies (MoST)","volume":"9","author":"Ratazzi Paul","year":"2014","unstructured":"Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, and Wenliang Du. 2014. A systematic security evaluation of android's multi-user framework. In Proceedings of the Mobile Security Technologies (MoST). IEEE Computer Society, 9:1--9:10.","journal-title":"IEEE Computer Society"},{"key":"e_1_2_1_145_1","volume-title":"Samsung Pull Out Thread to Strangle ZigBee. (July","author":"Rockman Simon","year":"2014","unstructured":"Simon Rockman. 2014. Google Nest, ARM, Samsung Pull Out Thread to Strangle ZigBee. (July 2014). http:\/\/www.theregister.co.uk\/2014\/07\/15\/google&percnt;5Fnest&percnt;5Fthread&percnt;5Fprotocol\/."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534776"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_2_1_148_1","unstructured":"Sankardas Roy Jordan DeLoach Yuping Li Nic Herndon Doina Caragea and Xinming Ou. Experimental study with real-world data for android app security analysis using machine learning. ACM 81--90."},{"key":"e_1_2_1_149_1","volume-title":"Hiding Behind ART. (Aug","author":"Sabanal Paul","year":"2015","unstructured":"Paul Sabanal. 2015. Hiding Behind ART. (Aug. 2015)."},{"key":"e_1_2_1_150_1","volume-title":"White Paper: An Overview of Samsung KNOX 2.0. (March","author":"Electronics Samsung","year":"2014","unstructured":"Samsung Electronics. 2014. White Paper: An Overview of Samsung KNOX 2.0. (March 2014). http:\/\/www.samsung.com\/ca\/business-images\/resource\/white-paper\/2014\/03\/Samsung&percnt;5FKNOX &percnt;5Ftech&percnt;5Fwhitepaper&percnt;5FFinal&percnt;5F140220-0.pdf."},{"key":"e_1_2_1_151_1","unstructured":"Golam Sarwar Olivier Mehani Roksana Boreli and Dali Kaafar. 2013. On the Effectiveness of Dynamic Taint Analysis for Protecting Against Private Information Leaks on Android-based Devices. Technical Report. NICTA."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393666"},{"key":"e_1_2_1_153_1","first-page":"1","article-title":"Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)","volume":"1","author":"Schlegel Roman","year":"2011","unstructured":"Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, 1:1--1:17.","journal-title":"The Internet Society"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232012"},{"key":"e_1_2_1_155_1","volume-title":"Zimperlich Sources. (Feb","year":"2011","unstructured":"Sebastian. 2011. Zimperlich Sources. (Feb. 2011). http:\/\/c-skills.blogspot.com\/2011\/02\/zimperlich-sources.html."},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.163"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE Computer Society, 429--440","author":"Shauvik Roy Choudhary","year":"2015","unstructured":"Roy Choudhary Shauvik, Gorla Alessandra, and Alessandro (Alex) Orso. 2015. Automated test input generation for android: Are we there yet? In Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE Computer Society, 429--440."},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362821"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480709"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_2_1_163_1","volume-title":"Blackphone 2 and Silent OS. (Feb","author":"Circle Silent","year":"2016","unstructured":"Silent Circle. 2016. Blackphone 2 and Silent OS. (Feb. 2016). https:\/\/www.silentcircle.com."},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671254"},{"key":"e_1_2_1_165_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Smalley Stephen","year":"2013","unstructured":"Stephen Smalley and Robert Craig. 2013. Security enhanced (SE) android: Bringing flexible MAC to android. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 9:1--9:18."},{"key":"e_1_2_1_166_1","volume-title":"A Menu of Bluetooth Attacks. (July","author":"Soto Carlos A.","year":"2005","unstructured":"Carlos A. Soto. 2005. A Menu of Bluetooth Attacks. (July 2005). http:\/\/gcn.com\/articles\/2005\/07\/20\/a-menu-of-bluetooth-attacks.aspx."},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_12"},{"key":"e_1_2_1_169_1","volume-title":"Live Kernel Patching with kGraft. (Feb","author":"SUSE.","year":"2016","unstructured":"SUSE. 2016. Live Kernel Patching with kGraft. (Feb. 2016). https:\/\/www.suse.com\/promo\/kgraft.html."},{"key":"e_1_2_1_170_1","volume-title":"Threat Report","author":"Svajcer Vanja","year":"2014","unstructured":"Vanja Svajcer. 2014. Sophos Mobile Security Threat Report 2014. Technical Report. Sophos, Ltd."},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_2_1_172_1","unstructured":"Chengkai Tao. 2014. Android App Update Flaw Affects China-Based Users. Technical Report. Trendmicro."},{"key":"e_1_2_1_173_1","unstructured":"Root Genius Team. 2016. Root Genius. (Feb. 2016). http:\/\/www.shuame.com\/en\/root."},{"key":"e_1_2_1_174_1","unstructured":"The Apache Software Foundation. 2016. Apache Cordova. (Feb. 2016). http:\/\/cordova.apache.org."},{"key":"e_1_2_1_175_1","unstructured":"thesnkchrmr. 2011. RageAgainstTheCage. (March 2011). https:\/\/thesnkchrmr.wordpress.com\/2011\/03\/24\/rageagainstthecage\/."},{"key":"e_1_2_1_176_1","unstructured":"Cody Toombs. 2014. {Lollipop Feature Spotlight} WebView Is Now Unbundled From Android And Free To Auto-Update From Google Play. (Oct. 2014). http:\/\/www.androidpolice.com\/2014\/10\/19\/lollipop-feature-spotlight-webview-now-unbundled-android-free-auto-update-google-play."},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_2_1_178_1","unstructured":"Ashee Vance. 2013. Behind the'Internet of Things' Is Android and It's Everywhere. (2013). http:\/\/www.businessweek.com\/articles\/2013-05-29\/behind-the-internet-of-things-is-Android-and-its-everywhere."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435378"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_2_1_181_1","unstructured":"VirusTotal Team. 2012. VirusTotal. (Sept. 2012). https:\/\/www.virustotal.com\/en\/documentation\/."},{"key":"e_1_2_1_182_1","unstructured":"vuldb.com. 2013. Google Android 4.0 debug mode \/data\/local.prop privilege escalation. (June 2013). https:\/\/vuldb.com\/?id.9059."},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831166"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"e_1_2_1_185_1","volume-title":"Proceedings of the 11th ACM Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 241--255","author":"Watanabe Takuya","year":"2015","unstructured":"Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori. 2015. Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps. In Proceedings of the 11th ACM Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 241--255."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818793"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372399.2372402"},{"key":"e_1_2_1_189_1","volume-title":"Tizen Content Scanning and App Obfuscation. (June","author":"Willis Nathan","year":"2013","unstructured":"Nathan Willis. 2013. Tizen Content Scanning and App Obfuscation. (June 2013). http:\/\/lwn.net\/Articles\/553676."},{"key":"e_1_2_1_190_1","volume-title":"Wong and David Lie","author":"Michelle","year":"2016","unstructured":"Michelle Y. Wong and David Lie. 2016. IntelliDroid: A targeted input generator for the dynamic analysis of android malware In Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, CA, 54:1--54:15."},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509552"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766510"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.32"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514285"},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362820"},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741966"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362822"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.229"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590312"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_23"},{"key":"e_1_2_1_207_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557558"},{"key":"e_1_2_1_210_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_2_1_211_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"e_1_2_1_212_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_2_1_213_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"},{"key":"e_1_2_1_214_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"},{"key":"e_1_2_1_215_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2963145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2963145","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2963145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:07Z","timestamp":1763457907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2963145"}},"subtitle":["A Survey of Existing Techniques"],"short-title":[],"issued":{"date-parts":[[2016,8,13]]},"references-count":215,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,30]]}},"alternative-id":["10.1145\/2963145"],"URL":"https:\/\/doi.org\/10.1145\/2963145","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,13]]},"assertion":[{"value":"2015-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}