{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:13Z","timestamp":1763507713811,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978320","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1663-1674","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Android ION Hazard"],"prefix":"10.1145","author":[{"given":"Hang","family":"Zhang","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Dongdong","family":"She","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/sites.google.com\/a\/androidionhackdemo.net\/androidionhackdemo\/.  https:\/\/sites.google.com\/a\/androidionhackdemo.net\/androidionhackdemo\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Low Memory Killer. https:\/\/android.googlesource.com\/kernel\/common.git\/  Android Low Memory Killer. https:\/\/android.googlesource.com\/kernel\/common.git\/"},{"key":"e_1_3_2_1_3_1","unstructured":"\/android-3.4\/drivers\/staging\/android\/lowmemorykiller.c.  \/android-3.4\/drivers\/staging\/android\/lowmemorykiller.c."},{"key":"e_1_3_2_1_4_1","unstructured":"Android MediaServer Bug Traps Phones in Endless Reboots. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/android-mediaserver-bug-traps-phones-in-endless-reboots\/.  Android MediaServer Bug Traps Phones in Endless Reboots. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/android-mediaserver-bug-traps-phones-in-endless-reboots\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Arm TrustZone Technology. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/.  Arm TrustZone Technology. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Device Tree. https:\/\/www.kernel.org\/doc\/Documentation\/devicetree\/usage-model.txt.  Device Tree. https:\/\/www.kernel.org\/doc\/Documentation\/devicetree\/usage-model.txt."},{"key":"e_1_3_2_1_7_1","unstructured":"Integer Overflow leading to Heap Corruption while Unflattening GraphicBuffer. http:\/\/seclists.org\/fulldisclosure\/2015\/Mar\/63.  Integer Overflow leading to Heap Corruption while Unflattening GraphicBuffer. http:\/\/seclists.org\/fulldisclosure\/2015\/Mar\/63."},{"key":"e_1_3_2_1_8_1","unstructured":"STAC - Static Taint Analysis for C. http:\/\/code.google.com\/p\/tanalysis\/.  STAC - Static Taint Analysis for C. http:\/\/code.google.com\/p\/tanalysis\/."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/lwn.net\/Articles\/480055\/","author":"ION","year":"2012","unstructured":"The Android ION memory allocator. https:\/\/lwn.net\/Articles\/480055\/ , 2012 . The Android ION memory allocator. https:\/\/lwn.net\/Articles\/480055\/, 2012."},{"volume-title":"sparc32: dma_alloc_coherent must honour GFP_ZERO. https:\/\/patchwork.ozlabs.org\/patch\/386217\/","year":"2014","key":"e_1_3_2_1_10_1","unstructured":"Patch : sparc32: dma_alloc_coherent must honour GFP_ZERO. https:\/\/patchwork.ozlabs.org\/patch\/386217\/ , 2014 . Patch: sparc32: dma_alloc_coherent must honour GFP_ZERO. https:\/\/patchwork.ozlabs.org\/patch\/386217\/, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX SECURITY","author":"Aafer Y.","year":"2016","unstructured":"Y. Aafer , X. Zhang , and W. Du . Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis . In USENIX SECURITY , 2016 . Y. Aafer, X. Zhang, and W. Du. Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. In USENIX SECURITY, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"Information S&P Research","author":"A.","year":"2016","unstructured":"A. ARMANDO, A. MERLO, M. MIGLIARDI, and L. VERDERAME. Would You Mind Forking this Process? A Denial of Service Attack on Android (and Some Countermeasures) . In Information S&P Research , 2016 . A. ARMANDO, A. MERLO, M. MIGLIARDI, and L. VERDERAME. Would You Mind Forking this Process? A Denial of Service Attack on Android (and Some Countermeasures). In Information S&P Research, 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_8"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of USENIX Security","author":"Chen Q. A.","year":"2014","unstructured":"Q. A. Chen , Z. Qian , and Z. M. Mao . Peeking into Your App Without Actually Seeing It: UI State Inference and Novel Android Attacks . In Proc. of USENIX Security , 2014 . Q. A. Chen, Z. Qian, and Z. M. Mao. Peeking into Your App Without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proc. of USENIX Security, 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"User Mode Memory Page Allocation: A Silver Bullet For Memory Allocation? Technical report","author":"Douglas N.","year":"2011","unstructured":"N. Douglas . User Mode Memory Page Allocation: A Silver Bullet For Memory Allocation? Technical report , 2011 . N. Douglas. User Mode Memory Page Allocation: A Silver Bullet For Memory Allocation? Technical report, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_19_1","volume-title":"NDSS","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In NDSS , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In NDSS, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813606"},{"key":"e_1_3_2_1_21_1","volume-title":"Oakland","author":"Lee S.","year":"2014","unstructured":"S. Lee , Y. Kim , J. Kim , and J. Kim . Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities . In Oakland , 2014 . S. Lee, Y. Kim, J. Kim, and J. Kim. Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. In Oakland, 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_24_1","unstructured":"M. Nazarewicz. A Deep Dive into CMA. https:\/\/lwn.net\/Articles\/486301\/.  M. Nazarewicz. A Deep Dive into CMA. https:\/\/lwn.net\/Articles\/486301\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813650"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23046"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"e_1_3_2_1_30_1","volume-title":"Oakland","author":"Zhou X.","year":"2014","unstructured":"X. Zhou , Y. Lee , N. Zhang , M. Naveed , and X. Wang . The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations . In Oakland , 2014 . X. Zhou, Y. Lee, N. Zhang, M. Naveed, and X. Wang. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. In Oakland, 2014."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:17Z","timestamp":1750222577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978320"}},"subtitle":["the Curse of Customizable Memory Management System"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":30,"alternative-id":["10.1145\/2976749.2978320","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978320","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}