{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:15Z","timestamp":1763507715651,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272481, 61572460"],"award-info":[{"award-number":["61272481, 61572460"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF CNS","award":["1422594,1505664"],"award-info":[{"award-number":["1422594,1505664"]}]},{"name":"National Key Research and Development Project","award":["2016YFB0800703"],"award-info":[{"award-number":["2016YFB0800703"]}]},{"name":"Reform Commission of China","award":["(2012)1424"],"award-info":[{"award-number":["(2012)1424"]}]},{"name":"National Information Security Special Projects of National Development"},{"name":"ARO W911NF-13-1-0421 (MURI)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978342","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"92-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Call Me Back!"],"prefix":"10.1145","author":[{"given":"Kai","family":"Wang","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"27\n    million doctors' mobile devices at high risk of malwaretextbar ITProPortal.com. http:\/\/goo.gl\/BJs5Mu.  27 million doctors' mobile devices at high risk of malwaretextbar ITProPortal.com. http:\/\/goo.gl\/BJs5Mu."},{"key":"e_1_3_2_1_2_1","unstructured":"Android and RTOS together: The dynamic duo for today's medical devices - embedded computing design. http:\/\/goo.gl\/StURzu.  Android and RTOS together: The dynamic duo for today's medical devices - embedded computing design. http:\/\/goo.gl\/StURzu."},{"key":"e_1_3_2_1_3_1","unstructured":"Android auto. https:\/\/www.android.com\/auto\/.  Android auto. https:\/\/www.android.com\/auto\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Android OS for smart medical equipment developing embedded medical devicestextbar hughes systique. http:\/\/goo.gl\/aO0NFk.  Android OS for smart medical equipment developing embedded medical devicestextbar hughes systique. http:\/\/goo.gl\/aO0NFk."},{"key":"e_1_3_2_1_5_1","unstructured":"Android point of saletextbar android POS restaurants cafes barstextbar tablet POS. http:\/\/www.posandro.com\/.  Android point of saletextbar android POS restaurants cafes barstextbar tablet POS. http:\/\/www.posandro.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"The best android POS of 2016textbar top ten reviews. goo.gl\/9xykVH.  The best android POS of 2016textbar top ten reviews. goo.gl\/9xykVH."},{"key":"e_1_3_2_1_7_1","unstructured":"Gartner says worldwide smartphone sales grew 9.7 percent in fourth quarter of 2015. http:\/\/goo.gl\/M0ZwSk.  Gartner says worldwide smartphone sales grew 9.7 percent in fourth quarter of 2015. http:\/\/goo.gl\/M0ZwSk."},{"key":"e_1_3_2_1_8_1","unstructured":"Google says there are now 1.4 billion active android devices worldwide. http:\/\/goo.gl\/utHxO8.  Google says there are now 1.4 billion active android devices worldwide. http:\/\/goo.gl\/utHxO8."},{"key":"e_1_3_2_1_9_1","unstructured":"Lollipop is now the most-used version of android marshmallow up to 2.3 percent. http:\/\/goo.gl\/Q598DH.  Lollipop is now the most-used version of android marshmallow up to 2.3 percent. http:\/\/goo.gl\/Q598DH."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2784768"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818033"},{"key":"e_1_3_2_1_14_1","first-page":"1037","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Chen Q. A.","year":"2014"},{"first-page":"393","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10","author":"Enck W.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"G. Gong. Fuzzing android system services by binder call to escalate privilege. https:\/\/www.blackhat.com\/us-15\/briefings.html.  G. Gong. Fuzzing android system services by binder call to escalate privilege. https:\/\/www.blackhat.com\/us-15\/briefings.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813606"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"first-page":"709","volume-title":"2015 IEEE Conference on Communications and Network Security (CNS)","author":"Kai W.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"volume-title":"Proceedings of the 14th USENIX Security Symposium.","author":"Livshits V. B.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660375"},{"first-page":"29","volume-title":"Proceedings of the 15th USENIX Conference on Hot Topics in Operating Systems, HOTOS'15","author":"Paupore J.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"S. V. President and BCG. Android OS smartphone market share worldwide 2009--2015textbar statistic. http:\/\/goo.gl\/9mI3Qw.  S. V. President and BCG. Android OS smartphone market share worldwide 2009--2015textbar statistic. http:\/\/goo.gl\/9mI3Qw."},{"first-page":"53","volume-title":"Proceedings of the Joint European Conferences on Theory and Practice of Software 17th International Conference on Compiler Construction, CC'08\/ETAPS'08","author":"Rountev A.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048145"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666626"},{"key":"e_1_3_2_1_28_1","unstructured":"R. Wilkers. Northrop to demo DARPA navigation system on android; charles volk comments. http:\/\/goo.gl\/dLmhXN.  R. Wilkers. Northrop to demo DARPA navigation system on android; charles volk comments. http:\/\/goo.gl\/dLmhXN."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461017"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978342"}},"subtitle":["Attacks on System Server and System Apps in Android through Synchronous Callback"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":30,"alternative-id":["10.1145\/2976749.2978342","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978342","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}