{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:49Z","timestamp":1775913529919,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978343","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"331-342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":124,"title":["TaintART"],"prefix":"10.1145","author":[{"given":"Mingshen","family":"Sun","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Tao","family":"Wei","sequence":"additional","affiliation":[{"name":"Baidu, Inc., Beijing, China"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897927"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Security","author":"Backes M.","year":"2016","unstructured":"M. Backes , S. Bugiel , E. Derr , P. McDaniel , D. Octeau , and S. Weisgerber . On demystifying the android application framework: Re-visiting android permission specification analysis . In USENIX Security , 2016 . M. Backes, S. Bugiel, E. Derr, P. McDaniel, D. Octeau, and S. Weisgerber. On demystifying the android application framework: Re-visiting android permission specification analysis. In USENIX Security, 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_1_7_1","unstructured":"Bloomberg. Arm designs one of the world's most-used products. http:\/\/www.bloomberg.com\/bw\/articles\/2014-02-04\/arm-chips-are-the-most-used-consumer-product-dot-where-s-the-money.  Bloomberg. Arm designs one of the world's most-used products. http:\/\/www.bloomberg.com\/bw\/articles\/2014-02-04\/arm-chips-are-the-most-used-consumer-product-dot-where-s-the-money."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A.-R. Sadeghi . Flexible and fine-grained mandatory access control on android for diverse security and privacy policies . In USENIX Security , 2013 . S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In USENIX Security, 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.16"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security","author":"Chen J.","year":"2015","unstructured":"J. Chen , H. Chen , E. Bauman , Z. Lin , B. Zang , and H. Guan . You shouldn't collect my secrets: Thwarting sensitive keystroke leakage in mobile ime apps . In USENIX Security , 2015 . J. Chen, H. Chen, E. Bauman, Z. Lin, B. Zang, and H. Guan. You shouldn't collect my secrets: Thwarting sensitive keystroke leakage in mobile ime apps. In USENIX Security, 2015."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security","author":"Chen Q. A.","year":"2014","unstructured":"Q. A. Chen , Z. Qian , and Z. M. Mao . Peeking into your app without actually seeing it: Ui state inference and novel android attacks . In USENIX Security , 2014 . Q. A. Chen, Z. Qian, and Z. M. Mao. Peeking into your app without actually seeing it: Ui state inference and novel android attacks. In USENIX Security, 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Workshop on Innovations in Mobile Privacy and Security","author":"Costamagna V.","year":"2016","unstructured":"V. Costamagna and C. Zheng . Artdroid: Simple and easy to use library to intercept virtual-method calls under the android art runtime . In Proceedings of the Workshop on Innovations in Mobile Privacy and Security , 2016 . V. Costamagna and C. Zheng. Artdroid: Simple and easy to use library to intercept virtual-method calls under the android art runtime. In Proceedings of the Workshop on Innovations in Mobile Privacy and Security, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382290"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In USENIX Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security, 2011."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security","author":"Feng H.","year":"2015","unstructured":"H. Feng , K. Fawaz , and K. G. Shin . Linkdroid: reducing unregulated aggregation of app usage behaviors . In USENIX Security , 2015 . H. Feng, K. Fawaz, and K. G. Shin. Linkdroid: reducing unregulated aggregation of app usage behaviors. In USENIX Security, 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"Wala--the tj watson libraries for analysis","author":"Fink S.","year":"2012","unstructured":"S. Fink and J. Dolby . Wala--the tj watson libraries for analysis , 2012 . S. Fink and J. Dolby. Wala--the tj watson libraries for analysis, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. Android dashboards. https:\/\/developer.android.com\/about\/dashboards\/index.html.  Google. Android dashboards. https:\/\/developer.android.com\/about\/dashboards\/index.html."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. Dalvik jit. http:\/\/android-developers.blogspot.hk\/2010\/05\/dalvik-jit.html.  Google. Dalvik jit. http:\/\/android-developers.blogspot.hk\/2010\/05\/dalvik-jit.html."},{"key":"e_1_3_2_1_26_1","unstructured":"Google. Ui\/application exerciser monkey. https:\/\/developer.android.com\/studio\/test\/monkey.html.  Google. Ui\/application exerciser monkey. https:\/\/developer.android.com\/studio\/test\/monkey.html."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_28_1","volume-title":"NDSS","author":"Grace M. C.","year":"2012","unstructured":"M. C. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In NDSS , 2012 . M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012."},{"key":"e_1_3_2_1_29_1","unstructured":"gsbabil. Antitaintdroid.  gsbabil. Antitaintdroid."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484317"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security","author":"Heuser S.","year":"2014","unstructured":"S. Heuser , A. Nadkarni , W. Enck , and A.-R. Sadeghi . Asm : A programmable interface for extending android security . In USENIX Security , 2014 . S. Heuser, A. Nadkarni, W. Enck, and A.-R. Sadeghi. Asm: A programmable interface for extending android security. In USENIX Security, 2014."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813606"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366457"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security","author":"Kirat D.","year":"2014","unstructured":"D. Kirat , G. Vigna , and C. Kruegel . Barecloud: bare-metal analysis-based evasive malware detection . In USENIX Security , 2014 . D. Kirat, G. Vigna, and C. Kruegel. Barecloud: bare-metal analysis-based evasive malware detection. In USENIX Security, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23353"},{"key":"e_1_3_2_1_39_1","unstructured":"Pendragon Software Corporation. CaffeineMark 3.0. http:\/\/www.benchmarkhq.ru\/cm30\/.  Pendragon Software Corporation. CaffeineMark 3.0. http:\/\/www.benchmarkhq.ru\/cm30\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.30"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security","author":"Ren C.","year":"2015","unstructured":"C. Ren , Y. Zhang , H. Xue , T. Wei , and P. Liu . Towards discovering and understanding task hijacking in android . In USENIX Security , 2015 . C. Ren, Y. Zhang, H. Xue, T. Wei, and P. Liu. Towards discovering and understanding task hijacking in android. In USENIX Security, 2015."},{"key":"e_1_3_2_1_45_1","volume-title":"SECRYPT","author":"Sarwar G.","year":"2013","unstructured":"G. Sarwar , O. Mehani , R. Boreli , and M. A. Kaafar . On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices . In SECRYPT , 2013 . G. Sarwar, O. Mehani, R. Boreli, and M. A. Kaafar. On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. In SECRYPT, 2013."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23046"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766508"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_21"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664245"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23263"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23164"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.60"},{"key":"e_1_3_2_1_58_1","volume-title":"USENIX Security","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Sa\u0131di , and R. Anderson . Aurasium: Practical policy enforcement for android applications . In USENIX Security , 2012 . R. Xu, H. Sa\u0131di, and R. Anderson. Aurasium: Practical policy enforcement for android applications. In USENIX Security, 2012."},{"key":"e_1_3_2_1_59_1","volume-title":"USENIX Security","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis . In USENIX Security , 2012 . L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security, 2012."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23061"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151035"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381950"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.25"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590313"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978343"}},"subtitle":["A Practical Multi-level Information-Flow Tracking System for Android RunTime"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":66,"alternative-id":["10.1145\/2976749.2978343","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978343","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}