{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:33Z","timestamp":1750306173870,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978344","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"204-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["AUDACIOUS"],"prefix":"10.1145","author":[{"given":"Talia","family":"Ringer","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Dan","family":"Grossman","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"volume-title":"http:\/\/developer.android.com\/about\/dashboards\/index.html","year":"2016","key":"e_1_3_2_1_1_1","unstructured":"Android. Dashboards. http:\/\/developer.android.com\/about\/dashboards\/index.html , 2016 . Accessed : 2016-05-03. Android. Dashboards. http:\/\/developer.android.com\/about\/dashboards\/index.html, 2016. Accessed: 2016-05-03."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.69"},{"key":"e_1_3_2_1_3_1","volume-title":"20th USENIX Conference on Security","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight provenance for smart phone operating systems . In 20th USENIX Conference on Security , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In 20th USENIX Conference on Security, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"9th USENIX Conference on Operating Systems Design and Implementation","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In 9th USENIX Conference on Operating Systems Design and Implementation , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In 9th USENIX Conference on Operating Systems Design and Implementation, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_3_2_1_6_1","volume-title":"Dec.","author":"Federal Trade Commission","year":"2013","unstructured":"Federal Trade Commission . Android flashlight app developer settles FTC charges it deceived consumers , Dec. 2013 . https:\/\/www.ftc.gov\/news-events\/press-releases\/2013\/12\/android-flashlight-app-developer-settles-ftc-charges-it-deceived. Federal Trade Commission. Android flashlight app developer settles FTC charges it deceived consumers, Dec. 2013. https:\/\/www.ftc.gov\/news-events\/press-releases\/2013\/12\/android-flashlight-app-developer-settles-ftc-charges-it-deceived."},{"key":"e_1_3_2_1_7_1","volume-title":"7th USENIX Workshop on Hot Topics in Security","author":"Felt A. P.","year":"2012","unstructured":"A. P. Felt , S. Egelman , M. Finifter , D. Akhawe , and D. Wagner . How to ask for permission . In 7th USENIX Workshop on Hot Topics in Security , 2012 . A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner. How to ask for permission. In 7th USENIX Workshop on Hot Topics in Security, 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_10_1","volume-title":"24th USENIX Security Symposium","author":"Huang J.","year":"2015","unstructured":"J. Huang , Z. Li , X. Xiao , Z. Wu , K. Lu , X. Zhang , and G. Jiang . Supor: Precise and scalable sensitive user input detection for Android apps . In 24th USENIX Security Symposium , 2015 . J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, and G. Jiang. Supor: Precise and scalable sensitive user input detection for Android apps. In 24th USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_1_12_1","volume-title":"21st USENIX Security Symposium","author":"Huang L.-S.","year":"2012","unstructured":"L.-S. Huang , A. Moshchuk , H. J. Wang , S. Schecter , and C. Jackson . Clickjacking: Attacks and defenses . In 21st USENIX Security Symposium , 2012 . L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schecter, and C. Jackson. Clickjacking: Attacks and defenses. In 21st USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23076"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046623"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635878"},{"key":"e_1_3_2_1_16_1","volume-title":"Checking interaction-based declassification policies for android using symbolic execution. CoRR, abs\/1504.03711","author":"Micinski K. K.","year":"2015","unstructured":"K. K. Micinski , J. Fetter-Degges , J. Jeon , J. S. Foster , and M. R. Clarkson . Checking interaction-based declassification policies for android using symbolic execution. CoRR, abs\/1504.03711 , 2015 . K. K. Micinski, J. Fetter-Degges, J. Jeon, J. S. Foster, and M. R. Clarkson. Checking interaction-based declassification policies for android using symbolic execution. CoRR, abs\/1504.03711, 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Onarlioglu K.","year":"2016","unstructured":"K. Onarlioglu , W. Robertson , and E. Kirda . Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) , 2016 . K. Onarlioglu, W. Robertson, and E. Kirda. Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 2016."},{"key":"e_1_3_2_1_19_1","unstructured":"Panda Security. Tapjacking - when the danger camouflages itself on google play. http:\/\/www.pandasecurity.com\/mediacenter\/tips\/13973\/ 2015.  Panda Security. Tapjacking - when the danger camouflages itself on google play. http:\/\/www.pandasecurity.com\/mediacenter\/tips\/13973\/ 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"22nd USENIX Conference on Security","author":"Pandita R.","year":"2013","unstructured":"R. Pandita , X. Xiao , W. Yang , W. Enck , and T. Xie . Whyper: Towards automating risk assessment of mobile applications . In 22nd USENIX Conference on Security , 2013 . R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. Whyper: Towards automating risk assessment of mobile applications. In 22nd USENIX Conference on Security, 2013."},{"key":"e_1_3_2_1_21_1","unstructured":"Y. Qiu. Tapjacking: An untapped threat in android. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tapjacking-an-untapped-threat-in-android\/ 2012.  Y. Qiu. Tapjacking: An untapped threat in android. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tapjacking-an-untapped-threat-in-android\/ 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_23_1","volume-title":"Securing Embedded User Interfaces: Android and Beyond. In 22nd USENIX Security Symposium","author":"Roesner F.","year":"2013","unstructured":"F. Roesner and T. Kohno . Securing Embedded User Interfaces: Android and Beyond. In 22nd USENIX Security Symposium , 2013 . F. Roesner and T. Kohno. Securing Embedded User Interfaces: Android and Beyond. In 22nd USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.66"},{"key":"e_1_3_2_1_26_1","volume-title":"Design of the EROS Trusted Window System. In USENIX Security Symposium","author":"Shapiro J. S.","year":"2004","unstructured":"J. S. Shapiro , J. Vanderburgh , E. Northup , and D. Chizmadia . Design of the EROS Trusted Window System. In USENIX Security Symposium , 2004 . J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia. Design of the EROS Trusted Window System. In USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151033"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Workshop on Hot Topics in Security","author":"Wang H. J.","year":"2009","unstructured":"H. J. Wang , A. Moshchuk , and A. Bush . Convergence of Desktop and Web Applications on a Multi-Service OS . In USENIX Workshop on Hot Topics in Security , 2009 . H. J. Wang, A. Moshchuk, and A. Bush. Convergence of Desktop and Web Applications on a Multi-Service OS. In USENIX Workshop on Hot Topics in Security, 2009."},{"key":"e_1_3_2_1_29_1","volume-title":"22nd USENIX Conference on Security","author":"Wang T.","year":"2013","unstructured":"T. Wang , K. Lu , L. Lu , S. Chung , and W. Lee . Jekyll on ios: When benign apps become evil . In 22nd USENIX Conference on Security , 2013 . T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on ios: When benign apps become evil. In 22nd USENIX Conference on Security, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_31_1","volume-title":"24th USENIX Security Symposium","author":"Wijesekera P.","year":"2015","unstructured":"P. Wijesekera , A. Baokar , A. Hosseini , S. Egelman , D. Wagner , and K. Beznosov . Android permissions remystified: A field study on contextual integrity . In 24th USENIX Security Symposium , 2015 . P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818793"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978344"}},"subtitle":["User-Driven Access Control with Unmodified Operating Systems"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":34,"alternative-id":["10.1145\/2976749.2978344","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978344","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}