{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:00Z","timestamp":1750306080203,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3084041.3084066","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T12:20:18Z","timestamp":1500294018000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["TrUbi"],"prefix":"10.1145","author":[{"given":"Miguel B.","family":"Costa","sequence":"first","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, University of Lisbon"}]},{"given":"Nuno O.","family":"Duarte","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, University of Lisbon"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, University of Lisbon"}]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, University of Lisbon"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/developer.android.com\/guide\/topics\/admin\/device-admin.html. Accessed","author":"Android Device Administration API Overview.","year":"2017","unstructured":"Android Device Administration API Overview. http:\/\/developer.android.com\/guide\/topics\/admin\/device-admin.html. Accessed Jun 2017 . Android Device Administration API Overview. http:\/\/developer.android.com\/guide\/topics\/admin\/device-admin.html. Accessed Jun 2017."},{"volume-title":"https:\/\/www.google.com\/work\/android. Accessed","year":"2017","key":"e_1_3_2_1_2_1","unstructured":"Android for Work. https:\/\/www.google.com\/work\/android. Accessed Jun 2017 . Android for Work. https:\/\/www.google.com\/work\/android. Accessed Jun 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664265"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906390"},{"key":"e_1_3_2_1_5_1","volume-title":"Sadeghi. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In Proc. of USENIX Security","author":"Bugiel S.","year":"2013","unstructured":"S. Bugiel , S. Heuser , and A.- R. Sadeghi. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In Proc. of USENIX Security , 2013 . S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In Proc. of USENIX Security, 2013."},{"key":"e_1_3_2_1_6_1","first-page":"331","volume":"6531","author":"Conti M.","year":"2011","unstructured":"M. Conti , V. T. N. Nguyen , and B. Crispo . CRePE: Context-Related Policy Enforcement for Android. Information Security , 6531 : 331 -- 345 , 2011 . M. Conti, V. T. N. Nguyen, and B. Crispo. CRePE: Context-Related Policy Enforcement for Android. Information Security, 6531:331--345, 2011.","journal-title":"CRePE: Context-Related Policy Enforcement for Android. Information Security"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proc. of OSDI , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of OSDI, 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission Re-Delegation: Attacks and Defenses . In Proc. of USENIX Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In Proc. of USENIX Security, 2011."},{"volume-title":"https:\/\/play.google.com\/store. Accessed","year":"2017","key":"e_1_3_2_1_9_1","unstructured":"Google Play. https:\/\/play.google.com\/store. Accessed Jun 2017 . Google Play. https:\/\/play.google.com\/store. Accessed Jun 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of NDSS","author":"Grace M. C.","year":"2012","unstructured":"M. C. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proc. of NDSS , 2012 . M. C. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proc. of NDSS, 2012."},{"key":"e_1_3_2_1_11_1","volume-title":"Sadeghi. ASM: A Programmable Interface for Extending Android Security. In Proc. of USENIX Security","author":"Heuser S.","year":"2014","unstructured":"S. Heuser , A. Nadkarni , W. Enck , and A.- R. Sadeghi. ASM: A Programmable Interface for Extending Android Security. In Proc. of USENIX Security , 2014 . S. Heuser, A. Nadkarni, W. Enck, and A.-R. Sadeghi. ASM: A Programmable Interface for Extending Android Security. In Proc. of USENIX Security, 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516677"},{"key":"e_1_3_2_1_14_1","unstructured":"OMA. Enabler Release Definition for DRM V2.0.1 2008.  OMA. Enabler Release Definition for DRM V2.0.1 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920295"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.360"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/www.samsungknox.com\/en. Accessed","author":"KNOX.","year":"2017","unstructured":"Samsung KNOX. https:\/\/www.samsungknox.com\/en. Accessed Jun 2017 . Samsung KNOX. https:\/\/www.samsungknox.com\/en. Accessed Jun 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of HotOS","author":"Santos N.","year":"2015","unstructured":"N. Santos , N. O. Duarte , M. B. Costa , and P. Ferreira . A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases . In Proc. of HotOS , 2015 . N. Santos, N. O. Duarte, M. B. Costa, and P. Ferreira. A Case for Enforcing App-Specific Constraints to Mobile Devices by Using Trust Leases. In Proc. of HotOS, 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541949"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of NDSS","author":"Smalley S.","year":"2013","unstructured":"S. Smalley and R. Craig . Security Enhanced (SE) Android: Bringing Flexible MAC to Android . In Proc. of NDSS , 2013 . S. Smalley and R. Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In Proc. of NDSS, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23263"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of USENIX Security","author":"Xu R.","year":"2012","unstructured":"R. Xu , H. Sa\u00efdi , and R. Anderson . Aurasium: Practical Policy Enforcement for Android Applications . In Proc. of USENIX Security , 2012 . R. Xu, H. Sa\u00efdi, and R. Anderson. Aurasium: Practical Policy Enforcement for Android Applications. In Proc. of USENIX Security, 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698893"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"Mobihoc '17: The Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Chennai India","acronym":"Mobihoc '17"},"container-title":["Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3084041.3084066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3084041.3084066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:08Z","timestamp":1750217408000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3084041.3084066"}},"subtitle":["A System for Dynamically Constraining Mobile Devices within Restrictive Usage Scenarios"],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":27,"alternative-id":["10.1145\/3084041.3084066","10.1145\/3084041"],"URL":"https:\/\/doi.org\/10.1145\/3084041.3084066","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}