{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:06Z","timestamp":1750306086694,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Provincial Key Research and Development Program of Zhejiang, China","award":["No. 2016C01G2010916"],"award-info":[{"award-number":["No. 2016C01G2010916"]}]},{"name":"the CCF-Tencent Open Research Fund","award":["No. AGR20160109"],"award-info":[{"award-number":["No. AGR20160109"]}]},{"name":"the Fundamental Research Funds for the Central Universities, the Alibaba-Zhejiang University Joint Research Institute for Frontier Technologies (A.Z.F.T.)","award":["No. XT622017000118"],"award-info":[{"award-number":["No. XT622017000118"]}]},{"name":"the project of Core Electronic Devices, High-end Generic Chips and Basic Software","award":["No. 2012ZX01039-004"],"award-info":[{"award-number":["No. 2012ZX01039-004"]}]},{"name":"the National Natural Science Foundation of China","award":["No. 61303057"],"award-info":[{"award-number":["No. 61303057"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3117768","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"920-925","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["LaChouTi: kernel vulnerability responding framework for the fragmented Android devices"],"prefix":"10.1145","author":[{"given":"Jingzheng","family":"Wu","sequence":"first","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Mutian","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813648"},{"key":"e_1_3_2_1_2_1","volume-title":"Welcome to the Android Open Source Project!","author":"Android","year":"2017","unstructured":"Android . 2017. Welcome to the Android Open Source Project! ( 2017 ). http: \/\/source.android.com Android. 2017. Welcome to the Android Open Source Project! (2017). http: \/\/source.android.com"},{"key":"e_1_3_2_1_3_1","unstructured":"Daniel Arp Michael Spreitzenbarth Malte Hubner Hugo Gascon and Konrad Rieck. {n. d.}. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS\u201914.  Daniel Arp Michael Spreitzenbarth Malte Hubner Hugo Gascon and Konrad Rieck. {n. d.}. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS\u201914."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714626"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_6_1","unstructured":"Sven Bugiel Lucas Davi Alexandra Dmitrienko Thomas Fischer Ahmad-Reza Sadeghi and Bhargava Shastry. {n. d.}. Towards Taming Privilege-Escalation Attacks on Android. In NDSS\u201912.  Sven Bugiel Lucas Davi Alexandra Dmitrienko Thomas Fischer Ahmad-Reza Sadeghi and Bhargava Shastry. {n. d.}. Towards Taming Privilege-Escalation Attacks on Android. In NDSS\u201912."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_8_1","unstructured":"Sven Bugiel Stephan Heuser and Ahmad-Reza Sadeghi. {n. d.}. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In SEC\u201913. 131\u2013146.   Sven Bugiel Stephan Heuser and Ahmad-Reza Sadeghi. {n. d.}. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In SEC\u201913. 131\u2013146."},{"key":"e_1_3_2_1_9_1","unstructured":"William Enck Damien Octeau Patrick McDaniel and Swarat Chaudhuri. {n. d.}. A Study of Android Application Security. In SEC\u201911. 21\u201321.   William Enck Damien Octeau Patrick McDaniel and Swarat Chaudhuri. {n. d.}. A Study of Android Application Security. In SEC\u201911. 21\u201321."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813606"},{"volume-title":"Smartphone Vendor Market Share","year":"2016","key":"e_1_3_2_1_11_1","unstructured":"IDC. 2017. Smartphone Vendor Market Share , 2016 Q3. (2017). http:\/\/www.idc. com\/promo\/smartphone-market-share\/vendor IDC. 2017. Smartphone Vendor Market Share, 2016 Q3. (2017). http:\/\/www.idc. com\/promo\/smartphone-market-share\/vendor"},{"key":"e_1_3_2_1_12_1","unstructured":"Vasileios P. Kemerlis Michalis Polychronakis and Angelos D. Keromytis. {n. d.}. ret2dir: Rethinking Kernel Isolation. In SEC\u201914. 957\u2013972.   Vasileios P. Kemerlis Michalis Polychronakis and Angelos D. Keromytis. {n. d.}. ret2dir: Rethinking Kernel Isolation. In SEC\u201914. 957\u2013972."},{"key":"e_1_3_2_1_13_1","unstructured":"Vasileios P. Kemerlis Georgios Portokalidis and Angelos D. Keromytis. {n. d.}. kGuard: Lightweight Kernel Protection against Return-to-User Attacks. In SEC\u201912. 459\u2013474.   Vasileios P. Kemerlis Georgios Portokalidis and Angelos D. Keromytis. {n. d.}. kGuard: Lightweight Kernel Protection against Return-to-User Attacks. In SEC\u201912. 459\u2013474."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660331"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2810122"},{"key":"e_1_3_2_1_16_1","volume-title":"Android Fragmentation Visualized (August","author":"OpenSignal","year":"2015","unstructured":"OpenSignal . 2016. Android Fragmentation Visualized (August 2015 ). (2016). http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/ OpenSignal. 2016. Android Fragmentation Visualized (August 2015). (2016). http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Colin Percival. 2017. Naive differences of executable code. (2017). http:\/\/www. daemonology.net\/bsdiff\/  Colin Percival. 2017. Naive differences of executable code. (2017). http:\/\/www. daemonology.net\/bsdiff\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Chuangang Ren Yulong Zhang Hui Xue Tao Wei and Peng Liu. {n. d.}. Towards Discovering and Understanding Task Hijacking in Android. In SEC\u201915. 945\u2013959.   Chuangang Ren Yulong Zhang Hui Xue Tao Wei and Peng Liu. {n. d.}. Towards Discovering and Understanding Task Hijacking in Android. In SEC\u201915. 945\u2013959."},{"key":"e_1_3_2_1_19_1","unstructured":"Stephen Smalley and Robert Craig. {n. d.}. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS\u201913.  Stephen Smalley and Robert Craig. {n. d.}. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS\u201913."},{"key":"e_1_3_2_1_20_1","unstructured":"Ray Spencer Stephen Smalley Peter Loscocco Mike Hibler Dave Andersen and Jay Lepreau. {n. d.}. The Flask Security Architecture: System Support for Diverse Security Policies. In SEC\u201999.   Ray Spencer Stephen Smalley Peter Loscocco Mike Hibler Dave Andersen and Jay Lepreau. {n. d.}. The Flask Security Architecture: System Support for Diverse Security Policies. In SEC\u201999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808118"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.12"},{"key":"e_1_3_2_1_23_1","unstructured":"ZDNet. 2017. How to fix the latest Linux and Android zero day flaw. (2017). http:\/\/www.zdnet.com\/article\/ how-to-fix-the-latest-linux-and-android-zero-day-flaw\/  ZDNet. 2017. How to fix the latest Linux and Android zero day flaw. (2017). http:\/\/www.zdnet.com\/article\/ how-to-fix-the-latest-linux-and-android-zero-day-flaw\/"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Paderborn Germany","acronym":"ESEC\/FSE'17"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3117768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3117768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3117768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":25,"alternative-id":["10.1145\/3106237.3117768","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3117768","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}