{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:10Z","timestamp":1763507710977,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS0345, 16KIS0656"],"award-info":[{"award-number":["16KIS0345, 16KIS0656"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134064","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1037-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["The ART of App Compartmentalization"],"prefix":"10.1145","author":[{"given":"Jie","family":"Huang","sequence":"first","affiliation":[{"name":"Saarland University, SAARBR\u00dcCKEN, Germany"}]},{"given":"Oliver","family":"Schranz","sequence":"additional","affiliation":[{"name":"Saarland University, SAARBR\u00dcCKEN, Germany"}]},{"given":"Sven","family":"Bugiel","sequence":"additional","affiliation":[{"name":"Saarland University, SAARBR\u00dcCKEN, Germany"}]},{"given":"Michael","family":"Backes","sequence":"additional","affiliation":[{"name":"Saarland University, SAARBR\u00dcCKEN, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"unstructured":"2016. UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/ test\/monkey.html. (2016). Accessed: 2017-08--28.","key":"e_1_3_2_2_1_1"},{"unstructured":"2017. AdAway. https:\/\/adaway.org\/. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_2_1"},{"unstructured":"2017. AdblockBrowser. https:\/\/adblockbrowser.org\/. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_3_1"},{"unstructured":"2017. AdblockPlus. https:\/\/adblockplus.org\/. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_4_1"},{"unstructured":"2017. AdGuard. https:\/\/adguard.com\/en\/welcome.html. (2017). Accessed: 2017- 08--28.","key":"e_1_3_2_2_5_1"},{"unstructured":"2017. Google Play Services: Interstitials. https:\/\/developers.google.com\/ mobile-ads-sdk\/docs\/dfp\/android\/interstitial. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_6_1"},{"unstructured":"2017. Google Play Services: Setup. https:\/\/developers.google.com\/android\/guides\/ setup. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_7_1"},{"unstructured":"2017. Guava. https:\/\/github.com\/google\/guava. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_2_10_1","volume-title":"Boxify: Full-fledged App Sandboxing for Stock Android. In USENIX Security'15. 691--706.","author":"Backes Michael","year":"2015","unstructured":"Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android. In USENIX Security'15. 691--706."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1109\/EuroSP.2017.43"},{"volume-title":"MoST'17","author":"Backes Michael","unstructured":"Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, and Marvin Wi\u00dffeld. 2017. Seamless In-App Ad Blocking on Stock Android. In MoST'17. IEEE.","key":"e_1_3_2_2_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_2_14_1","volume-title":"Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security'14. 1021--1036.","author":"Bhoraskar Ravi","year":"2014","unstructured":"Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, and David Wetherall. 2014. Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security'14. 1021--1036."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1145\/2808117.2808122"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/3052973.3052998"},{"doi-asserted-by":"publisher","unstructured":"Benjamin Davis and Hao Chen. 2013. RetroSkeleton: retrofitting android apps. In MobiSys'13. ACM 181--192. 10.1145\/2462456.2464462","key":"e_1_3_2_2_17_1","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_2_18_1","volume-title":"Iarm-droid: A rewriting framework for in-app reference monitors for android applications. MoST'12","author":"Davis Benjamin","year":"2012","unstructured":"Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen. 2012. Iarm-droid: A rewriting framework for in-app reference monitors for android applications. MoST'12 2012, 2 (2012), 17."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.14722\/ndss.2016.23082"},{"unstructured":"Erik Derr. 2017. https:\/\/projects.cispa.uni-saarland.de\/derr\/libscout. (2017). Accessed: 2017-08--28.","key":"e_1_3_2_2_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1145\/2185448.2185464"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1145\/2897073.2897716"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/2381934.2381938"},{"doi-asserted-by":"publisher","unstructured":"Bin Liu Bin Liu Hongxia Jin and Ramesh Govindan. 2015. Efficient privilege de-escalation for ad libraries in mobile apps. In MobiSys'15. ACM 89--103. 10.1145\/2742647.2742668","key":"e_1_3_2_2_25_1","DOI":"10.1145\/2742647.2742668"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.14722\/ndss.2016.23353"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1145\/2414456.2414498"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.14722\/ndss.2014.23328"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1109\/ARES.2014.13"},{"unstructured":"Thorsten Schreiber. 2011. Android binder. http:\/\/www.nds.rub.de\/media\/ attachments\/files\/2012\/03\/binder.pdf. (2011).","key":"e_1_3_2_2_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.14722\/ndss.2016.23485"},{"key":"e_1_3_2_2_32_1","volume-title":"USENIX Security'12","volume":"2012","author":"Shekhar Shashi","year":"2012","unstructured":"Shashi Shekhar, Michael Dietz, and Dan S Wallach. 2012. AdSplit: Separating Smartphone Advertising from Applications. In USENIX Security'12, Vol. 2012."},{"key":"e_1_3_2_2_33_1","volume-title":"NDSS'13","volume":"310","author":"Smalley Stephen","year":"2013","unstructured":"Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In NDSS'13, Vol. 310. 20--38."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_2_35_1","volume-title":"MoST'12","volume":"10","author":"Stevens Ryan","year":"2012","unstructured":"Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating user privacy in android ad libraries. In MoST'12, Vol. 10."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_2_37_1","volume":"201","author":"Xu Rubin","unstructured":"Rubin Xu, Hassen Sa\u00efdi, and Ross J Anderson. 2012. Aurasium: practical policy enforcement for android applications. In USENIX Security'12, Vol. 2012.","journal-title":"Ross J Anderson."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_38_1","DOI":"10.1145\/2590296.2590314"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1145\/2523649.2523652"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_40_1","DOI":"10.1145\/2714576.2714598"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '17","name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134064"}},"subtitle":["Compiler-based Library Privilege Separation on Stock Android"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":39,"alternative-id":["10.1145\/3133956.3134064","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134064","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}