{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:39Z","timestamp":1776333459738,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141712947"],"award-info":[{"award-number":["N000141712947"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1314688, CNS-1253346, 1409668, 1320444, 1320306"],"award-info":[{"award-number":["1314688, CNS-1253346, 1409668, 1320444, 1320306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-16-1-0127, W911NF-16-1-0299"],"award-info":[{"award-number":["W911NF-16-1-0127, W911NF-16-1-0299"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134638","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"553-565","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Analysis of SEAndroid Policies"],"prefix":"10.1145","author":[{"given":"Haining","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science, Purdue University"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University"}]},{"given":"Yousra","family":"Aafer","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/census.tsyrklevich.net\/. (-). (Accessed","year":"2017","unstructured":"https:\/\/census.tsyrklevich.net\/. (-). (Accessed June 2017 ). -. Android Census. https:\/\/census.tsyrklevich.net\/. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Android Developers Guide. https:\/\/developer.android.com\/guide\/index.html. (-). (Accessed","year":"2017","unstructured":"Android Developers Guide. https:\/\/developer.android.com\/guide\/index.html. (-). (Accessed June 2017 ). -. Android Developers Guide. https:\/\/developer.android.com\/guide\/index.html. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"audit2allow. http:\/\/linux.die.net\/man\/1\/audit2allow. (-). (Accessed June 2017).  -. audit2allow. http:\/\/linux.die.net\/man\/1\/audit2allow. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"Media Framework Hardening. https:\/\/source.android.com\/devices\/media\/framework-hardening. (-). (Accessed","year":"2017","unstructured":"Media Framework Hardening. https:\/\/source.android.com\/devices\/media\/framework-hardening. (-). (Accessed June 2017 ). -. Media Framework Hardening. https:\/\/source.android.com\/devices\/media\/framework-hardening. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/github.com\/seandroid-analytics\/seal. (-). (Accessed","year":"2017","unstructured":"https:\/\/github.com\/seandroid-analytics\/seal. (-). (Accessed June 2017 ). -. SEAL. https:\/\/github.com\/seandroid-analytics\/seal. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/github.com\/seandroid-analytics\/selint. (-). (Accessed","year":"2017","unstructured":"https:\/\/github.com\/seandroid-analytics\/selint. (-). (Accessed June 2017 ). -. SELint. https:\/\/github.com\/seandroid-analytics\/selint. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/TresysTechnology\/setools. (-). (Accessed","year":"2017","unstructured":"https:\/\/github.com\/TresysTechnology\/setools. (-). (Accessed June 2017 ). -. SETools. https:\/\/github.com\/TresysTechnology\/setools. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Aafer Yousra","year":"2016","unstructured":"Yousra Aafer , Xiao Zhang , and Wenliang Du . 2016 . Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 1153--1168. Yousra Aafer, Xiao Zhang, and Wenliang Du. 2016. Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 1153--1168."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 5th Conference on USENIX UNIX Security Symposium -","volume":"5","author":"Badger Lee","unstructured":"Lee Badger , Daniel F. Sterne , David L. Sherman , Kenneth M. Walker , and Sheila A. Haghighat . 1995. A Domain and Type Enforcement UNIX Prototype . In Proceedings of the 5th Conference on USENIX UNIX Security Symposium - Volume 5 (SSYM'95). USENIX Association, Berkeley, CA, USA, 1. Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, and Sheila A. Haghighat. 1995. A Domain and Type Enforcement UNIX Prototype. In Proceedings of the 5th Conference on USENIX UNIX Security Symposium - Volume 5 (SSYM'95). USENIX Association, Berkeley, CA, USA, 1."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2009 Network and Distributed Systems Security Symposium (NDSS'09)","author":"Chen Hong","year":"2009","unstructured":"Hong Chen , Ninghui Li , and Ziqing Mao . 2009 . Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems . In Proceedings of the 2009 Network and Distributed Systems Security Symposium (NDSS'09) . Hong Chen, Ninghui Li, and Ziqing Mao. 2009. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. In Proceedings of the 2009 Network and Distributed Systems Security Symposium (NDSS'09)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59041-7_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805874.1805982"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Jaeger Trent","year":"2003","unstructured":"Trent Jaeger , Reiner Sailer , and Xiaolan Zhang . 2003 . Analyzing Integrity Protection in the SELinux Example Policy . In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM'03). USENIX Association, Berkeley, CA, USA, 5--5. Trent Jaeger, Reiner Sailer, and Xiaolan Zhang. 2003. Analyzing Integrity Protection in the SELinux Example Policy. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM'03). USENIX Association, Berkeley, CA, USA, 5--5."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990053"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937528"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647054.715771"},{"key":"e_1_3_2_1_19_1","volume-title":"SELinux Policy Analysis Notebook (SPAN). https:\/\/github.com\/QuarkSecurity\/SPAN\/. (2017). (Accessed","year":"2017","unstructured":"QuarkSecurity. 2017. SELinux Policy Analysis Notebook (SPAN). https:\/\/github.com\/QuarkSecurity\/SPAN\/. (2017). (Accessed June 2017 ). QuarkSecurity. 2017. SELinux Policy Analysis Notebook (SPAN). https:\/\/github.com\/QuarkSecurity\/SPAN\/. (2017). (Accessed June 2017)."},{"key":"e_1_3_2_1_20_1","unstructured":"Elena Reshetova Filippo Bonazzi Thomas Nyman Ravishankar Borgaonkar and N. Asokan. 2015. Characterizing SEAndroid Policies in the Wild. CoRR abs\/1510.05497 (2015). http:\/\/arxiv.org\/abs\/1510.05497  Elena Reshetova Filippo Bonazzi Thomas Nyman Ravishankar Borgaonkar and N. Asokan. 2015. Characterizing SEAndroid Policies in the Wild. CoRR abs\/1510.05497 (2015). http:\/\/arxiv.org\/abs\/1510.05497"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_24_1","volume-title":"Security-Enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux\/. (-). (Accessed","author":"Security-Enhanced","year":"2017","unstructured":"Security-Enhanced Linux in Android -. Security-Enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux\/. (-). (Accessed June 2017 ). Security-Enhanced Linux in Android -. Security-Enhanced Linux in Android. https:\/\/source.android.com\/security\/selinux\/. (-). (Accessed June 2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Zimperium security firm. 2015. Stagefright. https:\/\/blog.zimperium.com\/stagefright-vulnerability-details-stagefright-detector-tool-released\/. (2015).  Zimperium security firm. 2015. Stagefright. https:\/\/blog.zimperium.com\/stagefright-vulnerability-details-stagefright-detector-tool-released\/. (2015)."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2006 Network and Distributed Systems Security Symposium (NDSS'06)","author":"Shankar Umesh","year":"2006","unstructured":"Umesh Shankar , Trent Jaeger , and Reiner Sailer . 2006 . Toward Automated Information-Flow Integrity Verification for Security-Critical Applications . In Proceedings of the 2006 Network and Distributed Systems Security Symposium (NDSS'06) . 267--280. Umesh Shankar, Trent Jaeger, and Reiner Sailer. 2006. Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. In Proceedings of the 2006 Network and Distributed Systems Security Symposium (NDSS'06). 267--280."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 20th Network and Distributed System Security Symposium (NDSS'13)","author":"Smalley Stephen","unstructured":"Stephen Smalley and Robert Craig . Security Enhanced (SE) Android : Bringing Flexible MAC to Android . In Proceedings of the 20th Network and Distributed System Security Symposium (NDSS'13) . 20--38. Stephen Smalley and Robert Craig. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In Proceedings of the 20th Network and Distributed System Security Symposium (NDSS'13). 20--38."},{"key":"e_1_3_2_1_28_1","volume-title":"Guided Policy Generation for Application Authors. SELinux Symposium","author":"Sniffen Brian T.","year":"2006","unstructured":"Brian T. Sniffen , David R. Harris , and John D. Ramsdell . 2006 . Guided Policy Generation for Application Authors. SELinux Symposium ( 2006 ). Brian T. Sniffen, David R. Harris, and John D. Ramsdell. 2006. Guided Policy Generation for Application Authors. SELinux Symposium (2006)."},{"key":"e_1_3_2_1_29_1","unstructured":"StatCounter. 2017. Android challenges Windows as worlds most popular operating system in terms of internet usage. http:\/\/gs.statcounter.com\/press\/android-challenges-windows-as-worlds-most-popular-operating-system. (March 2017).  StatCounter. 2017. Android challenges Windows as worlds most popular operating system in terms of internet usage. http:\/\/gs.statcounter.com\/press\/android-challenges-windows-as-worlds-most-popular-operating-system. (March 2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414500"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Wang Ruowen","unstructured":"Ruowen Wang , William Enck , Douglas Reeves , Xinwen Zhang , Peng Ning , Dingbang Xu , Wu Zhou , and Ahmed M. Azab . 2015. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-scale Semi-supervised Learning . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15) . USENIX Association, Berkeley, CA, USA, 351--366. Ruowen Wang, William Enck, Douglas Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, and Ahmed M. Azab. 2015. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-scale Semi-supervised Learning. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 351--366."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0180-7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990059"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_16"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134638","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134638"}},"subtitle":["Combining MAC and DAC in Android"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":36,"alternative-id":["10.1145\/3134600.3134638","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134638","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}