{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:02:08Z","timestamp":1757592128601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore National Research Foundation","award":["NRF2014NCR-NCR001-012"],"award-info":[{"award-number":["NRF2014NCR-NCR001-012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176336","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"299-306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["SCLib"],"prefix":"10.1145","author":[{"given":"Daoyuan","family":"Wu","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Yao","family":"Cheng","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, A*STAR, Singapore, Singapore"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664264"},{"key":"e_1_3_2_1_2_1","volume-title":"Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium.","author":"Backes Michael","year":"2015","unstructured":"Michael Backes , Sven Bugiel , Christian Hammer , Oliver Schranz , and Philipp Von Styp-Rekowsky . 2015 . Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium. Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp Von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Taming Privilege-Escalation Attacks on Android Proc. ISOC NDSS.","author":"Bugiel Sven","year":"2012","unstructured":"Sven Bugiel , Lucas Davi , Alexandra Dmitrienko , Thomas Fischer , Ahmad Sadeghi , and Bhargava Shastry . 2012 . Towards Taming Privilege-Escalation Attacks on Android Proc. ISOC NDSS. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad Sadeghi, and Bhargava Shastry. 2012. Towards Taming Privilege-Escalation Attacks on Android Proc. ISOC NDSS."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046624"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"volume-title":"Proc","author":"Davi Lucas","key":"e_1_3_2_1_6_1","unstructured":"Lucas Davi , Alexandra Dmitrienko , Ahmad Sadeghi , and Marcel Winandy . 2010. Privilege Escalation Attacks on Android . In Proc . Springer ISC. Lucas Davi, Alexandra Dmitrienko, Ahmad Sadeghi, and Marcel Winandy. 2010. Privilege Escalation Attacks on Android. In Proc. Springer ISC."},{"key":"e_1_3_2_1_7_1","volume-title":"QUIRE: Lightweight Provenance for Smart Phone Operating Systems Proc. USENIX Security Symposium.","author":"Dietz Michael","year":"2011","unstructured":"Michael Dietz , Shashi Shekhar , Yuliy Pisetsky , Anhei Shu , and Dan Wallach . 2011 . QUIRE: Lightweight Provenance for Smart Phone Operating Systems Proc. USENIX Security Symposium. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan Wallach. 2011. QUIRE: Lightweight Provenance for Smart Phone Operating Systems Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. USENIX Security.","author":"Felt Adrienne","year":"2011","unstructured":"Adrienne Felt , Helen Wang , Alexander Moshchuk , Steven Hanna , and Erika Chin . 2011 b. Permission Re-Delegation: Attacks and Defenses . In Proc. USENIX Security. Adrienne Felt, Helen Wang, Alexander Moshchuk, Steven Hanna, and Erika Chin. 2011 b. Permission Re-Delegation: Attacks and Defenses. In Proc. USENIX Security."},{"key":"e_1_3_2_1_11_1","unstructured":"Aleksandar Gargenta. 2013. Deep Dive into Android IPC\/Binder Framework. http:\/\/tinyurl.com\/diveIPC. (2013).  Aleksandar Gargenta. 2013. Deep Dive into Android IPC\/Binder Framework. http:\/\/tinyurl.com\/diveIPC. (2013)."},{"key":"e_1_3_2_1_12_1","volume-title":"Systematic Detection of Capability Leaks in Stock Android Smartphones Proc. NDSS.","author":"Grace Michael","year":"2012","unstructured":"Michael Grace , Yajin Zhou , Zhi Wang , and Xuxian Jiang . 2012 . Systematic Detection of Capability Leaks in Stock Android Smartphones Proc. NDSS. Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic Detection of Capability Leaks in Stock Android Smartphones Proc. NDSS."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Norm Hardy. 1988. The Confused Deputy: (or why capabilities might have been invented) ACM SIGPOS Operating Systems Review.   Norm Hardy. 1988. The Confused Deputy: (or why capabilities might have been invented) ACM SIGPOS Operating Systems Review.","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_14_1","volume-title":"Binder: Communication Mechanism of Android Processes","author":"Joonseok Ahn","year":"2012","unstructured":"Ahn Joonseok . 2012 . Binder: Communication Mechanism of Android Processes . http:\/\/tinyurl.com\/bindercomm. (2012). Ahn Joonseok. 2012. Binder: Communication Mechanism of Android Processes. http:\/\/tinyurl.com\/bindercomm. (2012)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381948"},{"key":"e_1_3_2_1_16_1","volume-title":"Stack Layout Randomization with Minimal Rewriting of Android Binaries Proc. Springer International Conference on Information Security and Cryptology (ICISC).","author":"Liang Yu","year":"2015","unstructured":"Yu Liang , Xinjie Ma , Daoyuan Wu , Xiaoxiao Tang , Debin Gao , Guojun Peng , Chunfu Jia , and Huanguo Zhang . 2015 . Stack Layout Randomization with Minimal Rewriting of Android Binaries Proc. Springer International Conference on Information Security and Cryptology (ICISC). Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, and Huanguo Zhang. 2015. Stack Layout Randomization with Minimal Rewriting of Android Binaries Proc. Springer International Conference on Information Security and Cryptology (ICISC)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420958"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.31"},{"key":"e_1_3_2_1_20_1","volume-title":"Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis Proc. USENIX Security Symposium.","author":"Octeau Damien","year":"2013","unstructured":"Damien Octeau , Patrick McDaniel , Somesh Jha , Alexandre Bartel , Eric Bodden , Jacques Klein , and Yves Le Traon . 2013 . Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis Proc. USENIX Security Symposium. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. 2013. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis Proc. USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_22_1","volume-title":"Android Binder: Android Interprocess Communication","author":"Schreiber Thorsten","year":"2012","unstructured":"Thorsten Schreiber . 2012 . Android Binder: Android Interprocess Communication . http:\/\/www.nds.rub.de\/media\/attachments\/files\/2012\/03\/binder.pdf. (2012). Thorsten Schreiber. 2012. Android Binder: Android Interprocess Communication. http:\/\/www.nds.rub.de\/media\/attachments\/files\/2012\/03\/binder.pdf. (2012)."},{"key":"e_1_3_2_1_23_1","unstructured":"Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android Proc. ISOC NDSS.  Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android Proc. ISOC NDSS."},{"key":"e_1_3_2_1_24_1","volume-title":"Chang","author":"Wu Daoyuan","year":"2014","unstructured":"Daoyuan Wu and Rocky K. C . Chang . 2014 . Analyzing Android Browser Apps for file:\/\/ Vulnerabilities Proc. Springer Information Security Conference (ISC) . Daoyuan Wu and Rocky K. C. Chang. 2014. Analyzing Android Browser Apps for file:\/\/ Vulnerabilities Proc. Springer Information Security Conference (ISC)."},{"key":"e_1_3_2_1_25_1","volume-title":"Chang","author":"Wu Daoyuan","year":"2015","unstructured":"Daoyuan Wu and Rocky K. C . Chang . 2015 . Indirect File Leaks in Mobile Applications. In Proc. IEEE Mobile Security Technologies (MoST) . Daoyuan Wu and Rocky K. C. Chang. 2015. Indirect File Leaks in Mobile Applications. In Proc. IEEE Mobile Security Technologies (MoST)."},{"key":"e_1_3_2_1_26_1","volume-title":"Deng","author":"Wu Daoyuan","year":"2018","unstructured":"Daoyuan Wu , Yao Cheng , Debin Gao , Yingjiu Li , and Robert H . Deng . 2018 . SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR Vol . abs\/1801.04372 (2018). https:\/\/arxiv.org\/abs\/1801.04372 tempurl Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, and Robert H. Deng. 2018. SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR Vol. abs\/1801.04372 (2018). https:\/\/arxiv.org\/abs\/1801.04372 tempurl"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60033-8_58"},{"key":"e_1_3_2_1_28_1","volume-title":"Chang","author":"Wu Daoyuan","year":"2014","unstructured":"Daoyuan Wu , Xiapu Luo , and Rocky K. C . Chang . 2014 . A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps. CoRR Vol . abs\/1405.6282 (2014). http:\/\/arxiv.org\/abs\/1405.6282 tempurl Daoyuan Wu, Xiapu Luo, and Rocky K. C. Chang. 2014. A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps. CoRR Vol. abs\/1405.6282 (2014). http:\/\/arxiv.org\/abs\/1405.6282 tempurl"},{"key":"e_1_3_2_1_29_1","volume-title":"Aurasium: Practical Policy Enforcement for Android Applications Proc. USENIX Security.","author":"Xu Rubin","year":"2012","unstructured":"Rubin Xu , Hassen Saidi , and Ross Anderson . 2012 . Aurasium: Practical Policy Enforcement for Android Applications Proc. USENIX Security. Rubin Xu, Hassen Saidi, and Ross Anderson. 2012. Aurasium: Practical Policy Enforcement for Android Applications Proc. USENIX Security."},{"key":"e_1_3_2_1_30_1","unstructured":"Carter Yagemann. 2016. IntentFirewall Unofficial Document. http:\/\/www.cis.syr.edu\/ wedu\/android\/IntentFirewall\/. (2016).  Carter Yagemann. 2016. IntentFirewall Unofficial Document. http:\/\/www.cis.syr.edu\/ wedu\/android\/IntentFirewall\/. (2016)."},{"volume-title":"Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook Proc. ESORICS","author":"Yagemann Carter","key":"e_1_3_2_1_31_1","unstructured":"Carter Yagemann and Wenliang Du. 2016. Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook Proc. ESORICS . Carter Yagemann and Wenliang Du. 2016. Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook Proc. ESORICS."},{"key":"e_1_3_2_1_32_1","volume-title":"AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications Proc. ISOC NDSS.","author":"Zhang Mu","year":"2014","unstructured":"Mu Zhang and Heng Yin . 2014 . AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications Proc. ISOC NDSS. Mu Zhang and Heng Yin. 2014. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications Proc. ISOC NDSS."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_34_1","volume-title":"Detecting Passive Content Leaks and Pollution in Android Applications Proc. ISOC NDSS.","author":"Zhou Yajin","year":"2013","unstructured":"Yajin Zhou and Xuxian Jiang . 2013 . Detecting Passive Content Leaks and Pollution in Android Applications Proc. ISOC NDSS. Yajin Zhou and Xuxian Jiang. 2013. Detecting Passive Content Leaks and Pollution in Android Applications Proc. ISOC NDSS."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176336"}},"subtitle":["A Practical and Lightweight Defense against Component Hijacking in Android Applications"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":34,"alternative-id":["10.1145\/3176258.3176336","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176336","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}