{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:39Z","timestamp":1750221159063,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1253346"],"award-info":[{"award-number":["CNS-1253346"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University Politehnica of Bucharest","award":["UPB-GEX2017 Ctr. No. 19\/2017"],"award-info":[{"award-number":["UPB-GEX2017 Ctr. No. 19\/2017"]}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1610299, W911NF1610127"],"award-info":[{"award-number":["W911NF1610299, W911NF1610127"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196527","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"117-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["iOracle"],"prefix":"10.1145","author":[{"given":"Luke","family":"Deshotels","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Razvan","family":"Deaconescu","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest, Bucharest, Romania"}]},{"given":"Costin","family":"Carabas","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest, Bucharest, Romania"}]},{"given":"Iulia","family":"Manda","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest, Bucharest, Romania"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Mihai","family":"Chiroiu","sequence":"additional","affiliation":[{"name":"University POLITEHNICA of Bucharest, Bucharest, Romania"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universitat Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dionysus Blazakis. 2011. The Apple Sandbox. In Blackhat DC.  Dionysus Blazakis. 2011. The Apple Sandbox. In Blackhat DC."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714629"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455818"},{"key":"e_1_3_2_1_4_1","volume-title":"Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Chen Hong","year":"2009","unstructured":"Hong Chen , Ninghui Li , and Ziqing Mao . 2009 . Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Hong Chen, Ninghui Li, and Ziqing Mao. 2009. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_6_1","unstructured":"Dino A Dai Zovi. 2011. Apple iOS 4 security evaluation. Black Hat USA.  Dino A Dai Zovi. 2011. Apple iOS 4 security evaluation. Black Hat USA."},{"key":"e_1_3_2_1_7_1","unstructured":"Lucas Davi Alexandra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones Proceedings of the Network and Distributed Systems Symposium (NDSS).  Lucas Davi Alexandra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones Proceedings of the Network and Distributed Systems Symposium (NDSS)."},{"key":"e_1_3_2_1_8_1","volume-title":"SandBlaster: Reversing the Apple Sandbox. (Aug","author":"Deaconescu Razvan","year":"2016","unstructured":"Razvan Deaconescu , Luke Deshotels , Mihai Bucicoiu , William Enck , Lucas Davi , and Ahmad-Reza Sadeghi . 2016. SandBlaster: Reversing the Apple Sandbox. (Aug .. 2016 ). https:\/\/arxiv.org\/abs\/1608.04303 arXiv: 1608.04303. Razvan Deaconescu, Luke Deshotels, Mihai Bucicoiu, William Enck, Lucas Davi, and Ahmad-Reza Sadeghi. 2016. SandBlaster: Reversing the Apple Sandbox. (Aug.. 2016). https:\/\/arxiv.org\/abs\/1608.04303 arXiv: 1608.04303."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813675"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978336"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_12_1","unstructured":"Ioannis Gasparis Zhiyun Qian Chengyu Song and Srikanth V Krishnamurthy. 2017. Detecting Android Root Exploits by Learning from Root Providers Proceedings of the USENIX Security Symposium.  Ioannis Gasparis Zhiyun Qian Chengyu Song and Srikanth V Krishnamurthy. 2017. Detecting Android Root Exploits by Learning from Root Providers Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_17"},{"key":"e_1_3_2_1_14_1","volume-title":"Comparing Mobile Privacy Protection Through Cross-Platform Applications Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Han Jin","year":"2013","unstructured":"Jin Han , Qiang Yan , Debin Gao , Jianying Zhou , and Robert Deng . 2013 b . Comparing Mobile Privacy Protection Through Cross-Platform Applications Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, and Robert Deng. 2013 b. Comparing Mobile Privacy Protection Through Cross-Platform Applications Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"volume-title":"MacOS and iOS Internals, Volume III: Security &Insecurity","author":"Levin Jonathan","key":"e_1_3_2_1_16_1","unstructured":"Jonathan Levin . 2016. MacOS and iOS Internals, Volume III: Security &Insecurity . Technologeeks Press . Jonathan Levin. 2016. MacOS and iOS Internals, Volume III: Security &Insecurity. Technologeeks Press."},{"volume-title":"iOS Hacker's Handbook","author":"Miller Charlie","key":"e_1_3_2_1_17_1","unstructured":"Charlie Miller , Dion Blazakis , Dino DaiZovi , Stefan Esser , Vincenzo Iozzo , and Ralf-Philip Weinmann . 2012. iOS Hacker's Handbook . John Wiley &Sons . Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo, and Ralf-Philip Weinmann. 2012. iOS Hacker's Handbook. John Wiley &Sons."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998454"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Ou Xinming","year":"2005","unstructured":"Xinming Ou , Sudhakar Govindavajhala , and Andrew W Appel . 2005 . MulVAL: A Logic-based Network Security Analyzer . Proceedings of the USENIX Security Symposium. Xinming Ou, Sudhakar Govindavajhala, and Andrew W Appel. 2005. MulVAL: A Logic-based Network Security Analyzer. Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455780"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_2"},{"key":"e_1_3_2_1_22_1","volume-title":"Automated Generation and Analysis of Attack Graphs Proceedigns of the IEEE Symposium on Security and Privacy.","author":"Sheyner Oleg","year":"2002","unstructured":"Oleg Sheyner , Joshua Haines , Somesh Jha , Richard Lippmann , and Jeannette M Wing . 2002 . Automated Generation and Analysis of Attack Graphs Proceedigns of the IEEE Symposium on Security and Privacy. Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M Wing. 2002. Automated Generation and Analysis of Attack Graphs Proceedigns of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_23_1","unstructured":"Stephen Smalley and Robert Craig. 2013. PSecurity Enhanced (SE) Android: Bringing Flexible MAC to Android Proceedings of the Network and Distributed Systems Security Symposium (NDSS).  Stephen Smalley and Robert Craig. 2013. PSecurity Enhanced (SE) Android: Bringing Flexible MAC to Android Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_1_25_1","unstructured":"Ruowen Wang William Enck Douglas Reeves Xinwen Zhang Peng Ning Dingbang Xu Wu Zhou and Ahmed M Azab. 2015. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-scale Semi-supervised Learning Proceedings of the USENIX Security Symposium.   Ruowen Wang William Enck Douglas Reeves Xinwen Zhang Peng Ning Dingbang Xu Wu Zhou and Ahmed M Azab. 2015. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-scale Semi-supervised Learning Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","unstructured":"Tielei Wang Yeongjin Jang Yizheng Chen Simon Chung Billy Lau and Wenke Lee. 2014. On the Feasibility of Large-Scale Infections of iOS Devices Proceedings of the USENIX Security Symposium.   Tielei Wang Yeongjin Jang Yizheng Chen Simon Chung Billy Lau and Wenke Lee. 2014. On the Feasibility of Large-Scale Infections of iOS Devices Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Wang Tielei","year":"2013","unstructured":"Tielei Wang , Kangjie Lu , Long Lu , Simon Chung , and Wenke Lee . 2013 . Jekyll on iOS: When Benign Apps Become Evil . In Proceedings of the USENIX Security Symposium. Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. 2013. Jekyll on iOS: When Benign Apps Become Evil. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408792"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484316"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813609"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196527","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196527","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196527"}},"subtitle":["Automated Evaluation of Access Control Policies in iOS"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":30,"alternative-id":["10.1145\/3196494.3196527","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196527","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}