{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:30:31Z","timestamp":1774161031406,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210330","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"28-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["VButton"],"prefix":"10.1145","author":[{"given":"Wenhao","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University and Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University"}]},{"given":"Shiyu","family":"Luo","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University and Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University"}]},{"given":"Zhichuang","family":"Sun","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University and Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University"}]},{"given":"Long","family":"Lu","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University and Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University"}]},{"given":"Binyu","family":"Zang","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University"}]},{"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"\"Keeping facebook activity authentic \" https:\/\/www.facebook.com\/notes\/facebook- security\/keeping-facebook-activity-authentic\/10152309368645766\/ 2014.  \"Keeping facebook activity authentic \" https:\/\/www.facebook.com\/notes\/facebook- security\/keeping-facebook-activity-authentic\/10152309368645766\/ 2014."},{"key":"e_1_3_2_2_2_1","unstructured":"\"Kingroot \" https:\/\/kingroot.net 2016.  \"Kingroot \" https:\/\/kingroot.net 2016."},{"key":"e_1_3_2_2_3_1","unstructured":"\"Authentication | android open source project \" https:\/\/source.android.com\/security\/authentication\/index.html 2017.  \"Authentication | android open source project \" https:\/\/source.android.com\/security\/authentication\/index.html 2017."},{"key":"e_1_3_2_2_4_1","unstructured":"\"boringssl \" https:\/\/boringssl.googlesource.com\/boringssl\/ 2017.  \"boringssl \" https:\/\/boringssl.googlesource.com\/boringssl\/ 2017."},{"key":"e_1_3_2_2_5_1","unstructured":"\"Chinese click farm where 10k phones boost app ratings \" http:\/\/www.dailymail.co.uk\/news\/article-4499730\/click-farm-10-000-phones-boost-product-ratings.html 2017.  \"Chinese click farm where 10k phones boost app ratings \" http:\/\/www.dailymail.co.uk\/news\/article-4499730\/click-farm-10-000-phones-boost-product-ratings.html 2017."},{"key":"e_1_3_2_2_6_1","unstructured":"\"Libtomcrypt \" https:\/\/github.com\/libtom\/libtomcrypt 2017.  \"Libtomcrypt \" https:\/\/github.com\/libtom\/libtomcrypt 2017."},{"key":"e_1_3_2_2_7_1","unstructured":"\"monkeyrunner \" https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/ 2017.  \"monkeyrunner \" https:\/\/developer.android.com\/studio\/test\/monkeyrunner\/ 2017."},{"key":"e_1_3_2_2_8_1","unstructured":"\"textimagegenerator library \" https:\/\/github.com\/jcraane\/textimagegenerator 2017.  \"textimagegenerator library \" https:\/\/github.com\/jcraane\/textimagegenerator 2017."},{"key":"e_1_3_2_2_9_1","unstructured":"\"Trustkernel tee \" https:\/\/www.trustkernel.com 2018.  \"Trustkernel tee \" https:\/\/www.trustkernel.com 2018."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_2_11_1","unstructured":"Alipay \"Ali pay \" https:\/\/www.alipay.com\/ 2017.  Alipay \"Ali pay \" https:\/\/www.alipay.com\/ 2017."},{"key":"e_1_3_2_2_12_1","volume-title":"Trustzone: Integrated hardware and software security,\" ARM white paper","author":"Alves T.","unstructured":"T. Alves and D. Felton , \" Trustzone: Integrated hardware and software security,\" ARM white paper , vol. 3 , no. 4, 2004. T. Alves and D. Felton, \"Trustzone: Integrated hardware and software security,\" ARM white paper, vol. 3, no. 4, 2004."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_2_14_1","unstructured":"Apple \"Apple pay \" www.apple.com\/apple-pay\/ 2017.  Apple \"Apple pay \" www.apple.com\/apple-pay\/ 2017."},{"key":"e_1_3_2_2_15_1","unstructured":"ARM \"Connected devices need e-commerce standard security say cyber security experts \" https:\/\/www.arm.com\/about\/newsroom\/connected-devices-need-e-commerce-standard-security-say-cyber-security-experts.php 2016.  ARM \"Connected devices need e-commerce standard security say cyber security experts \" https:\/\/www.arm.com\/about\/newsroom\/connected-devices-need-e-commerce-standard-security-say-cyber-security-experts.php 2016."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTMOBILE.2007.14"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_2_18_1","first-page":"363","volume-title":"General Track","author":"Cui W.","year":"2005","unstructured":"W. Cui , R. H. Katz , and W.-t. Tan , \"Binder : An extrusion-based break-in detector for personal computers,\" in USENIX Annual Technical Conference , General Track , 2005 , pp. 363 -- 366 . W. Cui, R. H. Katz, and W.-t. Tan, \"Binder: An extrusion-based break-in detector for personal computers,\" in USENIX Annual Technical Conference, General Track, 2005, pp. 363--366."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_2_20_1","unstructured":"O. I. I. E. T. Force \"The open trust protocol (otrp) \" https:\/\/tools.ietf.org\/html\/draft-pei-opentrustprotocol-01 2017.  O. I. I. E. T. Force \"The open trust protocol (otrp) \" https:\/\/tools.ietf.org\/html\/draft-pei-opentrustprotocol-01 2017."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070961"},{"key":"e_1_3_2_2_22_1","volume-title":"Multi-digit number recognition from street view imagery using deep convolutional neural networks,\" arXiv preprint arXiv:1312.6082","author":"Goodfellow I. J.","year":"2013","unstructured":"I. J. Goodfellow , Y. Bulatov , J. Ibarz , S. Arnoud , and V. Shet , \" Multi-digit number recognition from street view imagery using deep convolutional neural networks,\" arXiv preprint arXiv:1312.6082 , 2013 . I. J. Goodfellow, Y. Bulatov, J. Ibarz, S. Arnoud, and V. Shet, \"Multi-digit number recognition from street view imagery using deep convolutional neural networks,\" arXiv preprint arXiv:1312.6082, 2013."},{"key":"e_1_3_2_2_23_1","volume-title":"Not-a-bot (nab): Improving service availability in the face of botnet attacks","author":"Gummadi R.","year":"2009","unstructured":"R. Gummadi , H. Balakrishnan , P. Maniatis , and S. Ratnasamy , \" Not-a-bot (nab): Improving service availability in the face of botnet attacks ,\" 2009 . R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy, \"Not-a-bot (nab): Improving service availability in the face of botnet attacks,\" 2009."},{"key":"e_1_3_2_2_24_1","first-page":"541","volume-title":"vtz: Virtualizing arm trustzone,\" in 26th {USENIX} Security Symposium ({USENIX} Security 17)","author":"Hua Z.","year":"2017","unstructured":"Z. Hua , J. Gu , Y. Xia , H. Chen , B. Zang , and H. Guan , \" vtz: Virtualizing arm trustzone,\" in 26th {USENIX} Security Symposium ({USENIX} Security 17) , 2017 , pp. 541 -- 556 . Z. Hua, J. Gu, Y. Xia, H. Chen, B. Zang, and H. Guan, \"vtz: Virtualizing arm trustzone,\" in 26th {USENIX} Security Symposium ({USENIX} Security 17), 2017, pp. 541--556."},{"key":"e_1_3_2_2_25_1","volume-title":"Gyrus: A framework for user-intent monitoring of text-based networked applications.\" in NDSS","author":"Jang Y.","year":"2014","unstructured":"Y. Jang , S. P. Chung , B. D. Payne , and W. Lee , \" Gyrus: A framework for user-intent monitoring of text-based networked applications.\" in NDSS , 2014 . Y. Jang, S. P. Chung, B. D. Payne, and W. Lee, \"Gyrus: A framework for user-intent monitoring of text-based networked applications.\" in NDSS, 2014."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.5"},{"key":"e_1_3_2_2_27_1","volume-title":"the average hash algorithm,\" http:\/\/www.hackerfactor.com\/blog\/?\/archives\/432-Looks-Like-It.html","author":"Krawetz N.","year":"2011","unstructured":"N. Krawetz , \" Perceptual hash algorithm : the average hash algorithm,\" http:\/\/www.hackerfactor.com\/blog\/?\/archives\/432-Looks-Like-It.html , 2011 . N. Krawetz, \"Perceptual hash algorithm: the average hash algorithm,\" http:\/\/www.hackerfactor.com\/blog\/?\/archives\/432-Looks-Like-It.html, 2011."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994472"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994462"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131688"},{"key":"e_1_3_2_2_35_1","first-page":"379","volume-title":"BC: USENIX Association","author":"Petracca G.","year":"2017","unstructured":"G. Petracca , A.-A. Reineh , Y. Sun , J. Grossklags , and T. Jaeger , \" Aware: Preventing abuse of privacy-sensitive sensors via operation bindings,\" in 26th USENIX Security Symposium (USENIX Security 17). Vancouver , BC: USENIX Association , 2017 , pp. 379 -- 396 . {Online}. Available : https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/petracca G. Petracca, A.-A. Reineh, Y. Sun, J. Grossklags, and T. Jaeger, \"Aware: Preventing abuse of privacy-sensitive sensors via operation bindings,\" in 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC: USENIX Association, 2017, pp. 379--396. {Online}. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/petracca"},{"key":"e_1_3_2_2_36_1","volume-title":"Mattoon et al., \"ftpm: A software-only implementation of a tpm chip","author":"Raj H.","year":"2016","unstructured":"H. Raj , S. Saroiu , A. Wolman , R. Aigner , J. Cox , P. England , C. Fenner , K. Kinshumann , J. Loeser , D. Mattoon et al., \"ftpm: A software-only implementation of a tpm chip ,\" 2016 . H. Raj, S. Saroiu, A. Wolman, R. Aigner, J. Cox, P. England, C. Fenner, K. Kinshumann, J. Loeser, D. Mattoon et al., \"ftpm: A software-only implementation of a tpm chip,\" 2016."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_2_39_1","first-page":"1","article-title":"I'm not a human: Breaking the google recaptcha","author":"Sivakorn S.","year":"2016","unstructured":"S. Sivakorn , J. Polakis , and A. D. Keromytis , \" I'm not a human: Breaking the google recaptcha ,\" Black Hat,(i) , pp. 1 -- 12 , 2016 . S. Sivakorn, J. Polakis, and A. D. Keromytis, \"I'm not a human: Breaking the google recaptcha,\" Black Hat,(i), pp. 1--12, 2016.","journal-title":"Black Hat,(i)"},{"key":"e_1_3_2_2_40_1","volume-title":"https:\/\/twitter.com\/support\/status\/421400317524070402","author":"Support T.","year":"2016","unstructured":"T. Support , https:\/\/twitter.com\/support\/status\/421400317524070402 , 2016 . T. Support, https:\/\/twitter.com\/support\/status\/421400317524070402, 2016."},{"key":"e_1_3_2_2_41_1","unstructured":"Tecent \"Wechat pay \" https:\/\/pay.weixin.qq.com\/index.php\/public\/wechatpay 2017.  Tecent \"Wechat pay \" https:\/\/pay.weixin.qq.com\/index.php\/public\/wechatpay 2017."}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","location":"Munich Germany","acronym":"MobiSys '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210330"}},"subtitle":["Practical Attestation of User-driven Operations in Mobile Apps"],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":41,"alternative-id":["10.1145\/3210240.3210330","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210330","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}