{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:04:25Z","timestamp":1774368265763,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["DARPA-15-15-TC-FP006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243785","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1120-1136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["ClickShield"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Possemato","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"Universita' degli Studi di Milano, Milan, Italy"}]},{"given":"Simon Pak Ho","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Yanick","family":"Fratantonio","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Yair Amit. 2016. 95.4 Percent of All Android Devices Are Susceptible to Accessibility Clickjacking Exploits. https:\/\/www.skycure.com\/blog\/95--4-android-devices-susceptible-accessibility-clickjacking-exploits\/.  Yair Amit. 2016. 95.4 Percent of All Android Devices Are Susceptible to Accessibility Clickjacking Exploits. https:\/\/www.skycure.com\/blog\/95--4-android-devices-susceptible-accessibility-clickjacking-exploits\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Yair Amit. 2016. \"Accessibility Clickjacking\" -- The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. https:\/\/www.skycure.com\/blog\/accessibility-clickjacking\/.  Yair Amit. 2016. \"Accessibility Clickjacking\" -- The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. https:\/\/www.skycure.com\/blog\/accessibility-clickjacking\/."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098247"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_2_5_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP","author":"Carlini Nicholas","year":"2017"},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Chen Qi Alfred","year":"2014"},{"key":"e_1_3_2_2_7_1","unstructured":"F-Droid. 2018. Free and Open Source (FOSS) software on the Android platform. https:\/\/f-droid.org\/en\/  F-Droid. 2018. Free and Open Source (FOSS) software on the Android platform. https:\/\/f-droid.org\/en\/"},{"key":"e_1_3_2_2_8_1","volume-title":"Proc. of IEEE Workshop on Web 2.0 Security & Privacy (W2SP).","author":"Felt Adrienne Porter","year":"2011"},{"key":"e_1_3_2_2_9_1","volume-title":"Proc. of Financial Cryptography and Data Security (FC).","author":"Fernandes Earlence","year":"2016"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_2_11_1","unstructured":"geeksonsecurity. 2018. Android Overlay Protector. https:\/\/geeksonsecurity.github.io\/overlay-protector-website\/.  geeksonsecurity. 2018. Android Overlay Protector. https:\/\/geeksonsecurity.github.io\/overlay-protector-website\/."},{"key":"e_1_3_2_2_12_1","volume-title":"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In USENIX Security Symposium.","author":"Huang Jianjun","year":"2015"},{"key":"e_1_3_2_2_13_1","unstructured":"Google Inc. 2018. Documentation for the FLAG_WINDOW_IS_OBSCURED flag. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent.html#FLAG_WINDOW_IS_OBSCURED  Google Inc. 2018. Documentation for the FLAG_WINDOW_IS_OBSCURED flag. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent.html#FLAG_WINDOW_IS_OBSCURED"},{"key":"e_1_3_2_2_15_1","unstructured":"Amar Menezes. 2018. Privilege Escalation via adbd Misconfiguration. https:\/\/labs.mwrinfosecurity.com\/assets\/BlogFiles\/mwri-android-adbd-privilege-escalation-advisory-2018-01--17.pdf .  Amar Menezes. 2018. Privilege Escalation via adbd Misconfiguration. https:\/\/labs.mwrinfosecurity.com\/assets\/BlogFiles\/mwri-android-adbd-privilege-escalation-advisory-2018-01--17.pdf ."},{"key":"e_1_3_2_2_16_1","volume-title":"UIPicker: User-Input Privacy Identification in Mobile Applications. In USENIX Security Symposium.","author":"Nan Yuhong","year":"2015"},{"key":"e_1_3_2_2_17_1","volume-title":"UI Redressing Attacks on Android devices. Black Hat Abu Dhabi","author":"Niemietz Marcus","year":"2012"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23529"},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. of USENIX Security Symposium.","author":"Ren Chuangang","year":"2015"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. of the USENIX Conference on Offensive Technologies.","author":"Rydstedt Gustav","year":"2010"},{"key":"e_1_3_2_2_24_1","unstructured":"Tara Seals. 2016. Autorooting Overlay Malware Are Rising Android Threats. http:\/\/www.infosecurity-magazine.com\/news\/autorooting-overlay-malware-are\/.  Tara Seals. 2016. Autorooting Overlay Malware Are Rising Android Threats. http:\/\/www.infosecurity-magazine.com\/news\/autorooting-overlay-malware-are\/."},{"key":"e_1_3_2_2_25_1","unstructured":"SFYLABS. {n. d.}. Client Side Detection (CSD). https:\/\/clientsidedetection.com.  SFYLABS. {n. d.}. Client Side Detection (CSD). https:\/\/clientsidedetection.com."},{"key":"e_1_3_2_2_26_1","unstructured":"Tom Spring. 2016. SCOURGE OF ANDROID OVERLAY MALWARE ON RISE. https:\/\/threatpost.com\/scourge-of-android-overlay-malware-on-rise\/117720\/.  Tom Spring. 2016. SCOURGE OF ANDROID OVERLAY MALWARE ON RISE. https:\/\/threatpost.com\/scourge-of-android-overlay-malware-on-rise\/117720\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Cameron Summerson. 2017. How to Fix the \"Screen Overlay Detected\" Error on Android. https:\/\/www.howtogeek.com\/271519\/how-to-fix-the-screen-overlay-detected-error-on-android\/  Cameron Summerson. 2017. How to Fix the \"Screen Overlay Detected\" Error on Android. https:\/\/www.howtogeek.com\/271519\/how-to-fix-the-screen-overlay-detected-error-on-android\/"},{"key":"e_1_3_2_2_28_1","unstructured":"Urbandroid Team. 2018. Twilight App. https:\/\/play.google.com\/store\/apps\/details?id=com.urbandroid.lux&hl=en.  Urbandroid Team. 2018. Twilight App. https:\/\/play.google.com\/store\/apps\/details?id=com.urbandroid.lux&hl=en."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860470"},{"key":"e_1_3_2_2_30_1","unstructured":"Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator. http:\/\/www.symantec.com\/connect\/blogs\/android-ransomware-variant-uses-clickjacking-become-device-administrator.  Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator. http:\/\/www.symantec.com\/connect\/blogs\/android-ransomware-variant-uses-clickjacking-become-device-administrator."},{"key":"e_1_3_2_2_31_1","unstructured":"Wu Zhou Linhai Song Jens Monrad Junyuan Zeng and Jimmy Su. 2016. The Latest Android Overlay Malware Spreading via SMS Phishing in Europe. https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/06\/latest-android-overlay-malware-spreading-in-europe.html.  Wu Zhou Linhai Song Jens Monrad Junyuan Zeng and Jimmy Su. 2016. The Latest Android Overlay Malware Spreading via SMS Phishing in Europe. https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/06\/latest-android-overlay-malware-spreading-in-europe.html."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243785","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243785"}},"subtitle":["Are You Hiding Something? Towards Eradicating Clickjacking on Android"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":30,"alternative-id":["10.1145\/3243734.3243785","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243785","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}