{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:11:25Z","timestamp":1763968285406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243842","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1151-1164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Precise Android API Protection Mapping Derivation and Reasoning"],"prefix":"10.1145","author":[{"given":"Yousra","family":"Aafer","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Guanhong","family":"Tao","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"volume-title":"a disassembler for Android's dex format","year":"2017","author":"Baksmali","key":"e_1_3_2_2_1_1"},{"volume-title":"AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","year":"2018","author":"Aafer Yousra","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813648"},{"volume-title":"an assembler for Android's dex format","year":"2017","author":"Smali","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"volume-title":"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In 25th USENIX Security Symposium (USENIX Security 16)","year":"2016","author":"Backes Michael","key":"e_1_3_2_2_7_1"},{"volume-title":"https:\/\/source.android.com\/devices\/tech\/dalvik\/","year":"2017","author":"ART","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"volume-title":"Get Off of My Clipboard","author":"Fahl Sascha","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC'11)","year":"2011","author":"Felt Adrienne Porter","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS). http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/pubs\/NDSS12_WOODPECKER.pdf","year":"2012","author":"Grace Michael","key":"e_1_3_2_2_15_1"},{"volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","year":"2015","author":"Huang Jianjun","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950348"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"volume-title":"WALA: T.J. Watson Libraries for Analysis","year":"2017","author":"IBM.","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516706"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"volume-title":"Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel.","year":"2014","author":"Li Li","key":"e_1_3_2_2_22_1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660302"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_2_26_1","unstructured":"Microsoft Research. 2017. Z3 Prover. https:\/\/github.com\/Z3Prover\/z3. (2017).  Microsoft Research. 2017. Z3 Prover. https:\/\/github.com\/Z3Prover\/z3. (2017)."},{"volume-title":"Proceedings of the 22Nd USENIX Conference on Security (SEC'13)","year":"2013","author":"Octeau Damien","key":"e_1_3_2_2_27_1"},{"volume-title":"Proceedings of the 22Nd USENIX Conference on Security (SEC'13)","year":"2013","author":"Pandita Rahul","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_2_30_1","unstructured":"Quine J. 2017. Quine-McCluskey algorithm. https:\/\/en.wikipedia.org\/wiki\/Quine-McCluskey_algorithm. (2017).  Quine J. 2017. Quine-McCluskey algorithm. https:\/\/en.wikipedia.org\/wiki\/Quine-McCluskey_algorithm. (2017)."},{"volume-title":"Convert sparse Android data image (.dat) into filesystem ext4 image (.img)","year":"2016","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23046"},{"volume-title":"Retrieved","year":"2017","author":"Mobile Device Technologies Android Revolution","key":"e_1_3_2_2_33_1"},{"volume-title":"Samsung Updates: Latest News and Firmware for your Samsung Devices!","year":"2017","author":"Updates Samsung","key":"e_1_3_2_2_34_1"},{"volume-title":"https:\/\/developer.android.com\/index.html","year":"2018","author":"Developer Website Official Android","key":"e_1_3_2_2_35_1"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"volume-title":"Data Residue Attacks on Android. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","year":"2016","author":"Zhang Xiao","key":"e_1_3_2_2_38_1"},{"volume-title":"Detecting Passive Content Leaks and Pollution in Android Applications. In In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, NDSS '13. The Internet Society.","year":"2013","author":"Zhou Yajin","key":"e_1_3_2_2_39_1"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:08Z","timestamp":1750212788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":39,"alternative-id":["10.1145\/3243734.3243842","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243842","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}