{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:33:28Z","timestamp":1774719208863,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274709","type":"proceedings-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T02:37:37Z","timestamp":1586745457000},"page":"629-640","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An Historical Analysis of the SEAndroid Policy Evolution"],"prefix":"10.1145","author":[{"given":"Bumjin","family":"Im","sequence":"first","affiliation":[{"name":"Rice University, Houston, Texas"}]},{"given":"Ang","family":"Chen","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas"}]},{"given":"Dan S.","family":"Wallach","sequence":"additional","affiliation":[{"name":"Rice University, Houston, Texas"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Open Source Project 2018. SEAndroid Policy Git Repository. Android Open Source Project. https:\/\/android.googlesource.com\/platform\/system\/sepolicy  Android Open Source Project 2018. SEAndroid Policy Git Repository. Android Open Source Project. https:\/\/android.googlesource.com\/platform\/system\/sepolicy"},{"key":"e_1_3_2_1_3_1","unstructured":"Armis Inc. 2017. The Attack Vector \"BlueBorne\" Exposes Almost Every Connected Device. Armis Inc. https:\/\/www.armis.com\/blueborne\/  Armis Inc. 2017. The Attack Vector \"BlueBorne\" Exposes Almost Every Connected Device. Armis Inc. https:\/\/www.armis.com\/blueborne\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Practical Domain and Type Enforcement for UNIX. In IEEE Symposium on Security and Privacy. IEEE, IEEE","author":"Badger Lee","year":"1995","unstructured":"Lee Badger , Daniel F Sterne , David L Sherman , Kenneth M Walker , and Sheila A Haghighat . 1995 . Practical Domain and Type Enforcement for UNIX. In IEEE Symposium on Security and Privacy. IEEE, IEEE , Oakland, CA, 66--77. Lee Badger, Daniel F Sterne, David L Sherman, Kenneth M Walker, and Sheila A Haghighat. 1995. Practical Domain and Type Enforcement for UNIX. In IEEE Symposium on Security and Privacy. IEEE, IEEE, Oakland, CA, 66--77."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134638"},{"key":"e_1_3_2_1_7_1","unstructured":"Nikolay Elenkov. 2014. Android Security Internals: An in-depth Guide to Android's Security Architecture. No Starch Press.   Nikolay Elenkov. 2014. Android Security Internals: An in-depth Guide to Android's Security Architecture. No Starch Press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9356-2"},{"key":"e_1_3_2_1_10_1","unstructured":"Google 2017. Media Framework Hardening. Google. https:\/\/source.android.com\/devices\/media\/framework-hardening  Google 2017. Media Framework Hardening. Google. https:\/\/source.android.com\/devices\/media\/framework-hardening"},{"key":"e_1_3_2_1_11_1","unstructured":"Google 2017. SEL inux for Android 8.0. Google. https:\/\/source.android.com\/security\/selinux\/images\/SELinux_Treble.pdf  Google 2017. SEL inux for Android 8.0. Google. https:\/\/source.android.com\/security\/selinux\/images\/SELinux_Treble.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"Google 2018. Android Open Source Project. Google. https:\/\/source.android.com  Google 2018. Android Open Source Project. Google. https:\/\/source.android.com"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805982"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251358"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990053"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937528"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_20_1","volume-title":"Case Study on the Linux Kernel. In 10th IEEE Working Conference on Mining Software Repositories (MSR). IEEE, IEEE, an Francisco, CA, USA, 101--110","author":"Jiang Yujuan","year":"2013","unstructured":"Yujuan Jiang , Bram Adams , and Daniel M German . 2013 . Will My Patch Make It? and How Fast? Case Study on the Linux Kernel. In 10th IEEE Working Conference on Mining Software Repositories (MSR). IEEE, IEEE, an Francisco, CA, USA, 101--110 . Yujuan Jiang, Bram Adams, and Daniel M German. 2013. Will My Patch Make It? and How Fast? Case Study on the Linux Kernel. In 10th IEEE Working Conference on Mining Software Repositories (MSR). IEEE, IEEE, an Francisco, CA, USA, 101--110."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_23_1","volume-title":"Cynara","author":"Security Linux Foundation","unstructured":"Linux Foundation 2016. Security : Cynara . Linux Foundation . https:\/\/wiki.tizen.org\/Security:Cynara Linux Foundation 2016. Security: Cynara. Linux Foundation. https:\/\/wiki.tizen.org\/Security:Cynara"},{"key":"e_1_3_2_1_24_1","volume-title":"Smack three domain model","author":"Linux Foundation","unstructured":"Linux Foundation 2016. Smack three domain model . Linux Foundation . https:\/\/wiki.tizen.org\/Security:SmackThreeDomainModel Linux Foundation 2016. Smack three domain model. Linux Foundation. https:\/\/wiki.tizen.org\/Security:SmackThreeDomainModel"},{"key":"e_1_3_2_1_25_1","unstructured":"Linux Foundation 2016. Tizen 2.x security architecture. Linux Foundation. https:\/\/wiki.tizen.org\/Security\/Tizen_2.X_Architecture  Linux Foundation 2016. Tizen 2.x security architecture. Linux Foundation. https:\/\/wiki.tizen.org\/Security\/Tizen_2.X_Architecture"},{"key":"e_1_3_2_1_26_1","unstructured":"Linux Foundation 2016. Tizen 3.0 security overview. Linux Foundation. https:\/\/wiki.tizen.org\/Security\/Tizen_3.X_Overview  Linux Foundation 2016. Tizen 3.0 security overview. Linux Foundation. https:\/\/wiki.tizen.org\/Security\/Tizen_3.X_Overview"},{"key":"e_1_3_2_1_27_1","unstructured":"Linux Foundation 2017. Tizen 4.0 Public M1 Release Notes. Linux Foundation. https:\/\/developer.tizen.org\/tizen\/releasenotes\/tizen-4.0-public-m1  Linux Foundation 2017. Tizen 4.0 Public M1 Release Notes. Linux Foundation. https:\/\/developer.tizen.org\/tizen\/releasenotes\/tizen-4.0-public-m1"},{"key":"e_1_3_2_1_28_1","volume-title":"standards-based software platform for multiple device categories","author":"Linux Foundation","unstructured":"Linux Foundation 2018. Tizen \/ An open source , standards-based software platform for multiple device categories . Linux Foundation . https:\/\/www.tizen.org\/ Linux Foundation 2018. Tizen \/ An open source, standards-based software platform for multiple device categories. Linux Foundation. https:\/\/www.tizen.org\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/647054.715771"},{"key":"e_1_3_2_1_30_1","first-page":"2014","article-title":"Android vs. ios: What's the most popular mobile operating system in your country","volume":"1","author":"Mahapatra Lisa","year":"2013","unstructured":"Lisa Mahapatra . 2013 . Android vs. ios: What's the most popular mobile operating system in your country . International Business Times. Retrieved March 1 (2013), 2014 . Lisa Mahapatra. 2013. Android vs. ios: What's the most popular mobile operating system in your country. International Business Times. Retrieved March 1 (2013), 2014.","journal-title":"International Business Times. Retrieved March"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/74587.74620"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568317"},{"key":"e_1_3_2_1_34_1","unstructured":"Palo Alto Networks Inc. 2017. Android Toast Overlay Attack: \"Cloak and Dagger\" with No Permissions. Palo Alto Networks Inc. https:\/\/researchcenter.paloaltonetworks.com\/2017\/09\/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions\/  Palo Alto Networks Inc. 2017. Android Toast Overlay Attack: \"Cloak and Dagger\" with No Permissions. Palo Alto Networks Inc. https:\/\/researchcenter.paloaltonetworks.com\/2017\/09\/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Redhat 2015. SELinux\/audit2allow Fedora Wiki. Redhat. http:\/\/fedoraproject.org\/wiki\/SELinux\/audit2allow  Redhat 2015. SELinux\/audit2allow Fedora Wiki. Redhat. http:\/\/fedoraproject.org\/wiki\/SELinux\/audit2allow"},{"key":"e_1_3_2_1_36_1","volume-title":"Characterizing SEAndroid Policies in the Wild. arXiv preprint arXiv:1510.05497","author":"Reshetova Elena","year":"2015","unstructured":"Elena Reshetova , Filippo Bonazzi , Thomas Nyman , Ravishankar Borgaonkar , and N Asokan . 2015. Characterizing SEAndroid Policies in the Wild. arXiv preprint arXiv:1510.05497 ( 2015 ). Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, and N Asokan. 2015. Characterizing SEAndroid Policies in the Wild. arXiv preprint arXiv:1510.05497 (2015)."},{"key":"e_1_3_2_1_37_1","unstructured":"Samsung 2017. Samsung Knox Security Solution. Samsung. http:\/\/docs.samsungknox.com\/samsungknox-whitepaper\/Samsung-Knox-Security-Solution-Whitepaper.pdf  Samsung 2017. Samsung Knox Security Solution. Samsung. http:\/\/docs.samsungknox.com\/samsungknox-whitepaper\/Samsung-Knox-Security-Solution-Whitepaper.pdf"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS)","author":"Sarna-Starosta Beata","year":"2004","unstructured":"Beata Sarna-Starosta and Scott D Stoller . 2004 . Policy Analysis for Security-Enhanced Linux . In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS) . Washington, DC, USA, 1--12. Beata Sarna-Starosta and Scott D Stoller. 2004. Policy Analysis for Security-Enhanced Linux. In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS). Washington, DC, USA, 1--12."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_40_1","unstructured":"Casey Schaufler. 2008. The Simplified Mandatory Access Control Kernel. http:\/\/schaufler-ca.com\/yahoo_site_admin\/assets\/docs\/SmackWhitePaper.257153003.pdf.  Casey Schaufler. 2008. The Simplified Mandatory Access Control Kernel. http:\/\/schaufler-ca.com\/yahoo_site_admin\/assets\/docs\/SmackWhitePaper.257153003.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2012010104"},{"key":"e_1_3_2_1_43_1","volume-title":"NDSS","volume":"310","author":"Smalley Stephen","year":"2013","unstructured":"Stephen Smalley and Robert Craig . 2013 . Security Enhanced (SE) Android: Bringing Flexible MAC to Android .. In NDSS , Vol. 310 . Internet Society, San Diego, CA, USA, 20--38. Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android.. In NDSS, Vol. 310. Internet Society, San Diego, CA, USA, 20--38."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593887"},{"key":"e_1_3_2_1_45_1","unstructured":"Tresys Technology 2017. SELinux Policy Analysis Tools v4. Tresys Technology. https:\/\/github.com\/TresysTechnology\/setools  Tresys Technology 2017. SELinux Policy Analysis Tools v4. Tresys Technology. https:\/\/github.com\/TresysTechnology\/setools"},{"key":"e_1_3_2_1_46_1","unstructured":"Tresys Technology 2017. Tresys:: Security Enhanced Linux. Tresys Technology. http:\/\/www.tresys.com\/solutions\/security-enhanced-linux  Tresys Technology 2017. Tresys:: Security Enhanced Linux. Tresys Technology. http:\/\/www.tresys.com\/solutions\/security-enhanced-linux"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702549"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414500"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_1_50_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Wang Ruowen","year":"2015","unstructured":"Ruowen Wang , William Enck , Douglas S Reeves , Xinwen Zhang , Peng Ning , Dingbang Xu , Wu Zhou , and Ahmed M Azab . 2015 . EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning .. In USENIX Security Symposium. USENIX Association , Washington, DC, USA, 351--366. Ruowen Wang, William Enck, Douglas S Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, and Ahmed M Azab. 2015. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.. In USENIX Security Symposium. USENIX Association, Washington, DC, USA, 351--366."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990059"},{"key":"e_1_3_2_1_52_1","unstructured":"Nikias Bassen Zuk Avraham Joshua Drake. 2015. Experts Found a Unicorn in the Heart of Android. Zimperium. http:\/\/blog.zimperium.com\/experts-found-a-unicorn-in-the-heart-of-android\/  Nikias Bassen Zuk Avraham Joshua Drake. 2015. Experts Found a Unicorn in the Heart of Android. Zimperium. http:\/\/blog.zimperium.com\/experts-found-a-unicorn-in-the-heart-of-android\/"},{"key":"e_1_3_2_1_53_1","volume-title":"Google Android: List of Security Vulnerabilities. CVEdetails. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html","author":"\u00d6zkan Serkan","year":"2018","unstructured":"Serkan \u00d6zkan . 2018 . Google Android: List of Security Vulnerabilities. CVEdetails. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html Serkan \u00d6zkan. 2018. Google Android: List of Security Vulnerabilities. CVEdetails. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-1224\/product_id-19997\/Google-Android.html"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA","acronym":"ACSAC '18","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":51,"alternative-id":["10.1145\/3274694.3274709","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274709","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}