{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:22Z","timestamp":1750220962166,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0753"],"award-info":[{"award-number":["16KIS0753"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297469","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"1934-1943","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure multi-execution in Android"],"prefix":"10.1145","author":[{"given":"Dhiman","family":"Chakraborty","sequence":"first","affiliation":[{"name":"Saarland University, Germany"}]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[{"name":"University of Potsdam, Germany"}]},{"given":"Sven","family":"Bugiel","sequence":"additional","affiliation":[{"name":"Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.33"},{"key":"e_1_3_2_1_2_1","unstructured":"Android Developer Docs. 2017. Android Manifest File: Service. https:\/\/developer.android.com\/guide\/topics\/manifest\/service-element. Last visisted: 06\/12\/2018."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Developer Docs. 2018. Android Manifest File: Activity. https:\/\/developer.android.com\/guide\/topics\/manifest\/activity-element. Last visisted: 06\/13\/2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024086"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897927"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664264"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_25"},{"key":"e_1_3_2_1_9_1","volume-title":"Wallach","author":"Book Theodore","year":"2013","unstructured":"Theodore Book, Adam Pridgen, and Dan S. Wallach. 2013. Longitudinal Analysis of Android Ad Library Permissions. CoRR abs\/1303.0857 (2013). http:\/\/dblp.uni-trier.de\/db\/journals\/corr\/corr1303.html#abs-1303-0857"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028090"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924971"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028089"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/17.2.143"},{"volume-title":"Proc. 3rd IEEE Symposium on Security and Privacy (SP '82)","author":"Joseph","key":"e_1_3_2_1_17_1","unstructured":"Joseph A. Goguen and Jos\u00c3l' Meseguer. 1982. Security Policies and Security Models. In Proc. 3rd IEEE Symposium on Security and Privacy (SP '82). IEEE Computer Society."},{"volume-title":"Proc. 5th IEEE Symposium on Security and Privacy (SP '84)","author":"Joseph","key":"e_1_3_2_1_18_1","unstructured":"Joseph A. Goguen and Jos\u00c3l' Meseguer. 1984. Unwinding and Inference Control. In Proc. 5th IEEE Symposium on Security and Privacy (SP '84). IEEE Computer Society."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2018. Put Android to Work. https:\/\/www.android.com\/enterprise\/employees\/. Last visisted: 06\/13\/2018."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484317"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134064"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29709-0_16"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. 18th European Symposium on Research in Computer Security (ESORICS","author":"Jia Limin","year":"2013","unstructured":"Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake. 2013. Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). In Proc. 18th European Symposium on Research in Computer Security (ESORICS 2013). Springer."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818791"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241181"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516677"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676978"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.15"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150541"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.20"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362821"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.35"},{"volume-title":"Proc. 20th Annual Network and Distributed System Security Symposium (NDSS '13)","author":"Smalley S.","key":"e_1_3_2_1_44_1","unstructured":"S. Smalley and R. Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In Proc. 20th Annual Network and Distributed System Security Symposium (NDSS '13). The Internet Society."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. 23rd Annual Network and Distributed System Security Symposium (NDSS '16)","author":"Son Sooel","year":"2015","unstructured":"Sooel Son, Google Daehyeok, Kim Kaist, and Vitaly Shmatikov. 2015. What Mobile Ads Know about Mobile Users. In Proc. 23rd Annual Network and Distributed System Security Symposium (NDSS '16). The Internet Society."},{"key":"e_1_3_2_1_46_1","unstructured":"Statista. 2018. Mobile OS market share. https:\/\/www.statista.com\/statistics\/272307\/market-share-forecast-for-smartphone-operating-systems\/"},{"key":"e_1_3_2_1_47_1","volume-title":"Workshop on Mobile Security Technologies (MoST). IEEE Computer Society.","author":"Stevens Ryan","year":"2012","unstructured":"Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST). IEEE Computer Society."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897888"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741966"},{"volume-title":"Proc. 16th IEEE Computer Security Foundations Workshop (CSFW '13)","author":"Zdancewic Steve","key":"e_1_3_2_1_54_1","unstructured":"Steve Zdancewic and Andrew C. Myers. 2003. Observational Determinism for Concurrent Program Security. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW '13). IEEE Computer Society."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"SAC '19"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:15Z","timestamp":1750204455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":54,"alternative-id":["10.1145\/3297280.3297469","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297469","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}