{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T08:40:30Z","timestamp":1773304830906,"version":"3.50.1"},"reference-count":140,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T00:00:00Z","timestamp":1550016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,1,31]]},"abstract":"<jats:p>The advent of the Android system has brought smartphone technology to the doorsteps of the masses. The latest technologies have made it affordable for every section of the society. However, the emergence of the Android platform has also escalated the growth of cybercrime through the mobile platform. Its open source operating system has made it a center of attraction for the attackers. This article provides a comprehensive study of the state of the Android Security domain. This article classifies the attacks on the Android system in four categories (i) hardware-based attacks, (ii) kernel-based attacks, (iii) hardware abstraction layer-based attacks, and (iv) application-based attacks. The study deals with various threats and security measures relating to these categories and presents an in-depth analysis of the underlying problems in the Android security domain. The article also stresses the role of Android application developers in realizing a more secure Android environment. This article attempts to provide a comparative analysis of various malware detection techniques concerning their methods and limitations. The study can help researchers gain knowledge of the Android security domain from various aspects and build a more comprehensive, robust, and efficient solution to the threats that Android is facing.<\/jats:p>","DOI":"10.1145\/3301285","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:36:17Z","timestamp":1550172977000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["A Survey on Various Threats and Current State of Security in Android Platform"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8760-7993","authenticated-orcid":false,"given":"Parnika","family":"Bhat","sequence":"first","affiliation":[{"name":"National Institute of Technology, Hamirpur, Himachal Pradesh HP, India"}]},{"given":"Kamlesh","family":"Dutta","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Hamirpur, Himachal Pradesh HP, India"}]}],"member":"320","published-online":{"date-parts":[[2019,2,13]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Mobile threat report. 2014. Pulse Secure Mobile Threat Center (MTC). Retrieved from https:\/\/www.pulsesecure.net\/lp\/mobile-threat-report-2014.  Mobile threat report. 2014. Pulse Secure Mobile Threat Center (MTC). Retrieved from https:\/\/www.pulsesecure.net\/lp\/mobile-threat-report-2014."},{"key":"e_1_2_1_2_1","unstructured":"IDC. Smartphone OS market share. 2017. Retrieved from https:\/\/www.idc.com\/promo\/smartphone-market-share\/os.  IDC. Smartphone OS market share. 2017. Retrieved from https:\/\/www.idc.com\/promo\/smartphone-market-share\/os."},{"key":"e_1_2_1_3_1","unstructured":"Mobile overview report. 2017. Scientiamobile. Retrieved from https:\/\/www.scientiamobile.com\/page\/wpcontent\/uploads\/2017\/05\/MOVR-Q1-2017-Final.pdf.  Mobile overview report. 2017. Scientiamobile. Retrieved from https:\/\/www.scientiamobile.com\/page\/wpcontent\/uploads\/2017\/05\/MOVR-Q1-2017-Final.pdf."},{"key":"e_1_2_1_4_1","volume-title":"ghosts, and more mean bumps ahead for mobile and connected things","author":"Trojans","year":"2017"},{"key":"e_1_2_1_5_1","unstructured":"Annual threat report. 2017. Quick Heal. Retrieved from http:\/\/dlupdate.quickheal.com\/documents\/others\/Quick_Heal_Annual_Threat_Report_2017.pdf.  Annual threat report. 2017. Quick Heal. Retrieved from http:\/\/dlupdate.quickheal.com\/documents\/others\/Quick_Heal_Annual_Threat_Report_2017.pdf."},{"key":"e_1_2_1_6_1","volume-title":"Kaspersky Security Bulletin. Mobile malware evolution","author":"Unuchek Roman","year":"2016"},{"key":"e_1_2_1_7_1","volume-title":"Judy","author":"Murdock Jason","year":"2017"},{"key":"e_1_2_1_8_1","volume-title":"Cybercrime: A black market price list from the dark web","author":"Chickowsk Ericka","year":"2016"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017427"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT\u201917)","author":"Shwartz Omer","year":"2017"},{"key":"e_1_2_1_13_1","volume-title":"Android and the future of hardware attacks","author":"Fisher Dennis","year":"2018"},{"key":"e_1_2_1_14_1","volume-title":"GLitch: New \u2018rowhammer","author":"Khandelwal Swati","year":"2018"},{"key":"e_1_2_1_15_1","volume-title":"Every Android device is susceptible to a hardware vulnerability called RAMpage","author":"Conwayl Adam","year":"2018"},{"key":"e_1_2_1_16_1","volume-title":"Giovanni Vigna, Christopher Kruegel, Herbert Bos, and Kaveh Razavi.","author":"van der Veen Victor","year":"2018"},{"key":"e_1_2_1_17_1","volume-title":"QuadRooter: New Android vulnerabilities in over 900 million devices","author":"Khandelwal Swati","year":"2018"},{"key":"e_1_2_1_18_1","unstructured":"Android Developers Blog. 2018. Retrieved from https:\/\/developer.android.com\/guide\/platform\/index.html#hal.  Android Developers Blog. 2018. Retrieved from https:\/\/developer.android.com\/guide\/platform\/index.html#hal."},{"key":"e_1_2_1_20_1","unstructured":"Zero-day vulnerability in google Android. 2013. Retrieved from https:\/\/www.zero-day.cz\/database\/253\/.  Zero-day vulnerability in google Android. 2013. Retrieved from https:\/\/www.zero-day.cz\/database\/253\/."},{"key":"e_1_2_1_21_1","volume-title":"Cyber Swachhta Kendra","author":"Android","year":"2017"},{"key":"e_1_2_1_22_1","volume-title":"Security alert: New sophisticated Android malware droidkungfu found in alternative chinese app markets","author":"Jiang Xuxian"},{"key":"e_1_2_1_23_1","unstructured":"Security-enhanced Linux in Android. 2017. Android Developers Blog. Retrieved from https:\/\/source.android.com\/security\/selinux\/.  Security-enhanced Linux in Android. 2017. Android Developers Blog. Retrieved from https:\/\/source.android.com\/security\/selinux\/."},{"key":"e_1_2_1_24_1","unstructured":"Android security bulletin December. 2017. Android Developers Blog. Retrieved from https:\/\/source.android.com\/security\/bulletin\/2017-12-01.  Android security bulletin December. 2017. Android Developers Blog. Retrieved from https:\/\/source.android.com\/security\/bulletin\/2017-12-01."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_7"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium (Security\u201912)","author":"Kemerlis Vasileios P."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195686"},{"key":"e_1_2_1_30_1","unstructured":"Jonathan Salwan. 2011. ROPgadget\u2014Gadgets finder and auto-roper. ROP. Retrieved from http:\/\/shell-storm.org\/project\/ROPgadget\/.  Jonathan Salwan. 2011. ROPgadget\u2014Gadgets finder and auto-roper. ROP. Retrieved from http:\/\/shell-storm.org\/project\/ROPgadget\/."},{"key":"e_1_2_1_31_1","unstructured":"Axel Souchet. 2017. rp++ is a full-cpp written toor. Retrieved from https:\/\/github.com\/0vercl0k\/rp.  Axel Souchet. 2017. rp++ is a full-cpp written toor. Retrieved from https:\/\/github.com\/0vercl0k\/rp."},{"key":"e_1_2_1_32_1","volume-title":"Payload already inside: Data re-use for ROP exploits","author":"Black Hat","year":"2010"},{"key":"e_1_2_1_33_1","volume-title":"Ropc\u2014A turing complete rop compiler","author":"Patroklos Argyroudis PAKT","year":"2013"},{"key":"e_1_2_1_34_1","unstructured":"Aurelien Wailly Axel Souchet Jonathan Salwan Anthony Verez and Tiphaine Romand. 2016. Automated return-oriented programming chaining. Retrieved from https:\/\/github.com\/awailly\/nrop.  Aurelien Wailly Axel Souchet Jonathan Salwan Anthony Verez and Tiphaine Romand. 2016. Automated return-oriented programming chaining. Retrieved from https:\/\/github.com\/awailly\/nrop."},{"key":"e_1_2_1_35_1","volume-title":"Security in Computing and Communications","author":"Parikh Vivek"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_2_1_38_1","unstructured":"Vasilis Pappas. 2012. kBouncer: Efficient and transparent ROP mitigation. Retrieved from http:\/\/www.cs.columbia.edu\/ vpappas\/papers\/kbouncer.pdf.  Vasilis Pappas. 2012. kBouncer: Efficient and transparent ROP mitigation. Retrieved from http:\/\/www.cs.columbia.edu\/ vpappas\/papers\/kbouncer.pdf."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 2012 International Conference on Systems and Informatics (ICSAI\u201912)","author":"Huang Z."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430555"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298470"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 11th USENIX Security Symposium. USENIX Association","author":"Kiriansky Vladimir","year":"2029"},{"key":"e_1_2_1_48_1","volume-title":"Elixir cross referencer","author":"Petazzoni Thomas","year":"2018"},{"key":"e_1_2_1_49_1","unstructured":"Scott Bauer. 2016. SROP Mitigation: Signal cookies -Article --LWN.net. Retrieved from https:\/\/lwn.net\/Articles\/674861\/.  Scott Bauer. 2016. SROP Mitigation: Signal cookies -Article --LWN.net. Retrieved from https:\/\/lwn.net\/Articles\/674861\/."},{"key":"e_1_2_1_50_1","unstructured":"Jonathan Corbet. 2011. On vsyscalls and the vDSO -Article --LWN.net. Retrieved from https:\/\/lwn.net\/Articles\/446528\/.  Jonathan Corbet. 2011. On vsyscalls and the vDSO -Article --LWN.net. Retrieved from https:\/\/lwn.net\/Articles\/446528\/."},{"key":"e_1_2_1_51_1","unstructured":"Alessandro. 2015. Hack.lu 2015 - Stackstuff 150: Why and how does vsyscall emulation work. Retrieved from https:\/\/toh.necst.it\/hack.lu\/2015\/exploitable\/StackStuff\/#why-and-how-does-vsyscall-emulation-work.  Alessandro. 2015. Hack.lu 2015 - Stackstuff 150: Why and how does vsyscall emulation work. Retrieved from https:\/\/toh.necst.it\/hack.lu\/2015\/exploitable\/StackStuff\/#why-and-how-does-vsyscall-emulation-work."},{"key":"e_1_2_1_52_1","volume-title":"RAP: RIP ROP","author":"Team The","year":"2015"},{"key":"e_1_2_1_53_1","volume-title":"Control-flow enforcement technology preview","year":"2016"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_21"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)","author":"Kemerlis Vasileios P."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.34"},{"key":"e_1_2_1_57_1","unstructured":"Jake Edge. 2013. Kernel address space layout randomization. KSLR. Retrieved from https:\/\/lwn.net\/Articles\/569635\/.  Jake Edge. 2013. Kernel address space layout randomization. KSLR. Retrieved from https:\/\/lwn.net\/Articles\/569635\/."},{"key":"e_1_2_1_58_1","unstructured":"Sami Tolvanen. 2017. Hardening the kernel in Android oreo. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/08\/hardening-kernel-in-android-oreo.html.  Sami Tolvanen. 2017. Hardening the kernel in Android oreo. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/08\/hardening-kernel-in-android-oreo.html."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"e_1_2_1_60_1","unstructured":"Kaer Morhe. 2017. PaX\/grsecurity --&gt; KSPP --&gt; AOSP kernel: Linux kernel mitigation checklist(WIP). Hardened GNU\/Linux. Retrieved from https:\/\/github.com\/hardenedlinux\/grsecurity-101-tutorials\/blob\/master\/kernel_mitigation.md.  Kaer Morhe. 2017. PaX\/grsecurity --&gt; KSPP --&gt; AOSP kernel: Linux kernel mitigation checklist(WIP). Hardened GNU\/Linux. Retrieved from https:\/\/github.com\/hardenedlinux\/grsecurity-101-tutorials\/blob\/master\/kernel_mitigation.md."},{"key":"e_1_2_1_61_1","volume-title":"KSMA: Breaking Android kernel isolation and Rooting with ARM MMU features. KSMA.","author":"Wang Yong","year":"2018"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Redini Nilo","year":"2017"},{"key":"e_1_2_1_63_1","volume-title":"July","author":"Blog Android Developer","year":"2016"},{"key":"e_1_2_1_64_1","volume-title":"Black Hat USA 2015","author":"Khandelwal Swati","year":"2015"},{"key":"e_1_2_1_65_1","unstructured":"Don Marshall. 2018. Driver security checklist. Microsoft. Retrieved from https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/driversecurity\/driver-security-checklist.  Don Marshall. 2018. Driver security checklist. Microsoft. Retrieved from https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/driversecurity\/driver-security-checklist."},{"key":"e_1_2_1_66_1","volume-title":"Security updates and resources","author":"Blog Android Developers","year":"2018"},{"key":"e_1_2_1_67_1","volume-title":"Elevation of privilege vulnerability in MSM thermal driver","year":"2017"},{"key":"e_1_2_1_68_1","volume-title":"July","author":"Blog Android Developer","year":"2018"},{"key":"e_1_2_1_69_1","volume-title":"Black Hat USA","author":"Shen Di","year":"2015"},{"key":"e_1_2_1_70_1","unstructured":"Dan Goodin. 2017. Android devices can be fatally hacked by mali-cious Wi-Fi networks Broadcom chips allow rogue Wi-Fi sig-nals to execute code of attacker\u2019s choosing. Ars Technica. Retrieved from https:\/\/arstechnica.com\/information-technology\/2017\/04\/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi\/.  Dan Goodin. 2017. Android devices can be fatally hacked by mali-cious Wi-Fi networks Broadcom chips allow rogue Wi-Fi sig-nals to execute code of attacker\u2019s choosing. Ars Technica. Retrieved from https:\/\/arstechnica.com\/information-technology\/2017\/04\/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi\/."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_2_1_72_1","volume-title":"Popular tools for brute-force attacks","year":"2017"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS\u201914)","author":"Teufl P."},{"key":"e_1_2_1_74_1","volume-title":"Invisible man","author":"Thomson Iain","year":"2017"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_2_1_77_1","volume-title":"Testing your app\u2019s accessibility","author":"Blog Android Developers","year":"2017"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"e_1_2_1_79_1","volume-title":"A new sensors-based covert channel on Android. The Scientific World Journal 2014","author":"Al-Haiqi Ahmed","year":"2014"},{"key":"e_1_2_1_80_1","unstructured":"Jeff Vander Stoep. 2017. Shut the HAL Up. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/07\/shut-hal-up.html.  Jeff Vander Stoep. 2017. Shut the HAL Up. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/07\/shut-hal-up.html."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.059327"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC\u201914)","author":"Fiore U."},{"key":"e_1_2_1_84_1","volume-title":"October.","author":"Blog Android Developers","year":"2017"},{"key":"e_1_2_1_85_1","volume-title":"The legion of the bouncy castle","author":"Software Foundation SSL","year":"2017"},{"key":"e_1_2_1_86_1","unstructured":"Stan Wisseman. 2017. Third-party libraries are one of the most insecure parts of an application. Techbeacon. Retrieved from https:\/\/techbeacon.com\/third-party-libraries-are-one-most-insecure-parts-application.  Stan Wisseman. 2017. Third-party libraries are one of the most insecure parts of an application. Techbeacon. Retrieved from https:\/\/techbeacon.com\/third-party-libraries-are-one-most-insecure-parts-application."},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP\u201914)","author":"Narayanan A."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134059"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 2016 23rd Asia-Pacific Software Engineering Conference (APSEC\u201916)","author":"Soh C."},{"key":"e_1_2_1_92_1","volume-title":"Third-party library detector for Java\/Android apps","year":"2017"},{"key":"e_1_2_1_93_1","volume-title":"Vungle support, security vulnerability in Android sdks prior to 3.3.0","author":"Google","year":"2016"},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Poeplau Sebastian","year":"2014"},{"key":"e_1_2_1_95_1","volume-title":"The hacker news. Facebook sdk vulnerability puts millions of smartphone users","author":"Kumar Mohit","year":"2014"},{"key":"e_1_2_1_96_1","unstructured":"Devdatta Akhawe. 2015. Security bug resolved in the dropbox sdks for Android. Dropbox Blog. Retrieved from https:\/\/blogs.dropbox.com\/developers\/2015\/03\/security-bug-resolved-in-the-dropbox-sdks-for-android\/.  Devdatta Akhawe. 2015. Security bug resolved in the dropbox sdks for Android. Dropbox Blog. Retrieved from https:\/\/blogs.dropbox.com\/developers\/2015\/03\/security-bug-resolved-in-the-dropbox-sdks-for-android\/."},{"key":"e_1_2_1_97_1","volume-title":"Privacygrade: Grading the privacy of smartphone apps. CMU CHIMPS Lab.","author":"Kevin Ku Mike Song Luan","year":"2014"},{"key":"e_1_2_1_98_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security (SEC\u201913)","author":"Pandita Rahul","year":"2013"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"e_1_2_1_101_1","volume-title":"Shared library security flaw enables Android apps to access personal information without the right permissions","year":"2017"},{"key":"e_1_2_1_102_1","unstructured":"Vincent F. Taylor Alastair Beresford and Ivan Martinovic. 2017. Intra-library collusion: A potential privacy nightmare on smartphones. CoRR abs\/1708.03520.  Vincent F. Taylor Alastair Beresford and Ivan Martinovic. 2017. Intra-library collusion: A potential privacy nightmare on smartphones. CoRR abs\/1708.03520."},{"key":"e_1_2_1_103_1","unstructured":"How bad is dirty cow? 2016. Linux Foundation. Retrieved from https:\/\/www.linuxfoundation.org\/blog\/how-bad-is-dirty-cow\/.  How bad is dirty cow? 2016. Linux Foundation. Retrieved from https:\/\/www.linuxfoundation.org\/blog\/how-bad-is-dirty-cow\/."},{"key":"e_1_2_1_104_1","unstructured":"Redhat customer portal. Dirtycow-cve-2016-5195 2017. Kernel Local Privilege Escalation. Retrieved from https:\/\/access.redhat.com\/security\/vulnerabilities\/DirtyCow.  Redhat customer portal. Dirtycow-cve-2016-5195 2017. Kernel Local Privilege Escalation. Retrieved from https:\/\/access.redhat.com\/security\/vulnerabilities\/DirtyCow."},{"key":"e_1_2_1_105_1","volume-title":"Mehool Intwala, Apu Kapadia, and XiaoFeng Wang.","author":"Schlegel Roman","year":"2011"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_2_1_107_1","volume-title":"System and kernel security","author":"Blog Android Developers","year":"2017"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.028"},{"key":"e_1_2_1_109_1","unstructured":"Android Developers Blog. Manifest.permission. 2017. Retrieved from https:\/\/developer.android.com\/reference\/android\/Manifest.permission.html.  Android Developers Blog. Manifest.permission. 2017. Retrieved from https:\/\/developer.android.com\/reference\/android\/Manifest.permission.html."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_1_111_1","volume-title":"Android Application Security\u2014 Semantics and Context-Aware Approach","author":"Zhang Mu"},{"key":"e_1_2_1_112_1","volume-title":"Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP\u201917)","author":"Fratantonio Y."},{"key":"e_1_2_1_113_1","volume-title":"An application package configuration approach to mitigating Android SSL vulnerabilities. CoRR abs\/1410.7745","author":"Tendulkar Vasant","year":"2014"},{"key":"e_1_2_1_114_1","first-page":"101","article-title":"A survey on HTTPS implementation by Android apps: Issues and countermeasures","volume":"13","author":"Wei Xuetao","year":"2017","journal-title":"Appl. Comput. Inf."},{"key":"e_1_2_1_115_1","unstructured":"The legion of the bouncy castle. 2017. Tau Ceti Co-operative Ltd.  The legion of the bouncy castle. 2017. Tau Ceti Co-operative Ltd."},{"key":"e_1_2_1_116_1","unstructured":"Tobias Thierer. 2017. Android O to drop insecure TLS version fallback in HttpsURLConnection. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/04\/android-o-to-drop-insecure-tls-version.html.  Tobias Thierer. 2017. Android O to drop insecure TLS version fallback in HttpsURLConnection. Android Developers Blog. Retrieved from https:\/\/android-developers.googleblog.com\/2017\/04\/android-o-to-drop-insecure-tls-version.html."},{"key":"e_1_2_1_117_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell Trinity S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Network Working Group. Retrieved from https:\/\/tools.ietf.org\/html\/rfc5280.  D. Cooper S. Santesson S. Farrell Trinity S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Network Working Group. Retrieved from https:\/\/tools.ietf.org\/html\/rfc5280.","DOI":"10.17487\/rfc5280"},{"key":"e_1_2_1_118_1","unstructured":"A. Malpani S. Galperin M. Myers R. Ankney and C. Adams. 1999. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol\u2014OCSP. Network Working Group. Retrieved from https:\/\/tools.ietf.org\/html\/rfc2560.  A. Malpani S. Galperin M. Myers R. Ankney and C. Adams. 1999. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol\u2014OCSP. Network Working Group. Retrieved from https:\/\/tools.ietf.org\/html\/rfc2560."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_2_1_120_1","volume-title":"Security with HTTPS and SSL","author":"Blog Android Developer","year":"2017"},{"key":"e_1_2_1_121_1","unstructured":"Lucian Constantin. 2017. Google pushed developers to fix security flaws in 275 000 Android apps. IDG News Service. Retrieved from http:\/\/www.pcworld.com\/article\/3159972\/security\/google-pushed-developers-to-fix-security-flaws-in-275000-android-apps.html.  Lucian Constantin. 2017. Google pushed developers to fix security flaws in 275 000 Android apps. IDG News Service. Retrieved from http:\/\/www.pcworld.com\/article\/3159972\/security\/google-pushed-developers-to-fix-security-flaws-in-275000-android-apps.html."},{"key":"e_1_2_1_122_1","volume-title":"App security improvement program","author":"Blog Android Developer","year":"2017"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_2_1_124_1","volume-title":"Wallach","author":"Shekhar Shashi","year":"2012"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557560"},{"key":"e_1_2_1_127_1","volume-title":"Android Developers Blog.","author":"Security Tips","year":"2018"},{"key":"e_1_2_1_128_1","unstructured":"Ionut Arghire. 2017. App-in-the-middle attacks bypass Android sandbox: Skycure. Information Security News. Retrieved from http:\/\/www.securityweek.com\/app-middle-attacks-bypass-android-sandbox-skycure.  Ionut Arghire. 2017. App-in-the-middle attacks bypass Android sandbox: Skycure. Information Security News. Retrieved from http:\/\/www.securityweek.com\/app-middle-attacks-bypass-android-sandbox-skycure."},{"key":"e_1_2_1_129_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910)","author":"Enck William","year":"1924"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"e_1_2_1_132_1","volume-title":"Proceedings of the 2014 IEEE International Conference on Communications (ICC\u201914)","author":"Jerome Q."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802130.2802132"},{"key":"e_1_2_1_135_1","volume-title":"Google \u2018bouncer","author":"Albanesius Chloe"},{"key":"e_1_2_1_136_1","unstructured":"Ellen Messmer. 2012. Black hat demo: Google bouncer malware detection can be beaten. Retrieved from https:\/\/www.infoworld.com\/article\/2617648\/application-security\/black-hat-demo--google-bouncer-malware-detection-can-be-beaten.html.  Ellen Messmer. 2012. Black hat demo: Google bouncer malware detection can be beaten. Retrieved from https:\/\/www.infoworld.com\/article\/2617648\/application-security\/black-hat-demo--google-bouncer-malware-detection-can-be-beaten.html."},{"key":"e_1_2_1_137_1","unstructured":"Mohit Kumar. 2012. Researchers bypass Google bouncer Android security. Retrieved from https:\/\/thehackernews.com\/2012\/06\/researchers-bypass-google-bouncer.html.  Mohit Kumar. 2012. Researchers bypass Google bouncer Android security. Retrieved from https:\/\/thehackernews.com\/2012\/06\/researchers-bypass-google-bouncer.html."},{"key":"e_1_2_1_138_1","unstructured":"Marie Black. 2018. Do you need antivirus on Android? Retrieved from https:\/\/www.techadvisor.co.uk\/how-to\/google-android\/do-you-need-antivirus-on-android-3668607\/.  Marie Black. 2018. Do you need antivirus on Android? Retrieved from https:\/\/www.techadvisor.co.uk\/how-to\/google-android\/do-you-need-antivirus-on-android-3668607\/."},{"key":"e_1_2_1_139_1","volume-title":"AVPASS: Automatically bypassing Android malware detection system. Black hat events USA.","author":"Jung Jinho","year":"2017"},{"key":"e_1_2_1_140_1","volume-title":"Android users, beware&excl","author":"Abbot Deepak"},{"key":"e_1_2_1_141_1","unstructured":"CNET. Snapdragon 845 speed comparison. 2018. Retrieved from https:\/\/www.cnet.com\/news\/snapdragon-845-speed-versus-galaxy-note-8-pixel-2-xl\/.  CNET. Snapdragon 845 speed comparison. 2018. Retrieved from https:\/\/www.cnet.com\/news\/snapdragon-845-speed-versus-galaxy-note-8-pixel-2-xl\/."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,13]]},"references-count":140,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,31]]}},"alternative-id":["10.1145\/3301285"],"URL":"https:\/\/doi.org\/10.1145\/3301285","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,13]]},"assertion":[{"value":"2018-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}