{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:24Z","timestamp":1763507724900,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T00:00:00Z","timestamp":1560297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UT System STARs Program"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1850434"],"award-info":[{"award-number":["CNS-1850434"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["U1636107, 61373168"],"award-info":[{"award-number":["U1636107, 61373168"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,12]]},"DOI":"10.1145\/3307334.3326072","type":"proceedings-article","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T12:56:45Z","timestamp":1560776205000},"page":"222-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["\"Jekyll and Hyde\" is Risky"],"prefix":"10.1145","author":[{"given":"Luman","family":"Shi","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Jianming","family":"Fu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Zhengwei","family":"Guo","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Jiang","family":"Ming","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1Mobile Inc. last reviewed 12\/10\/2018. 1Mobile Market . http:\/\/www.1mobile.com\/.  1Mobile Inc. last reviewed 12\/10\/2018. 1Mobile Market . http:\/\/www.1mobile.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"asLody. 2015. VirtualApp . https:\/\/github.com\/asLody\/VirtualApp .  asLody. 2015. VirtualApp . https:\/\/github.com\/asLody\/VirtualApp ."},{"key":"e_1_3_2_1_3_1","unstructured":"Avast Threat Intelligence Team. 2016. Malware posing as dual instance app steals users' Twitter credentials . https:\/\/blog.avast.com\/malware-posing-as-dual-instance-app-steals-users-twitter-credentials .  Avast Threat Intelligence Team. 2016. Malware posing as dual instance app steals users' Twitter credentials . https:\/\/blog.avast.com\/malware-posing-as-dual-instance-app-steals-users-twitter-credentials ."},{"key":"e_1_3_2_1_4_1","unstructured":"Avast Threat Intelligence Team. 2017. Mobile spyware uses sandbox to avoid antivirus detections . https:\/\/blog.avast.com\/mobile-spyware-uses-sandbox-to-avoid-antivirus-detections .  Avast Threat Intelligence Team. 2017. Mobile spyware uses sandbox to avoid antivirus detections . https:\/\/blog.avast.com\/mobile-spyware-uses-sandbox-to-avoid-antivirus-detections ."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15)","author":"Backes Michael","year":"2015","unstructured":"Michael Backes , Sven Bugiel , Christian Hammer , Oliver Schranz , and Philipp von Styp-Rekowsky . 2015 . Boxify: Full-fledged App Sandboxing for Stock Android . In Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15) . Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android. In Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15) ."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp'04)","author":"Ballagas Rafael","year":"2004","unstructured":"Rafael Ballagas , Michael Rohs , Jennifer G Sheridan , and Jan Borchers . 2004 . BYOD: Bring Your Own Device . In Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp'04) . Rafael Ballagas, Michael Rohs, Jennifer G Sheridan, and Jan Borchers. 2004. BYOD: Bring Your Own Device. In Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp'04) ."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2005 USENIX Annual Technical Conference (ATC'05)","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a Fast and Portable Dynamic Translator . In Proceedings of the 2005 USENIX Annual Technical Conference (ATC'05) . Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. In Proceedings of the 2005 USENIX Annual Technical Conference (ATC'05) ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808122"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_17"},{"key":"e_1_3_2_1_11_1","unstructured":"Pew Research Center. 2015. An Analysis of Android App Permissions . http:\/\/www.pewinternet.org\/2015\/11\/10\/an-analysis-of-android-app-permissions\/.  Pew Research Center. 2015. An Analysis of Android App Permissions . http:\/\/www.pewinternet.org\/2015\/11\/10\/an-analysis-of-android-app-permissions\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15)","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 a. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-play Scale . In Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15) . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015a. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-play Scale. In Proceedings of the 24th USENIX Conference on Security Symposium (USENIX Security'15) ."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389791"},{"key":"e_1_3_2_1_14_1","unstructured":"Claudio. last reviewed 12\/10\/2018. Cuckoo . http:\/\/www.cuckoosandbox.org .  Claudio. last reviewed 12\/10\/2018. Cuckoo . http:\/\/www.cuckoosandbox.org ."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_1_16_1","unstructured":"CtripMobile. 2015. DynamicAPK framework . https:\/\/github.com\/CtripMobile\/DynamicAPK .  CtripMobile. 2015. DynamicAPK framework . https:\/\/github.com\/CtripMobile\/DynamicAPK ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_18_1","first-page":"17","article-title":"I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications","volume":"2012","author":"Davis Benjamin","year":"2012","unstructured":"Benjamin Davis , Ben Sanders , Armen Khodaverdian , and Hao Chen . 2012 . I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications . Mobile Security Technologies , Vol. 2012 , 2 (2012), 17 . Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen. 2012. I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications . Mobile Security Technologies, Vol. 2012, 2 (2012), 17.","journal-title":"Mobile Security Technologies"},{"key":"e_1_3_2_1_19_1","volume-title":"Procedia Technology","volume":"9","author":"Disterer Georg","year":"2013","unstructured":"Georg Disterer and Carsten Kleiner . 2013 . BYOD Bring Your Own Device . Procedia Technology , Vol. 9 (2013). Georg Disterer and Carsten Kleiner. 2013. BYOD Bring Your Own Device . Procedia Technology, Vol. 9 (2013)."},{"key":"e_1_3_2_1_20_1","unstructured":"Dean Evans. 2015. What is BYOD and why is it important? https:\/\/www.techradar.com\/news\/computing\/what-is-byod-and-why-is-it-important-1175088 .  Dean Evans. 2015. What is BYOD and why is it important? https:\/\/www.techradar.com\/news\/computing\/what-is-byod-and-why-is-it-important-1175088 ."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2011 Web 2.0 Security & Privacy .","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt and David Wagner . 2011 . Phishing on Mobile Devices . In Proceedings of the 2011 Web 2.0 Security & Privacy . Adrienne Porter Felt and David Wagner. 2011. Phishing on Mobile Devices. In Proceedings of the 2011 Web 2.0 Security & Privacy ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800004"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS'07)","author":"Garfinkel Tal","year":"2007","unstructured":"Tal Garfinkel , Keith Adams , Andrew Warfield , and Jason Franklin . 2007 . Compatibility is Not Transparency: VMM Detection Myths and Realities . In Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS'07) . Tal Garfinkel, Keith Adams, Andrew Warfield, and Jason Franklin. 2007. Compatibility is Not Transparency: VMM Detection Myths and Realities. In Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS'07) ."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yunfeng Hong Yongjian Hu Chun-Ming Lai S. Felix Wu Iulian Neamtiu Patrick McDaniel Paul Yu Hasan Cam and Gail-Joon Ahn. 2017. Defining and Detecting Environment Discrimination in Android Apps. In SecureComm'17 .  Yunfeng Hong Yongjian Hu Chun-Ming Lai S. Felix Wu Iulian Neamtiu Patrick McDaniel Paul Yu Hasan Cam and Gail-Joon Ahn. 2017. Defining and Detecting Environment Discrimination in Android Apps. In SecureComm'17 .","DOI":"10.1007\/978-3-319-78813-5_26"},{"key":"e_1_3_2_1_28_1","unstructured":"Qihoo Inc. 2015. DroidPlugin . https:\/\/github.com\/DroidPluginTeam\/DroidPlugin .  Qihoo Inc. 2015. DroidPlugin . https:\/\/github.com\/DroidPluginTeam\/DroidPlugin ."},{"key":"e_1_3_2_1_29_1","unstructured":"Israel Levy. 2014. BufferZone . https:\/\/bufferzonesecurity.com\/.  Israel Levy. 2014. BufferZone . https:\/\/bufferzonesecurity.com\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Dimitry Ivanov. 2016. GOT hook in Android 6.0.1 . https:\/\/android.googlesource.com\/platform\/bionic\/  Dimitry Ivanov. 2016. GOT hook in Android 6.0.1 . https:\/\/android.googlesource.com\/platform\/bionic\/"},{"key":"e_1_3_2_1_31_1","unstructured":"\/d88e1f350111b3dfd71c6492321f0503cb5540db .  \/d88e1f350111b3dfd71c6492321f0503cb5540db ."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_33_1","unstructured":"Durai Jiiva. 2017. How To Install Same App Multiple Times On Android Device . https:\/\/www.premiuminfo.org\/install-same-app-multiple-times-android-device\/.  Durai Jiiva. 2017. How To Install Same App Multiple Times On Android Device . https:\/\/www.premiuminfo.org\/install-same-app-multiple-times-android-device\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68542-7_69"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"key":"e_1_3_2_1_36_1","unstructured":"Swati Khandelwal. 2015. How to Run Two WhatsApp Accounts in One Phone . https:\/\/thehackernews.com\/2015\/04\/multiple-whatsapp-accounts.html .  Swati Khandelwal. 2015. How to Run Two WhatsApp Accounts in One Phone . https:\/\/thehackernews.com\/2015\/04\/multiple-whatsapp-accounts.html ."},{"key":"e_1_3_2_1_37_1","unstructured":"Swati Khandelwal. 2017. Nasty Android Malware that Infected Millions Returns to Google Play Store . https:\/\/thehackernews.com\/2017\/01\/hummingbad-android-malware.html .  Swati Khandelwal. 2017. Nasty Android Malware that Infected Millions Returns to Google Play Store . https:\/\/thehackernews.com\/2017\/01\/hummingbad-android-malware.html ."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081341"},{"key":"e_1_3_2_1_39_1","unstructured":"LBE Tech. 2016. How Parallel Space helps you run multiple accounts on Android . http:\/\/blog.parallelspace-app.com\/how-parallel-space-helps-you-run-multiple-accounts-on-android\/.  LBE Tech. 2016. How Parallel Space helps you run multiple accounts on Android . http:\/\/blog.parallelspace-app.com\/how-parallel-space-helps-you-run-multiple-accounts-on-android\/."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 11th International Conference on Information Security Theory and Practice (WISTP'17)","author":"Leguesse Yonas","year":"2017","unstructured":"Yonas Leguesse , Mark Vella , and Joshua Ellul . 2017 . AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics . In Proceedings of the 11th International Conference on Information Security Theory and Practice (WISTP'17) . Yonas Leguesse, Mark Vella, and Joshua Ellul. 2017. AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics. In Proceedings of the 11th International Conference on Information Security Theory and Practice (WISTP'17) ."},{"key":"e_1_3_2_1_41_1","volume-title":"Flexible Installability of Android Apps with App-level Virtualization based Decomposition . CoRR","author":"Liu Yi","year":"2017","unstructured":"Yi Liu , Yun Ma , and Xuanzhe Liu . 2017. Flexible Installability of Android Apps with App-level Virtualization based Decomposition . CoRR , Vol. abs\/ 1712 .00236 ( 2017 ). Yi Liu, Yun Ma, and Xuanzhe Liu. 2017. Flexible Installability of Android Apps with App-level Virtualization based Decomposition . CoRR, Vol. abs\/1712.00236 (2017)."},{"key":"e_1_3_2_1_42_1","volume-title":"Seongeun Kang, and Souhwan Jung.","author":"Long Nguyen Vu","year":"2017","unstructured":"Nguyen Vu Long , Ngoc Tu Chau , Seongeun Kang, and Souhwan Jung. 2017 . Android Rooting : An Arms Race between Evasion and Detection . Security & Communication Networks , Vol. 2017 , 3 (2017), 1--13. Nguyen Vu Long, Ngoc Tu Chau, Seongeun Kang, and Souhwan Jung. 2017. Android Rooting: An Arms Race between Evasion and Detection . Security & Communication Networks, Vol. 2017, 3 (2017), 1--13."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.12"},{"key":"e_1_3_2_1_44_1","unstructured":"Shubham Meena. 2017. How To Install Same App Two Times On Android . https:\/\/www.trickscity.com\/install-one-app-two-times-on-android\/.  Shubham Meena. 2017. How To Install Same App Two Times On Android . https:\/\/www.trickscity.com\/install-one-app-two-times-on-android\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.42"},{"key":"e_1_3_2_1_46_1","volume-title":"Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl.","author":"Neuner Sebastian","year":"2014","unstructured":"Sebastian Neuner , Victor Van der Veen , Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl. 2014 . Enter Sandbox : Android Sandbox Comparison . CoRR , Vol. abs\/ 1410 .7749 (2014). Sebastian Neuner, Victor Van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, and Edgar Weippl. 2014. Enter Sandbox: Android Sandbox Comparison . CoRR, Vol. abs\/1410.7749 (2014)."},{"key":"e_1_3_2_1_47_1","unstructured":"Oracle. last reviewed 12\/10\/2018. VirtualBox . https:\/\/www.virtualbox.org\/.  Oracle. last reviewed 12\/10\/2018. VirtualBox . https:\/\/www.virtualbox.org\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_1_49_1","unstructured":"Dan Price. 2018. How to Run Multiple Copies of the Same App on Android . https:\/\/www.makeuseof.com\/tag\/run-multiple-app-copies-android\/.  Dan Price. 2018. How to Run Multiple Copies of the Same App on Android . https:\/\/www.makeuseof.com\/tag\/run-multiple-app-copies-android\/."},{"key":"e_1_3_2_1_50_1","unstructured":"Qihoo Inc. last reviewed 12\/10\/2018. Qihoo 360 Mobile Assistant . http:\/\/zhushou.360.cn\/.  Qihoo Inc. last reviewed 12\/10\/2018. Qihoo 360 Mobile Assistant . http:\/\/zhushou.360.cn\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.13"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642977"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831203"},{"key":"e_1_3_2_1_54_1","unstructured":"Mitja Rutnik. 2018. What is stock Android? https:\/\/www.androidauthority.com\/what-is-stock-android-845627\/.  Mitja Rutnik. 2018. What is stock Android? https:\/\/www.androidauthority.com\/what-is-stock-android-845627\/."},{"key":"e_1_3_2_1_55_1","volume-title":"Cydia Substrate: The powerful code modification platform behind Cydia","author":"IT.","year":"2014","unstructured":"Saurik IT. 2014 . Cydia Substrate: The powerful code modification platform behind Cydia . http:\/\/www.cydiasubstrate.com\/. SaurikIT. 2014. Cydia Substrate: The powerful code modification platform behind Cydia . http:\/\/www.cydiasubstrate.com\/."},{"key":"e_1_3_2_1_56_1","unstructured":"Rafia Shaikh. 2017. Chinese Ad Company That Turned Out to Be a Cyber Crime Group Is Back with \u201ca Whale of a Tale\u201d . https:\/\/wccftech.com\/hummingwhale-android-malware\/.  Rafia Shaikh. 2017. Chinese Ad Company That Turned Out to Be a Cyber Crime Group Is Back with \u201ca Whale of a Tale\u201d . https:\/\/wccftech.com\/hummingwhale-android-malware\/."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810362.2810364"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.017"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23003"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808126"},{"key":"e_1_3_2_1_61_1","unstructured":"Tencent Inc. 2012. Tencent App Gem . http:\/\/android.myapp.com\/.  Tencent Inc. 2012. Tencent App Gem . http:\/\/android.myapp.com\/."},{"key":"e_1_3_2_1_62_1","unstructured":"Tencent United Security Laboratory. 2018. Tencent TRP-AI anti-virus white paper . https:\/\/slab.qq.com\/news\/authority\/1744.html .  Tencent United Security Laboratory. 2018. Tencent TRP-AI anti-virus white paper . https:\/\/slab.qq.com\/news\/authority\/1744.html ."},{"key":"e_1_3_2_1_63_1","unstructured":"JC Torres. 2015. Android Pay won't work with rooted devices custom ROMS . https:\/\/www.slashgear.com\/android-pay-wont-work-with-rooted-devices-custom-roms-28406544\/.  JC Torres. 2015. Android Pay won't work with rooted devices custom ROMS . https:\/\/www.slashgear.com\/android-pay-wont-work-with-rooted-devices-custom-roms-28406544\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Connor Tumbleson and Ryszard Wi$acutes$niewski. last reviewed 12\/10\/2018. Apktool: A tool for reverse engineering Android apk files . https:\/\/ibotpeaches.github.io\/Apktool\/.  Connor Tumbleson and Ryszard Wi$acutes$niewski. last reviewed 12\/10\/2018. Apktool: A tool for reverse engineering Android apk files . https:\/\/ibotpeaches.github.io\/Apktool\/."},{"key":"e_1_3_2_1_65_1","unstructured":"Ronen Tzur. last reviewed 12\/10\/2018. Sandboxie . https:\/\/www.sandboxie.com\/.  Ronen Tzur. last reviewed 12\/10\/2018. Sandboxie . https:\/\/www.sandboxie.com\/."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_22"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_3_2_1_68_1","unstructured":"VMware. 2014. VMware Workstation . https:\/\/www.vmware.com\/.  VMware. 2014. VMware Workstation . https:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 21th USENIX Conference on Security Symposium (USENIX Security'12)","author":"Xu Rubin","year":"2012","unstructured":"Rubin Xu , Hassen Sa\"idi, and Ross J Anderson . 2012 . Aurasium: Practical Policy Enforcement for Android Applications . In Proceedings of the 21th USENIX Conference on Security Symposium (USENIX Security'12) . Rubin Xu, Hassen Sa\"idi, and Ross J Anderson. 2012. Aurasium: Practical Policy Enforcement for Android Applications. In Proceedings of the 21th USENIX Conference on Security Symposium (USENIX Security'12) ."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052986"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_8"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884863"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23255"},{"key":"e_1_3_2_1_75_1","unstructured":"Cong Zheng Wenjun Hu and Zhi Xu. 2017. A New Trend in Android Adware: Abusing Android Plugin Frameworks . https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-new-trend-android-adware-abusing-android-plugin-frameworks\/.  Cong Zheng Wenjun Hu and Zhi Xu. 2017. A New Trend in Android Adware: Abusing Android Plugin Frameworks . https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-new-trend-android-adware-abusing-android-plugin-frameworks\/."},{"key":"e_1_3_2_1_76_1","unstructured":"Cong Zheng and Tongbo Luo. 2016. PluginPhantom: New Android Trojan Abuses \u201cDroidPlugin\u201d Framework . https:\/\/researchcenter.paloaltonetworks.com\/2016\/11\/unit42-pluginphantom-new-android-trojan-abuses-droidplugin-framework\/.  Cong Zheng and Tongbo Luo. 2016. PluginPhantom: New Android Trojan Abuses \u201cDroidPlugin\u201d Framework . https:\/\/researchcenter.paloaltonetworks.com\/2016\/11\/unit42-pluginphantom-new-android-trojan-abuses-droidplugin-framework\/."},{"volume-title":"Proceedings of the 10th International Wireless Communications and Mobile Computing Conference (IWCMC'14)","author":"Zheng Min","key":"e_1_3_2_1_77_1","unstructured":"Min Zheng , Mingshen Sun , and John C.S. Lui . 2014. DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability . In Proceedings of the 10th International Wireless Communications and Mobile Computing Conference (IWCMC'14) . Min Zheng, Mingshen Sun, and John C.S. Lui. 2014. DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability. In Proceedings of the 10th International Wireless Communications and Mobile Computing Conference (IWCMC'14) ."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"MobiSys '19: The 17th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Seoul Republic of Korea","acronym":"MobiSys '19"},"container-title":["Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307334.3326072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307334.3326072","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307334.3326072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:20Z","timestamp":1750202000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307334.3326072"}},"subtitle":["Shared-Everything Threat Mitigation in Dual-Instance Apps"],"short-title":[],"issued":{"date-parts":[[2019,6,12]]},"references-count":79,"alternative-id":["10.1145\/3307334.3326072","10.1145\/3307334"],"URL":"https:\/\/doi.org\/10.1145\/3307334.3326072","relation":{},"subject":[],"published":{"date-parts":[[2019,6,12]]},"assertion":[{"value":"2019-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}