{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:04Z","timestamp":1750220824835,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T00:00:00Z","timestamp":1560297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253327"],"award-info":[{"award-number":["1253327"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,12]]},"DOI":"10.1145\/3307334.3326095","type":"proceedings-article","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T12:56:45Z","timestamp":1560776205000},"page":"180-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Permissions Plugins as Android Apps"],"prefix":"10.1145","author":[{"given":"Nisarg","family":"Raval","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Ali","family":"Razeen","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Landon P.","family":"Cox","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Andrew","family":"Warfield","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ActivityThread.getApplicationThread(). https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/java\/android\/app\/ActivityThread.java#L2185.  ActivityThread.getApplicationThread(). https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/java\/android\/app\/ActivityThread.java#L2185."},{"key":"e_1_3_2_1_2_1","unstructured":"Adblock Plus. https:\/\/adblockplus.org.  Adblock Plus. https:\/\/adblockplus.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Developers: android.hardware.camera2. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/package-summary.  Android Developers: android.hardware.camera2. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/package-summary."},{"key":"e_1_3_2_1_4_1","unstructured":"Android Developers: Content providers. https:\/\/developer.android.com\/guide\/topics\/providers\/content-providers.  Android Developers: Content providers. https:\/\/developer.android.com\/guide\/topics\/providers\/content-providers."},{"key":"e_1_3_2_1_5_1","unstructured":"Android Developers: dumpsys. https:\/\/developer.android.com\/studio\/command-line\/dumpsys.  Android Developers: dumpsys. https:\/\/developer.android.com\/studio\/command-line\/dumpsys."},{"key":"e_1_3_2_1_6_1","unstructured":"Android Developers: Permissions overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview.  Android Developers: Permissions overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview."},{"key":"e_1_3_2_1_7_1","unstructured":"Android Developers: Profile battery usage with Batterystats and Battery Historian. https:\/\/developer.android.com\/studio\/profile\/battery-historian.  Android Developers: Profile battery usage with Batterystats and Battery Historian. https:\/\/developer.android.com\/studio\/profile\/battery-historian."},{"key":"e_1_3_2_1_8_1","unstructured":"Android Developers: Who lives and who dies? Process priorities on Android. https:\/\/medium.com\/androiddevelopers\/who-lives-and-who-dies-process-priorities-on-android-cb151f39044f.  Android Developers: Who lives and who dies? Process priorities on Android. https:\/\/medium.com\/androiddevelopers\/who-lives-and-who-dies-process-priorities-on-android-cb151f39044f."},{"key":"e_1_3_2_1_9_1","unstructured":"Android Source: BufferQueue and gralloc. https:\/\/source.android.com\/devices\/graphics\/arch-bq-gralloc.  Android Source: BufferQueue and gralloc. https:\/\/source.android.com\/devices\/graphics\/arch-bq-gralloc."},{"key":"e_1_3_2_1_10_1","unstructured":"Android Source: Source Code Tags and Builds. https:\/\/source.android.com\/setup\/start\/build-numbers#source-code-tags-and-builds.  Android Source: Source Code Tags and Builds. https:\/\/source.android.com\/setup\/start\/build-numbers#source-code-tags-and-builds."},{"key":"e_1_3_2_1_11_1","unstructured":"Android's BitTube source. https:\/\/android.googlesource.com\/platform\/frameworks\/native\/  Android's BitTube source. https:\/\/android.googlesource.com\/platform\/frameworks\/native\/"},{"key":"e_1_3_2_1_12_1","unstructured":"\/android-8.1.0_r1\/libs\/gui\/BitTube.cpp.  \/android-8.1.0_r1\/libs\/gui\/BitTube.cpp."},{"volume-title":"https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/java\/android\/app\/IApplicationThread.aidl#L53","key":"e_1_3_2_1_13_1","unstructured":"ApplicationThread.bindApplication(). https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/java\/android\/app\/IApplicationThread.aidl#L53 . ApplicationThread.bindApplication(). https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/java\/android\/app\/IApplicationThread.aidl#L53."},{"key":"e_1_3_2_1_14_1","unstructured":"Deferring seccomp decisions to user space. https:\/\/lwn.net\/Articles\/756233\/.  Deferring seccomp decisions to user space. https:\/\/lwn.net\/Articles\/756233\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Electronic Frontier Foundation. https:\/\/www.eff.org.  Electronic Frontier Foundation. https:\/\/www.eff.org."},{"key":"e_1_3_2_1_16_1","unstructured":"F-Droid: an installable catalogue of FOSS (Free and Open Source Software) apps. https:\/\/f-droid.org\/en\/.  F-Droid: an installable catalogue of FOSS (Free and Open Source Software) apps. https:\/\/f-droid.org\/en\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Ghostery Goes Open Source. https:\/\/www.ghostery.com\/press\/ghostery-goes-open-source\/.  Ghostery Goes Open Source. https:\/\/www.ghostery.com\/press\/ghostery-goes-open-source\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Google May Remove Access To Undocumented\/Hidden APIs in Android P. https:\/\/www.xda-developers.com\/google-undocumented-hidden-apis-android-p\/.  Google May Remove Access To Undocumented\/Hidden APIs in Android P. https:\/\/www.xda-developers.com\/google-undocumented-hidden-apis-android-p\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Google Play Protect. https:\/\/www.android.com\/play-protect.  Google Play Protect. https:\/\/www.android.com\/play-protect."},{"key":"e_1_3_2_1_20_1","unstructured":"Grubhub. https:\/\/play.google.com\/store\/apps\/details?id=com.grubhub.android.  Grubhub. https:\/\/play.google.com\/store\/apps\/details?id=com.grubhub.android."},{"key":"e_1_3_2_1_21_1","unstructured":"HTTPS Everywhere. https:\/\/www.eff.org\/https-everywhere.  HTTPS Everywhere. https:\/\/www.eff.org\/https-everywhere."},{"key":"e_1_3_2_1_22_1","unstructured":"Modifying System Call Arguments With ptrace. https:\/\/www.alfonsobeato.net\/c\/modifying-system-call-arguments-with-ptrace\/.  Modifying System Call Arguments With ptrace. https:\/\/www.alfonsobeato.net\/c\/modifying-system-call-arguments-with-ptrace\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Privacy Badger. https:\/\/github.com\/EFForg\/privacybadger.  Privacy Badger. https:\/\/github.com\/EFForg\/privacybadger."},{"key":"e_1_3_2_1_24_1","unstructured":"SECCOMP\n  : Linux Programmer's Manual. http:\/\/man7.org\/linux\/man-pages\/man2\/seccomp.2.html.  SECCOMP: Linux Programmer's Manual. http:\/\/man7.org\/linux\/man-pages\/man2\/seccomp.2.html."},{"key":"e_1_3_2_1_25_1","unstructured":"SystemUI Plugins. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/  SystemUI Plugins. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/"},{"key":"e_1_3_2_1_26_1","unstructured":"\/master\/packages\/SystemUI\/docs\/plugins.md.  \/master\/packages\/SystemUI\/docs\/plugins.md."},{"key":"e_1_3_2_1_27_1","unstructured":"Telegram. https:\/\/telegram.org.  Telegram. https:\/\/telegram.org."},{"key":"e_1_3_2_1_28_1","unstructured":"Telegram FOSS. https:\/\/github.com\/Telegram-FOSS-Team\/Telegram-FOSS.  Telegram FOSS. https:\/\/github.com\/Telegram-FOSS-Team\/Telegram-FOSS."},{"key":"e_1_3_2_1_29_1","unstructured":"uBlock Origin. https:\/\/github.com\/gorhill\/uBlock.  uBlock Origin. https:\/\/github.com\/gorhill\/uBlock."},{"key":"e_1_3_2_1_30_1","unstructured":"UnsupportedAppUsage annotation. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/  UnsupportedAppUsage annotation. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/"},{"key":"e_1_3_2_1_31_1","unstructured":"\/master\/core\/java\/android\/annotation\/UnsupportedAppUsage.java#28.  \/master\/core\/java\/android\/annotation\/UnsupportedAppUsage.java#28."},{"key":"e_1_3_2_1_32_1","unstructured":"Xposed. http:\/\/repo.xposed.info.  Xposed. http:\/\/repo.xposed.info."},{"key":"e_1_3_2_1_33_1","unstructured":"XPrivacy. https:\/\/play.google.com\/store\/apps\/details?id=biz.bokhorst.xprivacy.installer&hl=en.  XPrivacy. https:\/\/play.google.com\/store\/apps\/details?id=biz.bokhorst.xprivacy.installer&hl=en."},{"key":"e_1_3_2_1_34_1","unstructured":"XPrivacyLua. https:\/\/lua.xprivacy.eu.  XPrivacyLua. https:\/\/lua.xprivacy.eu."},{"key":"e_1_3_2_1_35_1","unstructured":"Yet Another Hook Framework for ART. https:\/\/github.com\/rk700\/YAHFA.  Yet Another Hook Framework for ART. https:\/\/github.com\/rk700\/YAHFA."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664265"},{"key":"e_1_3_2_1_38_1","volume-title":"Styp-Rekowsky. Boxify: Full-fledged App Sandboxing for Stock Android. In Proceedings of USENIX Security '15","author":"Backes M.","year":"2015","unstructured":"M. Backes , S. Bugiel , C. Hammer , O. Schranz , and P. von Styp-Rekowsky. Boxify: Full-fledged App Sandboxing for Stock Android. In Proceedings of USENIX Security '15 , August 2015 . M. Backes, S. Bugiel, C. Hammer, O. Schranz, and P. von Styp-Rekowsky. Boxify: Full-fledged App Sandboxing for Stock Android. In Proceedings of USENIX Security '15, August 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808122"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of NSDI '14","author":"Chakraborty S.","year":"2014","unstructured":"S. Chakraborty , C. Shen , K. R. Raghavan , Y. Shoukry , M. Millar , and M. Srivastava . ipShield: A Framework for Enforcing Context-aware Privacy . In Proceedings of NSDI '14 , April 2014 . S. Chakraborty, C. Shen, K. R. Raghavan, Y. Shoukry, M. Millar, and M. Srivastava. ipShield: A Framework for Enforcing Context-aware Privacy. In Proceedings of NSDI '14, April 2014."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of NDSS '13","author":"Chen K. Z.","year":"2013","unstructured":"K. Z. Chen , N. Johnson , V. D'Silva , S. Dai , K. MacNamara , T. Magrino , E. Wu , M. Rinard , and D. Song . Contextual Policy Enforcement in Android Applications with Permission Event Graphs . In Proceedings of NDSS '13 , February 2013 . K. Z. Chen, N. Johnson, V. D'Silva, S. Dai, K. MacNamara, T. Magrino, E. Wu, M. Rinard, and D. Song. Contextual Policy Enforcement in Android Applications with Permission Event Graphs. In Proceedings of NDSS '13, February 2013."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139552"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of ISC '10","author":"Conti M.","year":"2010","unstructured":"M. Conti , V. T. N. Nguyen , and B. Crispo . CRePE: Context-Related Policy Enforcement for Android . In Proceedings of ISC '10 , October 2010 . M. Conti, V. T. N. Nguyen, and B. Crispo. CRePE: Context-Related Policy Enforcement for Android. In Proceedings of ISC '10, October 2010."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of USENIX Security '11","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight Provenance for Smart Phone Operating Systems . In Proceedings of USENIX Security '11 , August 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of USENIX Security '11, August 2011."},{"key":"e_1_3_2_1_46_1","volume-title":"September","author":"Fu H.","year":"2017","unstructured":"H. Fu , Z. Zheng , S. Zhu , and P. Mohapatra . INSPIRED: Intention-based Privacy-preserving Permission Model. (arXiv:1709.06654 {cs.CR}) , September 2017 . H. Fu, Z. Zheng, S. Zhu, and P. Mohapatra. INSPIRED: Intention-based Privacy-preserving Permission Model. (arXiv:1709.06654 {cs.CR}), September 2017."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.31"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of ATC '13","author":"Kim T.","year":"2013","unstructured":"T. Kim and N. Zeldovich . Practical and Effective Sandboxing for Non-root Users . In Proceedings of ATC '13 , June 2013 . T. Kim and N. Zeldovich. Practical and Effective Sandboxing for Non-root Users. In Proceedings of ATC '13, June 2013."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.39"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906405"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.015"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of S&P '17","author":"Wijsekera P.","year":"2017","unstructured":"P. Wijsekera , A. Baokar , L. Tsai , J. Reardon , S. Egelman , D. Wagner , and K. Beznosov . The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . In Proceedings of S&P '17 , May 2017 . P. Wijsekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman, D. Wagner, and K. Beznosov. The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences. In Proceedings of S&P '17, May 2017."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of ShmooCon '17","author":"Wu D.","year":"2017","unstructured":"D. Wu and S. Bratus . A Context-Aware Kernel IPC Firewall for Android . In Proceedings of ShmooCon '17 , January 2017 . D. Wu and S. Bratus. A Context-Aware Kernel IPC Firewall for Android. In Proceedings of ShmooCon '17, January 2017."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"}],"event":{"name":"MobiSys '19: The 17th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Seoul Republic of Korea","acronym":"MobiSys '19"},"container-title":["Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307334.3326095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307334.3326095","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307334.3326095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:20Z","timestamp":1750202000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307334.3326095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,12]]},"references-count":59,"alternative-id":["10.1145\/3307334.3326095","10.1145\/3307334"],"URL":"https:\/\/doi.org\/10.1145\/3307334.3326095","relation":{},"subject":[],"published":{"date-parts":[[2019,6,12]]},"assertion":[{"value":"2019-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}