{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:24Z","timestamp":1763507724966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-16-1-0299"],"award-info":[{"award-number":["W911NF-16-1-0299"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319725","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"151-161","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["ARF"],"prefix":"10.1145","author":[{"suffix":"III","given":"Sigmund Albert","family":"Gorski","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23121"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243842"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.33"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Backes Michael","year":"2016","unstructured":"Michael Backes , Sven Bugiel , Erik Derr , Patrick D McDaniel , Damien Octeau , and Sebastian Weisgerber . 2016 . On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis . In Proceedings of the USENIX Security Symposium. Michael Backes, Sven Bugiel, Erik Derr, Patrick D McDaniel, Damien Octeau, and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949356"},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Dietz Michael","key":"e_1_3_2_1_9_1","unstructured":"Michael Dietz , Shashi Shekhar , Yuliy Pisetsky , Anhei Shu , and Dan S. Wallach . 2011. Quire: Lightweight Provenance for Smart Phone Operating Systems . In Proceedings of the USENIX Security Symposium. Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach. 2011. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the USENIX Security Symposium."},{"volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation.","author":"Enck William","key":"e_1_3_2_1_10_1","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Enck William","year":"2011","unstructured":"William Enck , Damien Octeau , Patrick McDaniel , and Swarat Chaudhuri . 2011 . A Study of Android Application Security . In Proceedings of the USENIX Security Symposium. William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. 2011. A Study of Android Application Security. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec).","author":"Felt Adrienne Porter","year":"2012","unstructured":"Adrienne Porter Felt , Serge Egelman , Matthew Finifter , Devdata Akhawe , and David Wagner . 2012 . How to Ask for Permission . In Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec). Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdata Akhawe, and David Wagner. 2012. How to Ask for Permission. In Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Felt Adrienne Porter","year":"2011","unstructured":"Adrienne Porter Felt , Helen J. Wang , Alexander Moshchuk , Steven Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses . In Proceedings of the USENIX Security Symposium. Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steven Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"volume-title":"Accessed","year":"2018","key":"e_1_3_2_1_21_1","unstructured":"Google. 2018 . Supporting Multiple Users. https:\/\/source.android.com\/devices\/tech\/admin\/multi-user . Accessed Sep. 11, 2018. Google. 2018. Supporting Multiple Users. https:\/\/source.android.com\/devices\/tech\/admin\/multi-user. Accessed Sep. 11, 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300023"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the ISCO Network and Distributed System Security Symposium (NDSS).","author":"Grace Michael","year":"2012","unstructured":"Michael Grace , Yajin Zhou , Zhi Wang , and Xuxian Jiang . 2012 . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proceedings of the ISCO Network and Distributed System Security Symposium (NDSS). Michael Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the ISCO Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Cetus Users and Compiler Infrastructure Workshop (CETUS).","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam , Eric Bodden , Ondrej Lhot\u00e1k , and Laurie Hendren . 2011 . The Soot framework for Java Program Analysis: A Retrospective . In Proceedings of the Cetus Users and Compiler Infrastructure Workshop (CETUS). Patrick Lam, Eric Bodden, Ondrej Lhot\u00e1k, and Laurie Hendren. 2011. The Soot framework for Java Program Analysis: A Retrospective. In Proceedings of the Cetus Users and Compiler Infrastructure Workshop (CETUS)."},{"key":"e_1_3_2_1_29_1","volume-title":"Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel.","author":"Li Li","year":"2014","unstructured":"Li Li , Alexandre Bartel , Jacques Klein , Yves Le Traon , Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2014 . I Know What Leaked in Your Pocket : Uncovering Privacy Leaks on Android Apps with Static Taint Analysis. In CoRR. Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2014. I Know What Leaked in Your Pocket: Uncovering Privacy Leaks on Android Apps with Static Taint Analysis. In CoRR."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Octeau Damien","year":"2013","unstructured":"Damien Octeau , Patrick McDaniel , Somesh Jha , Alexandre Bartel , Eric Bodden , Jacques Klein , and Yves Le Traon . 2013 . Effective Inter-component Communication Mapping in Android with EPPIC: An Essential Step Towards Holistic Security Analysis . In Proceedings of the USENIX Security Symposium. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. 2013. Effective Inter-component Communication Mapping in Android with EPPIC: An Essential Step Towards Holistic Security Analysis. In Proceedings of the USENIX Security Symposium."},{"volume-title":"Accessed","year":"2019","key":"e_1_3_2_1_32_1","unstructured":"Oracle. 2019 . Obtaining Names of Method Parameters. https:\/\/docs.oracle.com\/javase\/tutorial\/reflect\/member\/methodparameterreflection.html . Accessed Jan. 15, 2019. Oracle. 2019. Obtaining Names of Method Parameters. https:\/\/docs.oracle.com\/javase\/tutorial\/reflect\/member\/methodparameterreflection.html. Accessed Jan. 15, 2019."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proceedings of the USENIX Security Symposium. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"volume-title":"Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS).","author":"Shao Yuru","key":"e_1_3_2_1_36_1","unstructured":"Yuru Shao , Jason Ott , Qi Alfred Chen , Zhiyun Qian , and Z. Morley Mao . 2016. Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework . In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS). Yuru Shao, Jason Ott, Qi Alfred Chen, Zhiyun Qian, and Z. Morley Mao. 2016. Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of the Conference of the Centre for Advanced Studies on Collaborative Research.","author":"Vall\u00e9e-Rai Raja","year":"1999","unstructured":"Raja Vall\u00e9e-Rai , Phong Co , Etienne Gagnon , Laurie Hendren , Patrick Lam , and Vijay Sundaresan . 1999 . Soot - A Java Bytecode Optimization Framework . In Proc. of the Conference of the Centre for Advanced Studies on Collaborative Research. Raja Vall\u00e9e-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan. 1999. Soot - A Java Bytecode Optimization Framework. In Proc. of the Conference of the Centre for Advanced Studies on Collaborative Research."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.32"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_16"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319725","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319725"}},"subtitle":["identifying re-delegation vulnerabilities in Android system services"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":42,"alternative-id":["10.1145\/3317549.3319725","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319725","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}