{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:18Z","timestamp":1750220778936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["U1836113, U1836117"],"award-info":[{"award-number":["U1836113, U1836117"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384713","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"458-470","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["NativeX: Native Executioner Freezes Android"],"prefix":"10.1145","author":[{"given":"Qinsheng","family":"Hou","sequence":"first","affiliation":[{"name":"QI-ANXIN Technology Research Institute &amp; Legendsec Information Technology (Beijing) Inc., Beijing, China"}]},{"given":"Yao","family":"Cheng","sequence":"additional","affiliation":[{"name":"Huawei International, Singapore, Singapore"}]},{"given":"Lingyun","family":"Ying","sequence":"additional","affiliation":[{"name":"QI-ANXIN Technology Research Institute &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2015. 5 airplane entertainment systems that will make you forget you're flying coach. https:\/\/www.digitaltrends.com\/cool-tech\/5-best-airlines-for-in-flight-entertainment\/.  2015. 5 airplane entertainment systems that will make you forget you're flying coach. https:\/\/www.digitaltrends.com\/cool-tech\/5-best-airlines-for-in-flight-entertainment\/."},{"key":"e_1_3_2_2_2_1","unstructured":"2017. BU-410: Charging at High and Low Temperatures. https:\/\/batteryuniversity.com\/learn\/article\/charging_at_high_and_low_temperatures.  2017. BU-410: Charging at High and Low Temperatures. https:\/\/batteryuniversity.com\/learn\/article\/charging_at_high_and_low_temperatures."},{"key":"e_1_3_2_2_3_1","unstructured":"2017. Google's Android now powers more than 2 billion devices. https:\/\/www.cnet.com\/news\/google-boasts-2-billion-active-android-devices\/.  2017. Google's Android now powers more than 2 billion devices. https:\/\/www.cnet.com\/news\/google-boasts-2-billion-active-android-devices\/."},{"key":"e_1_3_2_2_4_1","unstructured":"2018. How Long Does It Take a Parked Car to Reach Deadly Hot Temperatures? https:\/\/www.livescience.com\/62651-how-hot-cars-get.html.  2018. How Long Does It Take a Parked Car to Reach Deadly Hot Temperatures? https:\/\/www.livescience.com\/62651-how-hot-cars-get.html."},{"key":"e_1_3_2_2_5_1","unstructured":"2018. Volvo's native Android Auto system. https:\/\/www.youtube.com\/watch?v=SoGrE6t4ejQ.  2018. Volvo's native Android Auto system. https:\/\/www.youtube.com\/watch?v=SoGrE6t4ejQ."},{"key":"e_1_3_2_2_6_1","unstructured":"2019. Android Automotive. https:\/\/source.android.com\/devices\/automotive.  2019. Android Automotive. https:\/\/source.android.com\/devices\/automotive."},{"key":"e_1_3_2_2_7_1","unstructured":"2019. Lock. https:\/\/developer.android.com\/reference\/java\/util\/concurrent\/locks\/Lock.  2019. Lock. https:\/\/developer.android.com\/reference\/java\/util\/concurrent\/locks\/Lock."},{"key":"e_1_3_2_2_8_1","unstructured":"2019. Thermal burn. https:\/\/en.wikipedia.org\/wiki\/Thermal_burn.  2019. Thermal burn. https:\/\/en.wikipedia.org\/wiki\/Thermal_burn."},{"key":"e_1_3_2_2_9_1","unstructured":"2020. Distribution Dashboard. https:\/\/developer.android.com\/about\/dashboards\/.  2020. Distribution Dashboard. https:\/\/developer.android.com\/about\/dashboards\/."},{"key":"e_1_3_2_2_10_1","unstructured":"2020. DJI DEVELOPER TECHNOLOGIES. https:\/\/developer.dji.com\/.  2020. DJI DEVELOPER TECHNOLOGIES. https:\/\/developer.dji.com\/."},{"key":"e_1_3_2_2_11_1","unstructured":"2020. ingenico GROUP. https:\/\/ingenico.us\/mobile-solutions#tablet-pos.  2020. ingenico GROUP. https:\/\/ingenico.us\/mobile-solutions#tablet-pos."},{"key":"e_1_3_2_2_12_1","unstructured":"2020. Smartphone OS Market Share. https:\/\/www.idc.com\/promo\/smartphone-market-share\/os.  2020. Smartphone OS Market Share. https:\/\/www.idc.com\/promo\/smartphone-market-share\/os."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_2"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_15_1","volume-title":"USENIX Security Symposium. 1101--1118","author":"Backes Michael","year":"2016","unstructured":"Michael Backes , Sven Bugiel , Erik Derr , Patrick D McDaniel , Damien Octeau , and Sebastian Weisgerber . 2016 . On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis .. In USENIX Security Symposium. 1101--1118 . Michael Backes, Sven Bugiel, Erik Derr, Patrick D McDaniel, Damien Octeau, and Sebastian Weisgerber. 2016. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.. In USENIX Security Symposium. 1101--1118."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818033"},{"key":"e_1_3_2_2_17_1","volume-title":"23rd USENIX Security Symposium (USENIX Security","author":"Chen Qi Alfred","year":"2014","unstructured":"Qi Alfred Chen , Zhiyun Qian , and Z Morley Mao . 2014 . Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks . In 23rd USENIX Security Symposium (USENIX Security 2014). 1037--1052. Qi Alfred Chen, Zhiyun Qian, and Z Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In 23rd USENIX Security Symposium (USENIX Security 2014). 1037--1052."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_2_19_1","first-page":"19","article-title":"Systematic detection of capability leaks in stock android smartphones","volume":"14","author":"Grace Michael C","year":"2012","unstructured":"Michael C Grace , Yajin Zhou , Zhi Wang , and Xuxian Jiang . 2012 b. Systematic detection of capability leaks in stock android smartphones .. In NDSS , Vol. 14. 19 . Michael C Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012b. Systematic detection of capability leaks in stock android smartphones.. In NDSS, Vol. 14. 19.","journal-title":"NDSS"},{"key":"e_1_3_2_2_20_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 44--62","author":"Gu Yacong","year":"2016","unstructured":"Yacong Gu , Yao Cheng , Lingyun Ying , Yemian Lu , Qi Li , and Purui Su . 2016 . Exploiting android system services through bypassing service helpers . In International Conference on Security and Privacy in Communication Systems. Springer, 44--62 . Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, and Purui Su. 2016. Exploiting android system services through bypassing service helpers. In International Conference on Security and Privacy in Communication Systems. Springer, 44--62."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.40"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813606"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413694"},{"key":"e_1_3_2_2_24_1","volume-title":"David Luke Richardson, and Tim Wyatt","author":"Lineberry Anthony","year":"2010","unstructured":"Anthony Lineberry , David Luke Richardson, and Tim Wyatt . 2010 . These aren't the permissions you're looking for. DefCon , Vol. 18 (2010). Anthony Lineberry, David Luke Richardson, and Tim Wyatt. 2010. These aren't the permissions you're looking for. DefCon, Vol. 18 (2010)."},{"key":"e_1_3_2_2_25_1","unstructured":"Kangjie Lu Zhichun Li Vasileios P Kemerlis Zhenyu Wu Long Lu Cong Zheng Zhiyun Qian Wenke Lee and Guofei Jiang. 2015. Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.. In NDSS .  Kangjie Lu Zhichun Li Vasileios P Kemerlis Zhenyu Wu Long Lu Cong Zheng Zhiyun Qian Wenke Lee and Guofei Jiang. 2015. Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.. In NDSS ."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_2_27_1","unstructured":"Damien Octeau Patrick McDaniel Somesh Jha Alexandre Bartel Eric Bodden Jacques Klein and Yves Le Traon. 2013. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis (2013).  Damien Octeau Patrick McDaniel Somesh Jha Alexandre Bartel Eric Bodden Jacques Klein and Yves Le Traon. 2013. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis (2013)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Siegfried Rasthofer Steven Arzt and Eric Bodden. 2014. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.. In NDSS .  Siegfried Rasthofer Steven Arzt and Eric Bodden. 2014. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.. In NDSS .","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_2_29_1","volume-title":"Zhuoqing Morley Mao, Jason Ott, and Zhiyun Qian.","author":"Shao Yuru","year":"2016","unstructured":"Yuru Shao , Qi Alfred Chen , Zhuoqing Morley Mao, Jason Ott, and Zhiyun Qian. 2016 . Kratos : Discovering Inconsistent Security Policy Enforcement in the Android Framework.. In NDSS . Yuru Shao, Qi Alfred Chen, Zhuoqing Morley Mao, Jason Ott, and Zhiyun Qian. 2016. Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.. In NDSS ."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257273"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978342"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2018.09.069"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897897"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978320"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384713","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":35,"alternative-id":["10.1145\/3320269.3384713","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384713","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}