{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913522,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["N01347"],"award-info":[{"award-number":["N01347"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359839","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"366-377","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AppVeto"],"prefix":"10.1145","author":[{"given":"Tousif","family":"Osman","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple Inc. 2019. Requesting Permission - App Architecture - iOS - Human Interface Guidelines - Apple Developer. https:\/\/developer.apple.com\/design\/human-interface-guidelines\/ios\/app-architecture\/requesting-permission\/.  Apple Inc. 2019. Requesting Permission - App Architecture - iOS - Human Interface Guidelines - Apple Developer. https:\/\/developer.apple.com\/design\/human-interface-guidelines\/ios\/app-architecture\/requesting-permission\/."},{"volume-title":"28th Annual Computer Security Applications Conference (ACSAC'12)","author":"Aviv Adam J.","key":"e_1_3_2_1_2_1","unstructured":"Adam J. Aviv , Benjamin Sapp , Matt Blaze , and Jonathan M. Smith . 2012. Practicality of accelerometer side channels on smartphones . In 28th Annual Computer Security Applications Conference (ACSAC'12) . Orlando, Florida, USA, 41--50. Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. 2012. Practicality of accelerometer side channels on smartphones. In 28th Annual Computer Security Applications Conference (ACSAC'12). Orlando, Florida, USA, 41--50."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534778"},{"key":"e_1_3_2_1_4_1","volume-title":"Mandatory and Discretionary Protection of Android External Resources. In Network and Distributed System Security Symposium (NDSS'15)","author":"Demetriou Soteris","year":"2015","unstructured":"Soteris Demetriou , Zhou Xiaoyong , Muhammad Naveed , Yeonjoon Lee , Kan Yuan , XiaoFeng Wang , and Carl A Gunter . 2015 . What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. In Network and Distributed System Security Symposium (NDSS'15) . San Diego, CA, USA. Soteris Demetriou, Zhou Xiaoyong, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, and Carl A Gunter. 2015. What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. In Network and Distributed System Security Symposium (NDSS'15). San Diego, CA, USA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_6_1","unstructured":"Google Developers. 2019. App Manifest Overview. https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro  Google Developers. 2019. App Manifest Overview. https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro"},{"key":"e_1_3_2_1_7_1","unstructured":"Google Developers. 2019. App resources overview. https:\/\/developer.android.com\/guide\/topics\/resources\/providing-resources.  Google Developers. 2019. App resources overview. https:\/\/developer.android.com\/guide\/topics\/resources\/providing-resources."},{"key":"e_1_3_2_1_8_1","unstructured":"Google Developers. 2019. AudioRecord. https:\/\/developer.android.com\/reference\/android\/media\/AudioRecord.html.  Google Developers. 2019. AudioRecord. https:\/\/developer.android.com\/reference\/android\/media\/AudioRecord.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Google Developers. 2019. Behavior changes: all apps. https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all  Google Developers. 2019. Behavior changes: all apps. https:\/\/developer.android.com\/about\/versions\/pie\/android-9.0-changes-all"},{"key":"e_1_3_2_1_10_1","unstructured":"Google Developers. 2019. Camera. https:\/\/developer.android.com\/reference\/android\/hardware\/Camera.html  Google Developers. 2019. Camera. https:\/\/developer.android.com\/reference\/android\/hardware\/Camera.html"},{"key":"e_1_3_2_1_11_1","unstructured":"Google Developers. 2019. CameraCaptureSession. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/CameraCaptureSession  Google Developers. 2019. CameraCaptureSession. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/CameraCaptureSession"},{"key":"e_1_3_2_1_12_1","unstructured":"Google Developers. 2019. CaptureRequest. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/CaptureRequest  Google Developers. 2019. CaptureRequest. https:\/\/developer.android.com\/reference\/android\/hardware\/camera2\/CaptureRequest"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Developers. 2019. HAL interface. https:\/\/source.android.com\/devices\/sensors\/hal-interface.html  Google Developers. 2019. HAL interface. https:\/\/source.android.com\/devices\/sensors\/hal-interface.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Google Developers. 2019. MediaRecorder. https:\/\/developer.android.com\/reference\/android\/media\/MediaRecorder  Google Developers. 2019. MediaRecorder. https:\/\/developer.android.com\/reference\/android\/media\/MediaRecorder"},{"key":"e_1_3_2_1_15_1","unstructured":"Google Developers. 2019. &lt;meta-data&gt;. https:\/\/developer.android.com\/guide\/topics\/manifest\/meta-data-element  Google Developers. 2019. &lt;meta-data&gt;. https:\/\/developer.android.com\/guide\/topics\/manifest\/meta-data-element"},{"key":"e_1_3_2_1_16_1","unstructured":"Google Developers. 2019. Permissions overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview.  Google Developers. 2019. Permissions overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview."},{"key":"e_1_3_2_1_17_1","unstructured":"Google Developers. 2019. Sensor. https:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html  Google Developers. 2019. Sensor. https:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Google Developers. 2019. SensorEventListener. https:\/\/developer.android.com\/reference\/kotlin\/android\/hardware\/SensorEventListener  Google Developers. 2019. SensorEventListener. https:\/\/developer.android.com\/reference\/kotlin\/android\/hardware\/SensorEventListener"},{"key":"e_1_3_2_1_19_1","unstructured":"Google Developers. 2019. Sensors Overview. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.  Google Developers. 2019. Sensors Overview. https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview."},{"key":"e_1_3_2_1_20_1","unstructured":"Google Developers. 2019. Services overview. https:\/\/developer.android.com\/guide\/components\/services.html#Foreground  Google Developers. 2019. Services overview. https:\/\/developer.android.com\/guide\/components\/services.html#Foreground"},{"key":"e_1_3_2_1_21_1","unstructured":"Google Developers. 2019. Understand the Activity Lifecycle. https:\/\/developer.android.com\/guide\/components\/activities\/activity-lifecycle  Google Developers. 2019. Understand the Activity Lifecycle. https:\/\/developer.android.com\/guide\/components\/activities\/activity-lifecycle"},{"key":"e_1_3_2_1_22_1","unstructured":"Googlesource.com. 2019. core\/java\/android\/hardware\/SystemSensorManager.java - platform\/frameworks\/base - Git at Google. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/refs\/heads\/master\/core\/java\/android\/hardware\/SystemSensorManager.java#778  Googlesource.com. 2019. core\/java\/android\/hardware\/SystemSensorManager.java - platform\/frameworks\/base - Git at Google. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/refs\/heads\/master\/core\/java\/android\/hardware\/SystemSensorManager.java#778"},{"key":"e_1_3_2_1_23_1","unstructured":"Googlesource.com. 2019. include\/hardware\/sensors.h - platform\/hardware\/libhardware - Git at Google. https:\/\/android.googlesource.com\/platform\/hardware\/libhardware\/+\/master\/include\/hardware\/sensors.h  Googlesource.com. 2019. include\/hardware\/sensors.h - platform\/hardware\/libhardware - Git at Google. https:\/\/android.googlesource.com\/platform\/hardware\/libhardware\/+\/master\/include\/hardware\/sensors.h"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484373"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Andrew Hoog. 2011. Chapter 6 - Android forensic techniques. In Android Forensics Andrew Hoog (Ed.). Syngress Boston 195--284. http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9781597496513100068  Andrew Hoog. 2011. Chapter 6 - Android forensic techniques. In Android Forensics Andrew Hoog (Ed.). Syngress Boston 195--284. http:\/\/www.sciencedirect.com\/science\/article\/pii\/B9781597496513100068","DOI":"10.1016\/B978-1-59749-651-3.10006-8"},{"key":"e_1_3_2_1_26_1","volume-title":"Martin","author":"Jurafsky Dan","year":"2009","unstructured":"Dan Jurafsky and James H . Martin . 2009 . Speech and language processing : an introduction to natural language processing, computational linguistics, and speech recognition (2 ed.). Pearson Prentice Hall . 988 pages. Dan Jurafsky and James H. Martin. 2009. Speech and language processing : an introduction to natural language processing, computational linguistics, and speech recognition (2 ed.). Pearson Prentice Hall. 988 pages."},{"key":"e_1_3_2_1_27_1","unstructured":"MagiskRoot. 2019. Download Xposed for Android Pie 9.0. https:\/\/magiskroot.net\/download-xposed-for-android-pie\/  MagiskRoot. 2019. Download Xposed for Android Pie 9.0. https:\/\/magiskroot.net\/download-xposed-for-android-pie\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"e_1_3_2_1_30_1","unstructured":"Oracle Corporation. 2019. ByteBuffer (Java Platform SE 7). https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/nio\/ByteBuffer.html.  Oracle Corporation. 2019. ByteBuffer (Java Platform SE 7). https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/nio\/ByteBuffer.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766511"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_35_1","volume-title":"PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy. CoRR abs\/1901.07732","author":"Ratazzi Paul","year":"2019","unstructured":"Paul Ratazzi , Ashok Bommisetti , Nian Ji , and Wenliang Du . 2019 . PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy. CoRR abs\/1901.07732 (2019). http:\/\/arxiv.org\/abs\/1901.07732 Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Wenliang Du. 2019. PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy. CoRR abs\/1901.07732 (2019). http:\/\/arxiv.org\/abs\/1901.07732"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197236"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.013"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939924"},{"key":"e_1_3_2_1_39_1","volume-title":"Hearing your touch: A new acoustic side channel on smartphones. CoRR abs\/1903.11137","author":"Shumailov Ilia","year":"2019","unstructured":"Ilia Shumailov , Laurent Simon , Jeff Yan , and Ross Anderson . 2019. Hearing your touch: A new acoustic side channel on smartphones. CoRR abs\/1903.11137 ( 2019 ). http:\/\/arxiv.org\/abs\/1903.11137 Ilia Shumailov, Laurent Simon, Jeff Yan, and Ross Anderson. 2019. Hearing your touch: A new acoustic side channel on smartphones. CoRR abs\/1903.11137 (2019). http:\/\/arxiv.org\/abs\/1903.11137"},{"key":"e_1_3_2_1_40_1","volume-title":"A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs\/1802.02041","author":"Sikder Amit Kumar","year":"2018","unstructured":"Amit Kumar Sikder , Giuseppe Petracca , Hidayet Aksu , Trent Jaeger , and A. Selcuk Uluagac . 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs\/1802.02041 ( 2018 ). http:\/\/arxiv.org\/abs\/1802.02041 Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac. 2018. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs\/1802.02041 (2018). http:\/\/arxiv.org\/abs\/1802.02041"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_3_2_1_42_1","volume-title":"Network and Distributed System Security Symposium (NDSS'13)","author":"Smalley Stephen","year":"2013","unstructured":"Stephen Smalley and Robert Craig . 2013 . Security Enhanced (SE) Android: Bringing Flexible MAC to Android . In Network and Distributed System Security Symposium (NDSS'13) . San Diego, CA, USA. Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In Network and Distributed System Security Symposium (NDSS'13). San Diego, CA, USA."},{"key":"e_1_3_2_1_43_1","volume-title":"IEEE Mobile Security Technologies Workshop (MoST'14)","author":"Song Yihang","year":"2014","unstructured":"Yihang Song , Madhur Kukreti , Rahul Rawat , and Urs Hengartner . 2014 . Two Novel Defenses against Motion-Based Keystroke Inference Attacks . In IEEE Mobile Security Technologies Workshop (MoST'14) . San Jose, CA, USA. Yihang Song, Madhur Kukreti, Rahul Rawat, and Urs Hengartner. 2014. Two Novel Defenses against Motion-Based Keystroke Inference Attacks. In IEEE Mobile Security Technologies Workshop (MoST'14). San Jose, CA, USA."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666622"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"e_1_3_2_1_46_1","unstructured":"Don Turner. 2019. Android Developers Blog: Capturing Audio in Android Q. https:\/\/android-developers.googleblog.com\/2019\/07\/capturing-audio-in-android-q.html  Don Turner. 2019. Android Developers Blog: Capturing Audio in Android Q. https:\/\/android-developers.googleblog.com\/2019\/07\/capturing-audio-in-android-q.html"},{"key":"e_1_3_2_1_47_1","unstructured":"XDA Developers. 2019. Xposed Framework Hub. https:\/\/www.xda-developers.com\/xposed-framework-hub\/  XDA Developers. 2019. Xposed Framework Hub. https:\/\/www.xda-developers.com\/xposed-framework-hub\/"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23482"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Zhang N.","key":"e_1_3_2_1_51_1","unstructured":"N. Zhang , K. Yuan , M. Naveed , X. Zhou , and X. Wang . 2015. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android . In 2015 IEEE Symposium on Security and Privacy . San Jose, CA, USA, 915--930. N. Zhang, K. Yuan, M. Naveed, X. Zhou, and X. Wang. 2015. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. In 2015 IEEE Symposium on Security and Privacy. San Jose, CA, USA, 915--930."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243777"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359839"}},"subtitle":["mobile application self-defense through resource access veto"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":52,"alternative-id":["10.1145\/3359789.3359839","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359839","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}