{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:26:53Z","timestamp":1755034013273,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100016698","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002222"],"award-info":[{"award-number":["62002222"]}],"id":[{"id":"10.13039\/100016698","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2018-36"],"award-info":[{"award-number":["2018-36"]}],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427263","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"320-331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services"],"prefix":"10.1145","author":[{"given":"Siqi","family":"Ma","sequence":"first","affiliation":[{"name":"the University of Queensland, Australia"}]},{"given":"Hehao","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Wenbo","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO, Australia"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012. Android. http:\/\/www.android.com\/.  2012. Android. http:\/\/www.android.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. tcpdump. http:\/\/www.tcpdump.org\/.  2019. tcpdump. http:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. ADB (Android Debug Bridge) - Android Developers. https:\/\/developer.android.google.cn\/studio\/command-line\/adb.  2020. ADB (Android Debug Bridge) - Android Developers. https:\/\/developer.android.google.cn\/studio\/command-line\/adb."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Drozer. https:\/\/github.com\/FSecureLABS\/drozer.  2020. Drozer. https:\/\/github.com\/FSecureLABS\/drozer."},{"key":"e_1_3_2_1_5_1","unstructured":"Accessed 2020. Apache MINA. http:\/\/mina.apache.org\/.  Accessed 2020. Apache MINA. http:\/\/mina.apache.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Accessed 2020. binwalk. https:\/\/github.com\/ReFirmLabs\/binwalk.  Accessed 2020. binwalk. https:\/\/github.com\/ReFirmLabs\/binwalk."},{"key":"e_1_3_2_1_7_1","unstructured":"Accessed 2020. JEB. https:\/\/www.pnfsoftware.com\/.  Accessed 2020. JEB. https:\/\/www.pnfsoftware.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Accessed 2020. Netty Project. https:\/\/netty.io\/.  Accessed 2020. Netty Project. https:\/\/netty.io\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Accessed 2020. Wireshark. https:\/\/www.wireshark.org\/.  Accessed 2020. Wireshark. https:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813648"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. 25th USENIX Security Symposium (Usenix Security). USENIX Association","author":"Aafer Yousra","year":"2016","unstructured":"Yousra Aafer , Xiao Zhang , and Wenliang Du . 2016 . Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis . In Proc. 25th USENIX Security Symposium (Usenix Security). USENIX Association , Austin, TX, USA. Yousra Aafer, Xiao Zhang, and Wenliang Du. 2016. Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. In Proc. 25th USENIX Security Symposium (Usenix Security). USENIX Association, Austin, TX, USA."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. 18th Annual Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . In Proc. 18th Annual Network and Distributed System Security Symposium (NDSS). Internet Society , San Diego, California, USA,. Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. In Proc. 18th Annual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, California, USA,."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. 20th USENIX Security Symposium (Usenix Security). USENIX","author":"Felt Adrienne\u00a0Porter","year":"2011","unstructured":"Adrienne\u00a0Porter Felt , Helen\u00a0 J. Wang , Alexander Moshchuk , Steve Hanna , and Erika Chin . 2011 . Permission Re-Delegation: Attacks and Defenses . In Proc. 20th USENIX Security Symposium (Usenix Security). USENIX , San Francisco, CA, USA. Adrienne\u00a0Porter Felt, Helen\u00a0J. Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission Re-Delegation: Attacks and Defenses. In Proc. 20th USENIX Security Symposium (Usenix Security). USENIX, San Francisco, CA, USA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766519"},{"volume-title":"Proc. 41th IEEE Symposium on Security and Privacy (SP). IEEE Computer Society","author":"Gamba J.","key":"e_1_3_2_1_18_1","unstructured":"J. Gamba , M. Rashed , A. Razaghpanah , J. Tapiador , and N. Vallina-Rodriguez . 2020. An Analysis of Pre-installed Android Software . In Proc. 41th IEEE Symposium on Security and Privacy (SP). IEEE Computer Society , Los Alamitos, CA, USA. J. Gamba, M. Rashed, A. Razaghpanah, J. Tapiador, and N. Vallina-Rodriguez. 2020. An Analysis of Pre-installed Android Software. In Proc. 41th IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. 19th Annual Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Grace C.","year":"2012","unstructured":"Michael\u00a0 C. Grace , Yajin Zhou , Zhi Wang , and Xuxian Jiang . 2012 . Systematic Detection of Capability Leaks in Stock Android Smartphones . In Proc. 19th Annual Network and Distributed System Security Symposium (NDSS). Internet Society , San Diego, California, USA. Michael\u00a0C. Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proc. 19th Annual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, California, USA."},{"key":"e_1_3_2_1_20_1","volume-title":"Crysl: An extensible approach to validating the correct usage of cryptographic apis","author":"Kr\u00fcger Stefan","year":"2019","unstructured":"Stefan Kr\u00fcger , Johannes Sp\u00e4th , Karim Ali , Eric Bodden , and Mira Mezini . 2019 . Crysl: An extensible approach to validating the correct usage of cryptographic apis . IEEE Transactions on Software Engineering( 2019). Stefan Kr\u00fcger, Johannes Sp\u00e4th, Karim Ali, Eric Bodden, and Mira Mezini. 2019. Crysl: An extensible approach to validating the correct usage of cryptographic apis. IEEE Transactions on Software Engineering(2019)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212496"},{"volume-title":"Proc. 37th International Conference on Software Engineering (ICSE). IEEE Computer Society","author":"Li L.","key":"e_1_3_2_1_22_1","unstructured":"L. Li , A. Bartel , T.\u00a0 F. Bissyand\u00e9 , J. Klein , Y. Le Traon , S. Arzt , S. Rasthofer , E. Bodden , D. Octeau , and P. McDaniel . 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps . In Proc. 37th International Conference on Software Engineering (ICSE). IEEE Computer Society , Florence, Italy. L. Li, A. Bartel, T.\u00a0F. Bissyand\u00e9, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, and P. McDaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proc. 37th International Conference on Software Engineering (ICSE). IEEE Computer Society, Florence, Italy."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877174"},{"key":"e_1_3_2_1_24_1","unstructured":"Ren\u00e9 Mayrhofer Jeffrey\u00a0Vander Stoep Chad Brubaker and Nick Kralevich. 2019. The Android Platform Security Model. CoRR abs\/1904.05572(2019).  Ren\u00e9 Mayrhofer Jeffrey\u00a0Vander Stoep Chad Brubaker and Nick Kralevich. 2019. The Android Platform Security Model. CoRR abs\/1904.05572(2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133977"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345659"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2015.7432975"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23046"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579020"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02744-5_4"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. 27th USENIX Security Symposium (Usenix Security). USENIX","author":"Mohammadjavad\u00a0Seyed Talebi Seyed","year":"2018","unstructured":"Seyed Mohammadjavad\u00a0Seyed Talebi , Hamid Tavakoli , Hang Zhang , Zheng Zhang , Ardalan\u00a0Amiri Sani , and Zhiyun Qian . 2018 . Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems . In Proc. 27th USENIX Security Symposium (Usenix Security). USENIX , Baltimore, MD, USA. Seyed Mohammadjavad\u00a0Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan\u00a0Amiri Sani, and Zhiyun Qian. 2018. Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. In Proc. 27th USENIX Security Symposium (Usenix Security). USENIX, Baltimore, MD, USA."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675015"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0741-5"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.31"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.64"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243843"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00072"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":39,"alternative-id":["10.1145\/3427228.3427263","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427263","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}