{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:04Z","timestamp":1750220524608,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3450007","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:24:51Z","timestamp":1622748291000},"page":"2733-2744","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization"],"prefix":"10.1145","author":[{"given":"Dongsong","family":"Yu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences, China"}]},{"given":"Guangliang","family":"Yang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences, China"}]},{"given":"Xiaorui","family":"Gong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences, China"}]},{"given":"Xiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Xiaobo","family":"Xiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Yue","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences and University of Chinese Academy of Sciences &amp; Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China, China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Science and University of Chinese Academy of Sciences, China"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. A usb privilege escalation. https:\/\/www.exploit-db.com\/exploits\/45379. 2020. A usb privilege escalation. https:\/\/www.exploit-db.com\/exploits\/45379."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Android MTK. https:\/\/androidmtk.com. 2020. Android MTK. https:\/\/androidmtk.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Checkpolicy. https:\/\/github.com\/SELinuxProject\/selinux\/tree\/master\/checkpolicy. 2020. Checkpolicy. https:\/\/github.com\/SELinuxProject\/selinux\/tree\/master\/checkpolicy."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Convert sparse Android data image (.dat) into filesystem ext4 image. https:\/\/github.com\/xpirt\/sdat2img. 2020. Convert sparse Android data image (.dat) into filesystem ext4 image. https:\/\/github.com\/xpirt\/sdat2img."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Extacy: NLP before and after spaCy. https:\/\/github.com\/chartbeat-labs. 2020. Extacy: NLP before and after spaCy. https:\/\/github.com\/chartbeat-labs."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. Mobile & Tablet Android Share Worldwide. https:\/\/gs.statcounter.com\/. 2020. Mobile & Tablet Android Share Worldwide. https:\/\/gs.statcounter.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. A policy classification model. https:\/\/github.com\/ydsldy\/SEPAL_Model. 2020. A policy classification model. https:\/\/github.com\/ydsldy\/SEPAL_Model."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Project Treble. https:\/\/source.android.com\/devices\/architecture. 2020. Project Treble. https:\/\/source.android.com\/devices\/architecture."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Regex4dummies: A NLP library to find SVO triplets implemented in Python. https:\/\/github.com\/DarkmatterVale\/regex4dummies. 2020. Regex4dummies: A NLP library to find SVO triplets implemented in Python. https:\/\/github.com\/DarkmatterVale\/regex4dummies."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. SELinux Project. http:\/\/selinuxproject.org. 2020. SELinux Project. http:\/\/selinuxproject.org."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. SETools. https:\/\/github.com\/SELinuxProject\/setools. 2020. SETools. https:\/\/github.com\/SELinuxProject\/setools."},{"key":"e_1_3_2_1_12_1","unstructured":"2020. Spacy.https:\/\/spacy.io\/. 2020. Spacy.https:\/\/spacy.io\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2020. Splitting UPDATE.APP. https:\/\/github.com\/jenkins-84\/split_updata.pl. 2020. Splitting UPDATE.APP. https:\/\/github.com\/jenkins-84\/split_updata.pl."},{"key":"e_1_3_2_1_14_1","unstructured":"2020. Tensorflow.https:\/\/www.tensorflow.org\/guide\/estimator. 2020. Tensorflow.https:\/\/www.tensorflow.org\/guide\/estimator."},{"key":"e_1_3_2_1_15_1","unstructured":"2020. Writing SELinux Policy. https:\/\/source.android.com\/security\/selinux\/''. 2020. Writing SELinux Policy. https:\/\/source.android.com\/security\/selinux\/''."},{"key":"e_1_3_2_1_16_1","unstructured":"2020. XDA-developers. https:\/\/www.xda-developers.com\/. 2020. XDA-developers. https:\/\/www.xda-developers.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398923"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134638"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"e_1_3_2_1_21_1","volume-title":"BIGMAC: Fine-Grained Policy Analysis of Android Firmware. In 29th USENIX Security Symposium. USENIX Association, 271\u2013287","author":"Jing\u00a0Tian Grant\u00a0Hernandez Dave","year":"2020","unstructured":"Dave Jing\u00a0Tian Grant\u00a0Hernandez , Anurag\u00a0Swarnim Yadav , Byron\u00a0 J Williams , and Kevin\u00a0 RB Butler . 2020 . BIGMAC: Fine-Grained Policy Analysis of Android Firmware. In 29th USENIX Security Symposium. USENIX Association, 271\u2013287 . Dave Jing\u00a0Tian Grant\u00a0Hernandez, Anurag\u00a0Swarnim Yadav, Byron\u00a0J Williams, and Kevin\u00a0RB Butler. 2020. BIGMAC: Fine-Grained Policy Analysis of Android Firmware. In 29th USENIX Security Symposium. USENIX Association, 271\u2013287."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: a factorization-machine based neural network for CTR prediction. (2017) 1725\u20131731. Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: a factorization-machine based neural network for CTR prediction. (2017) 1725\u20131731.","DOI":"10.24963\/ijcai.2017\/239"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1066473.1066478"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805982"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274709"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251358"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_2_1_29_1","unstructured":"Nick Kralevich. 2017. Honey I Shrunk the Attack Surface. In Blackhat Us. Nick Kralevich. 2017. Honey I Shrunk the Attack Surface. In Blackhat Us."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Daryl Mccullough. 1987. Specifications for Multi-Level Security and a Hook-Up. (1987) 161\u2013161. Daryl Mccullough. 1987. Specifications for Multi-Level Security and a Hook-Up. (1987) 161\u2013161.","DOI":"10.1109\/SP.1987.10009"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2889924"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931043"},{"key":"e_1_3_2_1_33_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119. Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119."},{"volume-title":"WordNet: An electronic lexical database","author":"Miller A","key":"e_1_3_2_1_34_1","unstructured":"George\u00a0 A Miller . 1998. WordNet: An electronic lexical database . MIT press . George\u00a0A Miller. 1998. WordNet: An electronic lexical database. MIT press."},{"key":"e_1_3_2_1_35_1","unstructured":"MITRE. 2020. CVE-2020-0069. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0069. MITRE. 2020. CVE-2020-0069. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0069."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Elena Reshetova Filippo Bonazzi Thomas Nyman Ravishankar Borgaonkar and N Asokan. 2015. Characterizing SEAndroid policies in the wild. arXiv preprint arXiv:1510.05497(2015). Elena Reshetova Filippo Bonazzi Thomas Nyman Ravishankar Borgaonkar and N Asokan. 2015. Characterizing SEAndroid policies in the wild. arXiv preprint arXiv:1510.05497(2015).","DOI":"10.5220\/0005759204820489"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"volume-title":"Advances in computers. Vol.\u00a046","author":"Sandhu S","key":"e_1_3_2_1_38_1","unstructured":"Ravi\u00a0 S Sandhu . 1998. Role-based access control . In Advances in computers. Vol.\u00a046 . Elsevier , 237\u2013286. Ravi\u00a0S Sandhu. 1998. Role-based access control. In Advances in computers. Vol.\u00a046. Elsevier, 237\u2013286."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS). 1\u201312","author":"Sarna-Starosta Beata","year":"2004","unstructured":"Beata Sarna-Starosta and Scott\u00a0 D Stoller . 2004 . Policy analysis for security-enhanced linux . In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS). 1\u201312 . Beata Sarna-Starosta and Scott\u00a0D Stoller. 2004. Policy analysis for security-enhanced linux. In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS). 1\u201312."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.22"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Yuru Shao Jason Ott Yunhan\u00a0Jack Jia Zhiyun Qian and Z\u00a0Morley Mao. 2016. The Misuse of Android Unix Domain Sockets and Security Implications. (2016). Yuru Shao Jason Ott Yunhan\u00a0Jack Jia Zhiyun Qian and Z\u00a0Morley Mao. 2016. The Misuse of Android Unix Domain Sockets and Security Implications. (2016).","DOI":"10.1145\/2976749.2978297"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0020"},{"key":"e_1_3_2_1_43_1","unstructured":"Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android.. In NDSS Vol.\u00a0310. 20\u201338. Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android.. In NDSS Vol.\u00a0310. 20\u201338."},{"volume-title":"KSMA: Breaking Android kernel isolation and Rooting with ARM MMU features. In BlackhatAsia.","year":"2018","key":"e_1_3_2_1_44_1","unstructured":"ThomasKing. 2018 . KSMA: Breaking Android kernel isolation and Rooting with ARM MMU features. In BlackhatAsia. ThomasKing. 2018. KSMA: Breaking Android kernel isolation and Rooting with ARM MMU features. In BlackhatAsia."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_1_46_1","volume-title":"Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning. In 24th {USENIX} Security Symposium.","author":"Wang Ruowen","year":"2015","unstructured":"Ruowen Wang , William Enck , Douglas Reeves , Xinwen Zhang , Peng Ning , Dingbang Xu , Wu Zhou , and Ahmed\u00a0 M Azab . 2015 . Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning. In 24th {USENIX} Security Symposium. Ruowen Wang, William Enck, Douglas Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, and Ahmed\u00a0M Azab. 2015. Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning. In 24th {USENIX} Security Symposium."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990059"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.33"}],"event":{"name":"WWW '21: The Web Conference 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Ljubljana Slovenia","acronym":"WWW '21"},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3450007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:45Z","timestamp":1750195485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":48,"alternative-id":["10.1145\/3442381.3450007","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3450007","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}