{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:46Z","timestamp":1750220446729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3448300.3468288","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T14:57:40Z","timestamp":1624546660000},"page":"216-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RIP StrandHogg"],"prefix":"10.1145","author":[{"given":"Jasper","family":"Stang","sequence":"first","affiliation":[{"name":"Julius-Maximilians-Universit\u00e4t, W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[{"name":"Julius-Maximilians-Universit\u00e4t, W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Sascha","family":"Roth","sequence":"additional","affiliation":[{"name":"KOBIL Systems GmbH, Worms, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Chen Qi Alfred","key":"e_1_3_2_1_2_1","unstructured":"Qi Alfred Chen , Zhiyun Qian , and Z. Morley Mao . 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 1037--1052. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/chen Qi Alfred Chen, Zhiyun Qian, and Z. Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1037--1052. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/chen"},{"key":"e_1_3_2_1_3_1","unstructured":"Petr Dvorak. 2020. StrandHogg 2.0: Explained. https:\/\/www.youtube.com\/watch?v=avElCFVuXvo - 17:00.  Petr Dvorak. 2020. StrandHogg 2.0: Explained. https:\/\/www.youtube.com\/watch?v=avElCFVuXvo - 17:00."},{"volume-title":"Phishing on Mobile Devices. In IEEE Workshop on Web 2.0 Security and Privacy.","author":"Felt A. P.","key":"e_1_3_2_1_4_1","unstructured":"A. P. Felt and D. Wagner . 2011 . Phishing on Mobile Devices. In IEEE Workshop on Web 2.0 Security and Privacy. A. P. Felt and D. Wagner. 2011. Phishing on Mobile Devices. In IEEE Workshop on Web 2.0 Security and Privacy."},{"key":"e_1_3_2_1_5_1","volume-title":"Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao, and Atul Prakash.","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Qi Alfred Chen , Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao, and Atul Prakash. 2016 . Android UI Deception Revisited: Attacks and Defenses. In Financial Cryptography and Data Security . Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao, and Atul Prakash. 2016. Android UI Deception Revisited: Attacks and Defenses. In Financial Cryptography and Data Security."},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_6_1","unstructured":"Google. 2019 . Android Documentation - Understand Tasks and Back Stack . Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/components\/activities\/tasks-and-back-stack Google. 2019. Android Documentation - Understand Tasks and Back Stack. Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/components\/activities\/tasks-and-back-stack"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_7_1","unstructured":"Google. 2020 . Android Documentation - &lt;activity&gt; . Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/topics\/manifest\/activity-element Google. 2020. Android Documentation - &lt;activity&gt;. Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/topics\/manifest\/activity-element"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_8_1","unstructured":"Google. 2020 . Android Documentation - Activity . Retrieved Feb 17, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/Activity#moveTaskToBack(boolean) Google. 2020. Android Documentation - Activity. Retrieved Feb 17, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/Activity#moveTaskToBack(boolean)"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_9_1","unstructured":"Google. 2020 . Android Documentation - App Manifest Overview . Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro Google. 2020. Android Documentation - App Manifest Overview. Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-intro"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_10_1","unstructured":"Google. 2020 . Android Documentation - getRunningTasks . Retrieved Feb 15, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/ActivityManager#getRunningTasks(int) Google. 2020. Android Documentation - getRunningTasks. Retrieved Feb 15, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/ActivityManager#getRunningTasks(int)"},{"volume-title":"Android Documentation - Intent (FLAG_ACTIVITY_CLEAR_TASK). Retrieved","year":"2021","key":"e_1_3_2_1_11_1","unstructured":"Google. 2020. Android Documentation - Intent (FLAG_ACTIVITY_CLEAR_TASK). Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent.html#FLAG_ACTIVITY_CLEAR_TASK Google. 2020. Android Documentation - Intent (FLAG_ACTIVITY_CLEAR_TASK). Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent.html#FLAG_ACTIVITY_CLEAR_TASK"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_12_1","unstructured":"Google. 2020 . Android Documentation - Intent (FLAG_ACTIVITY_-EXCLUDE_FROM_RECENTS) . Retrieved Feb 17, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent#FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS Google. 2020. Android Documentation - Intent (FLAG_ACTIVITY_-EXCLUDE_FROM_RECENTS). Retrieved Feb 17, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent#FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_13_1","unstructured":"Google. 2020 . Android Documentation - Intent (FLAG_ACTIVITY_NEW_TASK) . Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent#FLAG_ACTIVITY_NEW_TASK Google. 2020. Android Documentation - Intent (FLAG_ACTIVITY_NEW_TASK). Retrieved Feb 11, 2021 from https:\/\/developer.android.com\/reference\/android\/content\/Intent#FLAG_ACTIVITY_NEW_TASK"},{"volume-title":"Android Documentation - Manifest.permission. Retrieved","year":"2021","key":"e_1_3_2_1_14_1","unstructured":"Google. 2020. Android Documentation - Manifest.permission. Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/reference\/android\/Manifest.permission#GET_TASKS Google. 2020. Android Documentation - Manifest.permission. Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/reference\/android\/Manifest.permission#GET_TASKS"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_15_1","unstructured":"Google. 2020 . Android Documentation - TaskInfo . Retrieved Feb 15, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/TaskInfo#numActivities Google. 2020. Android Documentation - TaskInfo. Retrieved Feb 15, 2021 from https:\/\/developer.android.com\/reference\/android\/app\/TaskInfo#numActivities"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"Google. 2020 . Android Runtime (ART) and Dalvik . Retrieved Feb 11, 2021 from https:\/\/source.android.com\/devices\/tech\/dalvik Google. 2020. Android Runtime (ART) and Dalvik. Retrieved Feb 11, 2021 from https:\/\/source.android.com\/devices\/tech\/dalvik"},{"volume-title":"Android Security Bulletin - Mai","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"Google. 2020. Android Security Bulletin - Mai 2020 . Retrieved Feb 13, 2021 from https:\/\/source.android.com\/security\/bulletin\/2020-05-01 Google. 2020. Android Security Bulletin - Mai 2020. Retrieved Feb 13, 2021 from https:\/\/source.android.com\/security\/bulletin\/2020-05-01"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_18_1","unstructured":"Google. 2020 . GoogleGit - ActivityStarter.java . Retrieved May 17, 2021 from https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/a952197bd161ac0e03abc6acb5f48e4ec2a56e9d Google. 2020. GoogleGit - ActivityStarter.java. Retrieved May 17, 2021 from https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/a952197bd161ac0e03abc6acb5f48e4ec2a56e9d"},{"volume-title":"Restrictions on starting activities from the background. Retrieved","year":"2021","key":"e_1_3_2_1_19_1","unstructured":"Google. 2020. Restrictions on starting activities from the background. Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/guide\/components\/activities\/background-starts Google. 2020. Restrictions on starting activities from the background. Retrieved Mar 8, 2021 from https:\/\/developer.android.com\/guide\/components\/activities\/background-starts"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2792"},{"volume-title":"Network and Distributed System Security Symposium.","author":"Lin C. C.","key":"e_1_3_2_1_21_1","unstructured":"C. C. Lin , H. Li , X. Zhou, and et al. 2014. ScreenMilker: How to Milk Your Android Screen for Secrets . In Network and Distributed System Security Symposium. C. C. Lin, H. Li, X. Zhou, and et al. 2014. ScreenMilker: How to Milk Your Android Screen for Secrets. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_22_1","volume":"201","author":"Liu B.","unstructured":"B. Liu , S. Nath , R. Govindan , and J. Liu. 201 4. DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). B. Liu, S. Nath, R. Govindan, and J. Liu. 2014. DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps. In USENIX Symposium on Networked Systems Design and Implementation (NSDI).","journal-title":"J. Liu."},{"volume-title":"ScreenPass: Secure Password Entry on Touchscreen Devices. In Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).","author":"Liu D.","key":"e_1_3_2_1_23_1","unstructured":"D. Liu , E. Cuervo , V. Pistol , R. Scudellari , and L.P. Cox . 2013 . ScreenPass: Secure Password Entry on Touchscreen Devices. In Annual International Conference on Mobile Systems, Applications, and Services (MobiSys). D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L.P. Cox. 2013. ScreenPass: Secure Password Entry on Touchscreen Devices. In Annual International Conference on Mobile Systems, Applications, and Services (MobiSys)."},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"O'Dea S.","year":"2021","unstructured":"S. O'Dea . [n.d.]. Mobile Android operating system market share by version worldwide from January 2018 to January 2021 . Retrieved March 13, 2021 from https:\/\/www.statista.com\/statistics\/921152\/mobile-android-version-share-worldwide\/ S. O'Dea. [n.d.]. Mobile Android operating system market share by version worldwide from January 2018 to January 2021. Retrieved March 13, 2021 from https:\/\/www.statista.com\/statistics\/921152\/mobile-android-version-share-worldwide\/"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_25_1","unstructured":"Promon. 2019 . The StrandHogg vulnerability . Retrieved Feb 11, 2021 from https:\/\/promon.co\/security-news\/strandhogg\/ Promon. 2019. The StrandHogg vulnerability. Retrieved Feb 11, 2021 from https:\/\/promon.co\/security-news\/strandhogg\/"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_26_1","unstructured":"Promon. 2020 . StrandHogg 2.0 - The 'evil twin '. Retrieved Feb 13, 2021 from https:\/\/promon.co\/strandhogg-2-0\/ Promon. 2020. StrandHogg 2.0 - The 'evil twin'. Retrieved Feb 13, 2021 from https:\/\/promon.co\/strandhogg-2-0\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"C. Ren Peng Liu and S. Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android. In NDSS.  C. Ren Peng Liu and S. Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android. In NDSS.","DOI":"10.14722\/ndss.2017.23529"},{"key":"e_1_3_2_1_28_1","volume-title":"Towards Discovering and Understanding Task Hijacking in Android. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Ren Chuangang","year":"2015","unstructured":"Chuangang Ren , Yulong Zhang , Hui Xue , Tao Wei , and Peng Liu . 2015 . Towards Discovering and Understanding Task Hijacking in Android. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 945--959. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/ren-chuangang Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 945--959. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/ren-chuangang"},{"volume-title":"ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. In International Conference on Computer Communication & Networks.","author":"Wang Z.","key":"e_1_3_2_1_29_1","unstructured":"Z. Wang , C. Li, and et al. Y. Guan. 2016 . ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. In International Conference on Computer Communication & Networks. Z. Wang, C. Li, and et al. Y. Guan. 2016. ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. In International Conference on Computer Communication & Networks."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-00a"},{"key":"e_1_3_2_1_31_1","volume-title":"Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets","author":"Xuxian Jiang Yajin Zhou Wu Zhou","year":"2012","unstructured":"Wu Zhou Xuxian Jiang Yajin Zhou , Zhi Wang . 2012. Hey, You , Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets . North Carolina State University ( 2012 ). https:\/\/www.researchgate.net\/publication\/267787299_Hey_You_Get_Off_of_My_Market_Detecting_Malicious_Apps_in_Official_and_Alternative_Android_Markets Wu Zhou Xuxian Jiang Yajin Zhou, Zhi Wang. 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. North Carolina State University (2012). https:\/\/www.researchgate.net\/publication\/267787299_Hey_You_Get_Off_of_My_Market_Detecting_Malicious_Apps_in_Official_and_Alternative_Android_Markets"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487367"},{"key":"e_1_3_2_1_33_1","volume-title":"Retrieved","author":"Wander","year":"2020","unstructured":"Wander Z. 2020 . StrandHogg 2.0 Exploit Explained - Why Users and Android App Developers should care . Retrieved Feb 27, 2021 from https:\/\/www.xda-developers.com\/strandhogg-2-0-android-vulnerability-explained-developer-mitigation\/ Wander Z. 2020. StrandHogg 2.0 Exploit Explained - Why Users and Android App Developers should care. Retrieved Feb 27, 2021 from https:\/\/www.xda-developers.com\/strandhogg-2-0-android-vulnerability-explained-developer-mitigation\/"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3468288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448300.3468288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:42Z","timestamp":1750193262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448300.3468288"}},"subtitle":["a practical StrandHogg attack detection method on Android"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":33,"alternative-id":["10.1145\/3448300.3468288","10.1145\/3448300"],"URL":"https:\/\/doi.org\/10.1145\/3448300.3468288","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}