{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:31:52Z","timestamp":1775838712564,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese National Key Research & Development Project","award":["2019YFB1804400"],"award-info":[{"award-number":["2019YFB1804400"]}]},{"name":"Howg Kong S.A.R Rsearch Grants Council","award":["14209720"],"award-info":[{"award-number":["14209720"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484774","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1566-1580","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Android on PC: On the Security of End-user Android Emulators"],"prefix":"10.1145","author":[{"given":"Fenghao","family":"Xu","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Siyu","family":"Shen","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Wenrui","family":"Diao","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"given":"Kehuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.3. Retrieved","year":"2021","unstructured":"2018. The Transport Layer Security (TLS) Protocol Version 1.3. Retrieved May 7, 2021 from https:\/\/tools.ietf .org\/html\/rf c8446"},{"key":"e_1_3_2_2_2_1","volume-title":"Retrieved","year":"2021","unstructured":"2019. BlueStacks Flaw Lets Attackers Remotely Control Android Emulator. Retrieved August 15, 2021 from https:\/\/www.bleepingcomputer.com\/news\/security\/bluestacks-flaw-lets-attackers-remotely-control-android-emulator\/"},{"key":"e_1_3_2_2_3_1","volume-title":"DeveloperGuide of MuMu (in Chinese). Retrieved","year":"2021","unstructured":"2019. DeveloperGuide of MuMu (in Chinese). Retrieved May 7, 2021 from http:\/\/mumu.163.com\/help\/func\/20190129\/30131_797867.html"},{"key":"e_1_3_2_2_4_1","volume-title":"dumpsys | Android Developers. Retrieved","year":"2021","unstructured":"2020. dumpsys | Android Developers. Retrieved August 15, 2021 from https:\/\/developer.android.com\/studio\/command-line\/dumpsys"},{"key":"e_1_3_2_2_5_1","volume-title":"How to stream PUBG Mobile on YouTube with laptop. Retrieved","year":"2021","unstructured":"2020. How to stream PUBG Mobile on YouTube with laptop. Retrieved May 7, 2021 from https:\/\/www.sportskeeda.com\/esports\/how-stream-pubg-mobile-youtube- laptop"},{"key":"e_1_3_2_2_6_1","volume-title":"Anbox - Android in a Box. Retrieved","year":"2021","unstructured":"2021. Anbox - Android in a Box. Retrieved May 7, 2021 from https:\/\/anbox.io\/"},{"key":"e_1_3_2_2_7_1","volume-title":"Android Debug Bridge (adb) | Android Developers. Retrieved","year":"2021","unstructured":"2021. Android Debug Bridge (adb) | Android Developers. Retrieved May 7, 2021 from https:\/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_2_8_1","volume-title":"Android Emulators Wiki. Retrieved","year":"2021","unstructured":"2021. Android Emulators Wiki. Retrieved May 7, 2021 from https:\/\/emulation.gametechwiki.com\/index.php\/Android_emulators"},{"key":"e_1_3_2_2_9_1","unstructured":"2021. Android Input. Retrieved May 7 2021 from https:\/\/source.android.com\/devices\/input"},{"key":"e_1_3_2_2_10_1","volume-title":"Android Open Source Project. Retrieved","year":"2021","unstructured":"2021. Android Open Source Project. Retrieved May 7, 2021 from https:\/\/source.android.com\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"2021. Android Studio. Retrieved May 7 2021 from https:\/\/developer.android.com\/studio","DOI":"10.1007\/978-1-4842-5937-5_2"},{"key":"e_1_3_2_2_12_1","volume-title":"Application Fundamentals | Android Developers . Retrieved","year":"2021","unstructured":"2021. Application Fundamentals | Android Developers . Retrieved May 7, 2021 from https:\/\/developer.android.com\/guide\/components\/f undamentals"},{"key":"e_1_3_2_2_13_1","unstructured":"2021. AutoHotKey. Retrieved August 15 2021 from https:\/\/www.autohotkey.com\/"},{"key":"e_1_3_2_2_14_1","unstructured":"2021. Bliss OS. Retrieved May 7 2021 from https:\/\/blissos.org\/"},{"key":"e_1_3_2_2_15_1","volume-title":"BlueStacks -- Fastest Android Emulator for PC & Mac |100% Safe and FREE. Retrieved","year":"2021","unstructured":"2021. BlueStacks -- Fastest Android Emulator for PC & Mac |100% Safe and FREE. Retrieved May 7, 2021 from https:\/\/www.bluestacks.com\/"},{"key":"e_1_3_2_2_16_1","volume-title":"Cooperation with NetEase MuMu (in Chinese). Retrieved","year":"2021","unstructured":"2021. Cooperation with NetEase MuMu (in Chinese). Retrieved May 7, 2021 from http:\/\/mumu.163.com\/2016\/12\/15\/25241_661774.html"},{"key":"e_1_3_2_2_17_1","volume-title":"core\/java\/android\/os\/SystemProperties.java - platform\/frameworks\/base - Git at Google. Retrieved","year":"2021","unstructured":"2021. core\/java\/android\/os\/SystemProperties.java - platform\/frameworks\/base - Git at Google. Retrieved May 7, 2021 from https:\/\/android.googlesource.com\/platf orm\/frameworks\/base\/+\/master\/core\/java\/android\/os\/SystemProperties.java"},{"key":"e_1_3_2_2_18_1","volume-title":"Genymotion Android Emulator | Cloud-based Android virtual devices | Develop - Automate your tests - Validate with confidence. Retrieved","year":"2021","unstructured":"2021. Genymotion Android Emulator | Cloud-based Android virtual devices | Develop - Automate your tests - Validate with confidence. Retrieved May 7, 2021 from https:\/\/www.genymotion.com\/"},{"key":"e_1_3_2_2_19_1","volume-title":"Intent and Intent Filters | Android Developers. Retrieved","year":"2021","unstructured":"2021. Intent and Intent Filters | Android Developers. Retrieved May 7, 2021 from https:\/\/developer.android.com\/guide\/components\/intents-filters"},{"key":"e_1_3_2_2_20_1","volume-title":"Free Download. Retrieved","year":"2021","unstructured":"2021. LDPlayer - Fastest Android Emulator for PC, Free Download. Retrieved May 7, 2021 from https:\/\/www.ldplayer.net\/"},{"key":"e_1_3_2_2_21_1","unstructured":"2021. Linux Uinput. Retrieved May 7 2021 from https:\/\/www.kernel.org\/doc\/html\/v4.12\/input\/uinput.html"},{"key":"e_1_3_2_2_22_1","volume-title":"MEmu - The Best Android Emulator for PC - Free Download. Retrieved","year":"2021","unstructured":"2021. MEmu - The Best Android Emulator for PC - Free Download. Retrieved May 7, 2021 from https:\/\/www.memuplay.com\/"},{"key":"e_1_3_2_2_23_1","volume-title":"Oracle VM VirtualBox. Retrieved","year":"2021","unstructured":"2021. Oracle VM VirtualBox. Retrieved May 7, 2021 from https:\/\/www.virtualbox.org\/"},{"key":"e_1_3_2_2_24_1","volume-title":"CODM - GameLoop. Retrieved","year":"2021","unstructured":"2021. PC Android Emulator for PUBG, CODM - GameLoop. Retrieved May 7, 2021 from https:\/\/www.gameloop.com\/en?adtag=def ault"},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved","year":"2021","unstructured":"2021. Top Free Automation Tools for Testing Desktop Applications (2021). Retrieved August 15, 2021 from https:\/\/testguild.com\/automation-tools-desktop\/"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813648"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241183"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.33"},{"key":"e_1_3_2_2_29_1","volume-title":"Persistent Cyber Attacks Targeting Video Game Players and Companies. Retrieved","year":"2021","unstructured":"Akamai. 2020. Akamai Report Reveals Broad, Persistent Cyber Attacks Targeting Video Game Players and Companies. Retrieved May 7, 2021 from https:\/\/www.prnewswire.com\/news-releases\/akamai-report-reveals-broad-persistent-cyber-attacks-targeting-video-game-players-and-companies-301136183.html"},{"key":"e_1_3_2_2_30_1","unstructured":"Android. 2021. AccessibilityService | Android Developers. Retrieved May 7 2021 from https:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityService"},{"key":"e_1_3_2_2_31_1","volume-title":"Configure on-device developer options. Retrieved","year":"2021","unstructured":"Android. 2021. Configure on-device developer options. Retrieved May 7, 2021 from https:\/\/developer.android.com\/studio\/debug\/dev-options"},{"key":"e_1_3_2_2_32_1","volume-title":"Permissions on Android | Android Developers. Retrieved","year":"2021","unstructured":"Android. 2021. Permissions on Android | Android Developers. Retrieved May 7, 2021 from https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_2_2_33_1","volume-title":"Services overview. Retrieved","year":"2021","unstructured":"Android. 2021. Services overview. Retrieved May 7, 2021 from https:\/\/developer.android.com\/guide\/components\/services"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec)","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the 6th USENIX Workshop on Hot Topics in Security (HotSec), San Francisco, CA, USA, August 9, 2011."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Chen Qi Alfred","year":"2014","unstructured":"Qi Alfred Chen, Zhiyun Qian, and Zhuoqing Morley Mao. 2014. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232970"},{"key":"e_1_3_2_2_38_1","volume-title":"No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. In IEEE Symposium on Security and Privacy, SP 2016","author":"Diao Wenrui","year":"2016","unstructured":"Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. 2016. No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. In IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22--26, 2016."},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX-Sec), August 12--14","author":"Elsabagh Mohamed","year":"2020","unstructured":"Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. 2020. FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. In Proceedings of the 29th USENIX Security Symposium (USENIX-Sec), August 12--14, 2020."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00013"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714638"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664250"},{"key":"e_1_3_2_2_45_1","volume-title":"Minecraft hacked! More than 1800 Minecraft account Credentials Leaked. Retrieved","author":"Khandelwal Swati","year":"2021","unstructured":"Swati Khandelwal. 2015. Minecraft hacked! More than 1800 Minecraft account Credentials Leaked. Retrieved May 7, 2021 from https:\/\/thehackernews.com\/2015\/01\/minecraft-game-hacked.html"},{"key":"e_1_3_2_2_46_1","volume-title":"Exclusive - Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data. Retrieved","author":"Khandelwal Swati","year":"2021","unstructured":"Swati Khandelwal. 2019. Exclusive - Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data. Retrieved May 7, 2021 from https:\/\/thehackernews.com\/2019\/09\/zynga-game-hacking.html"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.33"},{"key":"e_1_3_2_2_48_1","volume-title":"SEC 2015, Hamburg, Germany, May 26--28, 2015, Proceedings.","author":"Liu Xiangyu","year":"2015","unstructured":"Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. 2015. An Empirical Study on Android for Saving Non-shared Data on Public Storage. In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26--28, 2015, Proceedings."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_3_2_2_50_1","volume-title":"Quora: Is it safe and secure to log into an Android Emulator. Retrieved","author":"Monroe Shane","year":"2017","unstructured":"Shane Monroe. 2017. Quora: Is it safe and secure to log into an Android Emulator. Retrieved May 7, 2021 from https:\/\/www.quora.com\/Is-it-safe-and-secure-to-log-intoan-Android-Emulator-Bluestacks-or-NOX-App-Player-using-my-Google-account-on-my-PC"},{"key":"e_1_3_2_2_51_1","unstructured":"Nox. 2021. About Nox. Retrieved March 2 2021 from https:\/\/www.bignox.com\/about"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.010"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592791.2592796"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00074"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24479"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)","author":"Ristenpart Thomas","year":"2010","unstructured":"Thomas Ristenpart and Scott Yilek. 2010. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 28th February - 3rd March, 2010."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"e_1_3_2_2_59_1","volume-title":"SimBad: A Rogue Adware Campaign On Google Play - Check Point Research. Retrieved","author":"Root Elena","year":"2021","unstructured":"Elena Root and Andrey Polkovnichenko. 2019. SimBad: A Rogue Adware Campaign On Google Play - Check Point Research. Retrieved May 7, 2021 from https:\/\/research.checkpoint.com\/2019\/simbad-a-rogue-adware-campaign-on-google-play\/"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_1"},{"key":"e_1_3_2_2_61_1","volume-title":"Operation NightScout: Supply-chain attack targets online gaming in Asia | WeLiveSecurity. Retrieved","author":"Sanmillan Ignacio","year":"2021","unstructured":"Ignacio Sanmillan. 2021. Operation NightScout: Supply-chain attack targets online gaming in Asia | WeLiveSecurity. Retrieved May 7, 2021 from https:\/\/www.welivesecurity.com\/2021\/02\/01\/operation-nightscout-supply-chain-attack-online-gaming-asia\/"},{"key":"e_1_3_2_2_62_1","volume-title":"What's trending on the underground market? Retrieved","author":"Security Help Net","year":"2021","unstructured":"Help Net Security. 2020. What's trending on the underground market? Retrieved May 7, 2021 from https:\/\/www.helpnetsecurity.com\/2020\/05\/27\/underground-market-trends\/"},{"key":"e_1_3_2_2_63_1","volume-title":"Attacks in Public Clouds: Can They Hinder the Rise of the Cloud? In Cloud Computing","author":"Shafieian Saeed","unstructured":"Saeed Shafieian, Mohammad Zulkernine, and Anwar Haque. 2014. Attacks in Public Clouds: Can They Hinder the Rise of the Cloud? In Cloud Computing. Springer, 3--22."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978297"},{"key":"e_1_3_2_2_65_1","unstructured":"tcpdump. 2021. TCPDUMP\/LIBPCAP public repository. Retrieved May 7 2021 from https:\/\/www.tcpdump.org\/"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX-Sec)","author":"Tian Dave","year":"2018","unstructured":"Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, and Kevin R. B. Butler. 2018. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. In Proceedings of the 27th USENIX Security Symposium (USENIX-Sec), Baltimore, MD, USA, August 15--17, 2018."},{"key":"e_1_3_2_2_67_1","volume-title":"No Evil: Phishing for Permissions with False Transparency. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Tuncay G\u00fcliz Seray","year":"2020","unstructured":"G\u00fcliz Seray Tuncay, Jingyu Qian, and Carl A. Gunter. 2020. See No Evil: Phishing for Permissions with False Transparency. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590325"},{"key":"e_1_3_2_2_69_1","unstructured":"VirtualBox. 2020. PDM.cpp in vbox\/trunk\/src\/VBox\/VMM\/VMMR3 -- Oracle VM VirtualBox. Retrieved May 7 2021 from https:\/\/www.virtualbox.org\/browser\/vbox\/trunk\/src\/VBox\/VMM\/VMMR3\/PDM.cpp"},{"key":"e_1_3_2_2_70_1","volume-title":"the Remote Desktop Server. Retrieved","year":"2021","unstructured":"VirtualBox. 2021. VBoxHeadless, the Remote Desktop Server. Retrieved May 7, 2021 from https:\/\/www.virtualbox.org\/manual\/ch07.html#vboxheadless"},{"key":"e_1_3_2_2_71_1","volume-title":"Wireshark Go Deep. Retrieved","year":"2021","unstructured":"Wireshark. 2021. Wireshark Go Deep. Retrieved May 7, 2021 from https:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_2_72_1","volume-title":"26th Annual Network and Distributed System Security Symposium, NDSS.","author":"Wu Daoyuan","unstructured":"Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, and Robert H. Deng. 2019. Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment. In 26th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_2_74_1","volume-title":"Proceedings of the 21th USENIX Security Symposium (USENIX-Sec)","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Proceedings of the 21th USENIX Security Symposium (USENIX-Sec), Bellevue, WA, USA, August 8--10, 2012."},{"key":"e_1_3_2_2_75_1","volume-title":"Proceedings of the 2012 IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","author":"Xia Yubin","year":"2012","unstructured":"Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. Defending against VM Rollback Attack. In Proceedings of the 2012 IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Boston, MA, USA, June 25--28, 2012."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382318"},{"key":"e_1_3_2_2_77_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX-Sec)","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In Proceedings of the 25th USENIX Security Symposium (USENIX-Sec), Austin, TX, USA, August 10--12, 2016."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_2_79_1","volume-title":"Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland)","author":"Zhang Yinqian","year":"2011","unstructured":"Yinqian Zhang, Ari Juels, Alina Oprea, and Michael K. Reiter. 2011. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland), Berkeley, California, USA, 22--25 May, 2011."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590313"},{"key":"e_1_3_2_2_82_1","volume-title":"Proceedings of the 2014 IEEE Symposium on Security and Privacy (Oakland)","author":"Lee Yeonjoon","year":"2014","unstructured":"Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, and XiaoFeng Wang. 2014. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (Oakland), Berkeley, CA, USA, May 18--21, 2014."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23146"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134089"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:38Z","timestamp":1763499038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":84,"alternative-id":["10.1145\/3460120.3484774","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484774","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}