{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:01:35Z","timestamp":1772042495168,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["2020 Android Security and PrIvacy REsearch (ASPIRE)"],"award-info":[{"award-number":["2020 Android Security and PrIvacy REsearch (ASPIRE)"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1763172 and 1846230"],"award-info":[{"award-number":["1763172 and 1846230"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,14]]},"DOI":"10.1145\/3495243.3560548","type":"proceedings-article","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T15:38:33Z","timestamp":1665761913000},"page":"623-635","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Sifter"],"prefix":"10.1145","author":[{"given":"Hsin-Wei","family":"Hung","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Yingtong","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Ardalan Amiri","family":"Sani","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Linux Security Summit (LSS)","author":"Stoep Jeffrey Vander","year":"2016","unstructured":"Jeffrey Vander Stoep . Android : Protecting the Kernel . In Linux Security Summit (LSS) , 2016 . Jeffrey Vander Stoep. Android: Protecting the Kernel. In Linux Security Summit (LSS), 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Media Framework. https:\/\/source.android.com\/devices\/media.  Android Media Framework. https:\/\/source.android.com\/devices\/media."},{"key":"e_1_3_2_1_3_1","volume-title":"Ardalan Amiri Sani. Mousse: A System for Selective Symbolic Execution of Programs with Untamed Environments. In Proc. ACM EuroSys","author":"Liu Yingtong","year":"2020","unstructured":"Yingtong Liu , Hsin-Wei Hung , and Ardalan Amiri Sani. Mousse: A System for Selective Symbolic Execution of Programs with Untamed Environments. In Proc. ACM EuroSys , 2020 . Yingtong Liu, Hsin-Wei Hung, and Ardalan Amiri Sani. Mousse: A System for Selective Symbolic Execution of Programs with Untamed Environments. In Proc. ACM EuroSys, 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"coverage-guided Linux system call fuzzer. https:\/\/opensource.google.com\/projects\/syzkaller","author":"Syzkaller","year":"2021","unstructured":"Syzkaller : coverage-guided Linux system call fuzzer. https:\/\/opensource.google.com\/projects\/syzkaller , 2021 . Syzkaller: coverage-guided Linux system call fuzzer. https:\/\/opensource.google.com\/projects\/syzkaller, 2021."},{"key":"e_1_3_2_1_5_1","volume-title":"BPF syscall, maps, verifier, samples, llvm. https:\/\/lwn.net\/Articles\/609433\/","author":"Starovoitov Alexei","year":"2014","unstructured":"Alexei Starovoitov . BPF syscall, maps, verifier, samples, llvm. https:\/\/lwn.net\/Articles\/609433\/ , 2014 . Alexei Starovoitov. BPF syscall, maps, verifier, samples, llvm. https:\/\/lwn.net\/Articles\/609433\/, 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/github.com\/iovisor\/bcc\/blob\/master\/docs\/kernel-versions.md","author":"Linux Kernel Version BPF","year":"2022","unstructured":"BPF Features by Linux Kernel Version . https:\/\/github.com\/iovisor\/bcc\/blob\/master\/docs\/kernel-versions.md , 2022 . BPF Features by Linux Kernel Version. https:\/\/github.com\/iovisor\/bcc\/blob\/master\/docs\/kernel-versions.md, 2022."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/lists.linuxfoundation.org\/pipermail\/containers\/2018-February\/038476.html","author":"Dhillon Sargun","year":"2018","unstructured":"Sargun Dhillon . [ PATCH net-next 0\/3] eBPF Seccomp filters. https:\/\/lists.linuxfoundation.org\/pipermail\/containers\/2018-February\/038476.html , 2018 . Sargun Dhillon. [PATCH net-next 0\/3] eBPF Seccomp filters. https:\/\/lists.linuxfoundation.org\/pipermail\/containers\/2018-February\/038476.html, 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"The 5.7 kernel is out. https:\/\/lwn.net\/Articles\/821829\/","author":"Corbet Jonathan","year":"2020","unstructured":"Jonathan Corbet . The 5.7 kernel is out. https:\/\/lwn.net\/Articles\/821829\/ , 2020 . Jonathan Corbet. The 5.7 kernel is out. https:\/\/lwn.net\/Articles\/821829\/, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/lwn.net\/ml\/linux-kernel\/20191220154208.15895-1-kpsingh@chromium.org\/","author":"Singh KP","year":"2019","unstructured":"KP Singh . [ PATCH bpf-next v1 00\/13] MAC and Audit policy using eBPF (KRSI). https:\/\/lwn.net\/ml\/linux-kernel\/20191220154208.15895-1-kpsingh@chromium.org\/ , 2019 . KP Singh. [PATCH bpf-next v1 00\/13] MAC and Audit policy using eBPF (KRSI). https:\/\/lwn.net\/ml\/linux-kernel\/20191220154208.15895-1-kpsingh@chromium.org\/, 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Kernel runtime security instrumentation. https:\/\/lwn.net\/Articles\/798157\/","author":"Edge Jake","year":"2019","unstructured":"Jake Edge . Kernel runtime security instrumentation. https:\/\/lwn.net\/Articles\/798157\/ , 2019 . Jake Edge. Kernel runtime security instrumentation. https:\/\/lwn.net\/Articles\/798157\/, 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Triforce linux syscall fuzzer. https:\/\/github.com\/nccgroup\/TriforceLinuxSyscallFuzzer","author":"Jones Dave","year":"2016","unstructured":"Dave Jones . Triforce linux syscall fuzzer. https:\/\/github.com\/nccgroup\/TriforceLinuxSyscallFuzzer , 2016 . Dave Jones. Triforce linux syscall fuzzer. https:\/\/github.com\/nccgroup\/TriforceLinuxSyscallFuzzer, 2016."},{"key":"e_1_3_2_1_12_1","unstructured":"Trinity: A Linux System call fuzz tester. https:\/\/codemonkey.org.uk\/projects\/trinity\/.  Trinity: A Linux System call fuzz tester. https:\/\/codemonkey.org.uk\/projects\/trinity\/."},{"key":"e_1_3_2_1_13_1","first-page":"2123","volume-title":"Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Corina Jake","year":"2017","unstructured":"Jake Corina , Aravind Machiry , Christopher Salls , Yan Shoshitaishvili , Shuang Hao , Christopher Kruegel , and Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security , pages 2123 -- 2138 , 2017 . Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, and Giovanni Vigna. DIFUZE: Interface Aware Fuzzing for Kernel Drivers. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 2123--2138, 2017."},{"key":"e_1_3_2_1_14_1","first-page":"167","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Schumilo Sergej","year":"2017","unstructured":"Sergej Schumilo , Cornelius Aschermann , Robert Gawlik , Sebastian Schinzel , and Thorsten Holz . kAFL : Hardware-Assisted Feedback Fuzzing for OS Kernels . In 26th USENIX Security Symposium (USENIX Security 17) , pages 167 -- 182 , 2017 . Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In 26th USENIX Security Symposium (USENIX Security 17), pages 167--182, 2017."},{"key":"e_1_3_2_1_15_1","first-page":"729","volume-title":"Suman Jana. MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor , Andrew Aday , and Suman Jana. MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18) , pages 729 -- 743 , 2018 . Shankara Pailoor, Andrew Aday, and Suman Jana. MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In 27th USENIX Security Symposium (USENIX Security 18), pages 729--743, 2018."},{"key":"e_1_3_2_1_16_1","volume-title":"Byoungyoung Lee. HFL: Hybrid Fuzzing on the Linux Kernel. In Proc. Network and Distributed Systems Security Symposium (NDSS)","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim , Dae R. Jeong , Chung Hwan Kim , Yeongjin Jang , Insik Shin , and Byoungyoung Lee. HFL: Hybrid Fuzzing on the Linux Kernel. In Proc. Network and Distributed Systems Security Symposium (NDSS) , 2020 . Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. HFL: Hybrid Fuzzing on the Linux Kernel. In Proc. Network and Distributed Systems Security Symposium (NDSS), 2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"e_1_3_2_1_19_1","first-page":"2741","volume-title":"Nael Abu-Ghazaleh. SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Wang Daimeng","year":"2021","unstructured":"Daimeng Wang , Zheng Zhang , Hang Zhang , Zhiyun Qian , Srikanth V Krishnamurthy , and Nael Abu-Ghazaleh. SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21) , pages 2741 -- 2758 , 2021 . Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V Krishnamurthy, and Nael Abu-Ghazaleh. SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. In 30th USENIX Security Symposium (USENIX Security 21), pages 2741--2758, 2021."},{"key":"e_1_3_2_1_20_1","first-page":"2381","volume-title":"Daniel Austin. Undo Workarounds for Kernel Bugs. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Seyed Talebi Seyed Mohammadjavad","year":"2021","unstructured":"Seyed Mohammadjavad Seyed Talebi , Zhihao Yao , Ardalan Amiri Sani , Zhiyun Qian , and Daniel Austin. Undo Workarounds for Kernel Bugs. In 30th USENIX Security Symposium (USENIX Security 21) , pages 2381 -- 2398 , 2021 . Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, and Daniel Austin. Undo Workarounds for Kernel Bugs. In 30th USENIX Security Symposium (USENIX Security 21), pages 2381--2398, 2021."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972557"},{"key":"e_1_3_2_1_22_1","unstructured":"UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey.  UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/github.com\/Microsoft\/ebpf-for-windows","author":"Windows BPF","year":"2022","unstructured":"e BPF for Windows . https:\/\/github.com\/Microsoft\/ebpf-for-windows , 2022 . eBPF for Windows. https:\/\/github.com\/Microsoft\/ebpf-for-windows, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proc. Network and Distributed Systems Security Symposium (NDSS)","author":"Tal","year":"2003","unstructured":"Tal Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proc. Network and Distributed Systems Security Symposium (NDSS) , 2003 . Tal Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proc. Network and Distributed Systems Security Symposium (NDSS), 2003."},{"key":"e_1_3_2_1_26_1","volume-title":"Mendel Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In Proc. Network and Distributed Systems Security Symposium (NDSS)","author":"Garfinkel Tal","year":"2004","unstructured":"Tal Garfinkel , Ben Pfaff , and Mendel Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In Proc. Network and Distributed Systems Security Symposium (NDSS) , 2004 . Tal Garfinkel, Ben Pfaff, and Mendel Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In Proc. Network and Distributed Systems Security Symposium (NDSS), 2004."},{"key":"e_1_3_2_1_27_1","first-page":"139","volume-title":"Kim and Nickolai Zeldovich. Practical and Effective Sandboxing for Non-root Users. In 2013 USENIX Annual Technical Conference (USENIX ATC 13)","author":"Taesoo","year":"2013","unstructured":"Taesoo Kim and Nickolai Zeldovich. Practical and Effective Sandboxing for Non-root Users. In 2013 USENIX Annual Technical Conference (USENIX ATC 13) , pages 139 -- 144 , 2013 . Taesoo Kim and Nickolai Zeldovich. Practical and Effective Sandboxing for Non-root Users. In 2013 USENIX Annual Technical Conference (USENIX ATC 13), pages 139--144, 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808122"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523678"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.51"},{"key":"e_1_3_2_1_31_1","first-page":"257","volume-title":"Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium","author":"Niels","year":"2003","unstructured":"Niels Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium , pages 257 -- 272 , 2003 . Niels Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium, pages 257--272, 2003."},{"key":"e_1_3_2_1_32_1","volume-title":"In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Williams-King Kent","year":"2020","unstructured":"DeMarinis, Nicholas, Kent Williams-King , Di Jin , Rodrigo Fonseca , and Vasileios P. Kemerlis . Sysfilter: Automated system call filtering for commodity software . In In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID) , 2020 . DeMarinis, Nicholas, Kent Williams-King, Di Jin, Rodrigo Fonseca, and Vasileios P. Kemerlis. Sysfilter: Automated system call filtering for commodity software. In In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2020."},{"issue":"43","key":"e_1_3_2_1_33_1","first-page":"139","article-title":"Implementing selinux as a linux security module","volume":"1","author":"Smalley Stephen","year":"2001","unstructured":"Stephen Smalley , Chris Vance , and Wayne Salamon . Implementing selinux as a linux security module . NAI Labs Report , 1 ( 43 ): 139 , 2001 . Stephen Smalley, Chris Vance, and Wayne Salamon. Implementing selinux as a linux security module. NAI Labs Report, 1(43):139, 2001.","journal-title":"NAI Labs Report"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_32"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.52"},{"key":"e_1_3_2_1_36_1","volume-title":"Multik: A framework for orchestrating multiple specialized kernels. arXiv preprint arXiv:1903.06889","author":"Kuo Hsuan-Chi","year":"2019","unstructured":"Hsuan-Chi Kuo , Akshith Gunasekaran , Yeongjin Jang , Sibin Mohan , Rakesh B Bobba , David Lie , and Jesse Walker . Multik: A framework for orchestrating multiple specialized kernels. arXiv preprint arXiv:1903.06889 , 2019 . Hsuan-Chi Kuo, Akshith Gunasekaran, Yeongjin Jang, Sibin Mohan, Rakesh B Bobba, David Lie, and Jesse Walker. Multik: A framework for orchestrating multiple specialized kernels. arXiv preprint arXiv:1903.06889, 2019."},{"key":"e_1_3_2_1_37_1","volume-title":"Dongyan Xu. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Abubakar Muhammad","year":"2021","unstructured":"Muhammad Abubakar , Adil Ahmad , Pedro Fonseca , and Dongyan Xu. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In 30th USENIX Security Symposium (USENIX Security 21) , 2021 . Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In 30th USENIX Security Symposium (USENIX Security 21), 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052991"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428203"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_1_41_1","volume-title":"Intrusion Detection Using Sequences of System Calls. Journal of computer security, 6(3):151--180","author":"Hofmeyr Steven A","year":"1998","unstructured":"Steven A Hofmeyr , Stephanie Forrest , and Anil Somayaji . Intrusion Detection Using Sequences of System Calls. Journal of computer security, 6(3):151--180 , 1998 . Steven A Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of computer security, 6(3):151--180, 1998."},{"key":"e_1_3_2_1_42_1","first-page":"133","volume-title":"Barak Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. In 1999 IEEE Symposium on Security and Privacy (S&P). IEEE","author":"Warrender Christina","year":"1999","unstructured":"Christina Warrender , Stephanie Forrest , and Barak Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. In 1999 IEEE Symposium on Security and Privacy (S&P). IEEE , pages 133 -- 145 , 1999 . Christina Warrender, Stephanie Forrest, and Barak Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. In 1999 IEEE Symposium on Security and Privacy (S&P). IEEE, pages 133--145, 1999."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.44"},{"key":"e_1_3_2_1_44_1","volume-title":"Anomalous system call detection. ACM Transactions on Information and System Security (TISSEC), 9(1):61--93","author":"Mutz Darren","year":"2006","unstructured":"Darren Mutz , Fredrik Valeur , Giovanni Vigna , and Christopher Kruegel . Anomalous system call detection. ACM Transactions on Information and System Security (TISSEC), 9(1):61--93 , 2006 . Darren Mutz, Fredrik Valeur, Giovanni Vigna, and Christopher Kruegel. Anomalous system call detection. ACM Transactions on Information and System Security (TISSEC), 9(1):61--93, 2006."},{"key":"e_1_3_2_1_45_1","volume-title":"Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1--58","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola , Arindam Banerjee , and Vipin Kumar . Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1--58 , 2009 . Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1--58, 2009."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.69"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.26"},{"key":"e_1_3_2_1_48_1","first-page":"1749","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia , Tapti Palit , Shachee Mishra , and Michalis Polychronakis . Temporal system call specialization for attack surface reduction . In 29th USENIX Security Symposium (USENIX Security 20) , pages 1749 -- 1766 , 2020 . Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, and Michalis Polychronakis. Temporal system call specialization for attack surface reduction. In 29th USENIX Security Symposium (USENIX Security 20), pages 1749--1766, 2020."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/647593.728880"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23056"}],"event":{"name":"ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking","location":"Sydney NSW Australia","acronym":"ACM MobiCom '22","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 28th Annual International Conference on Mobile Computing And Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495243.3560548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495243.3560548","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495243.3560548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:23Z","timestamp":1750182563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495243.3560548"}},"subtitle":["protecting security-critical kernel modules in Android through attack surface reduction"],"short-title":[],"issued":{"date-parts":[[2022,10,14]]},"references-count":51,"alternative-id":["10.1145\/3495243.3560548","10.1145\/3495243"],"URL":"https:\/\/doi.org\/10.1145\/3495243.3560548","relation":{},"subject":[],"published":{"date-parts":[[2022,10,14]]},"assertion":[{"value":"2022-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}