{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:52:09Z","timestamp":1776113529410,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":87,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2211790, 1823262, 2106306"],"award-info":[{"award-number":["2211790, 1823262, 2106306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3560424","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8969-5360","authenticated-orcid":false,"given":"Forough","family":"Mehralian","sequence":"first","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7009-2420","authenticated-orcid":false,"given":"Navid","family":"Salehnamadi","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9039-5848","authenticated-orcid":false,"given":"Syed Fatiul","family":"Huq","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6152-7402","authenticated-orcid":false,"given":"Sam","family":"Malek","sequence":"additional","affiliation":[{"name":"University of California, Irvine, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_2_1","volume-title":"Automated Repair of Size-Based Inaccessibility Issues in Mobile Applications. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering. IEEE, 730\u2013742","author":"Alotaibi S","year":"2021","unstructured":"Ali\u00a0S Alotaibi, Paul\u00a0T Chiou, and William\u00a0GJ Halfond. 2021. Automated Repair of Size-Based Inaccessibility Issues in Mobile Applications. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering. IEEE, 730\u2013742."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380392"},{"key":"e_1_3_2_1_4_1","unstructured":"Yair Amit. 2018. Accessibility Clickjacking\u2013Android Malware Evolution.(2016)."},{"key":"e_1_3_2_1_5_1","unstructured":"Android. 2020. About Switch Access for Android. https:\/\/support.google.com\/accessibility\/android\/answer\/6122836?hl=en."},{"key":"e_1_3_2_1_6_1","unstructured":"Android. 2020. Accessibility Scanner - Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.accessibility.auditor&hl=en_US."},{"key":"e_1_3_2_1_7_1","volume-title":"Google. Retrieved","year":"2020","unstructured":"Android. 2020. Espresso : Android Developers. Google. Retrieved August 20, 2020 from https:\/\/developer.android.com\/training\/testing\/espresso"},{"key":"e_1_3_2_1_8_1","volume-title":"Google. Retrieved","year":"2020","unstructured":"Android. 2020. Improve your code with lint checks. Google. Retrieved August 20, 2020 from https:\/\/developer.android.com\/studio\/write\/lint?hl=en"},{"key":"e_1_3_2_1_9_1","volume-title":"Google. Retrieved","year":"2022","unstructured":"Android. 2022. Android Debug Bridge. Google. Retrieved March 15, 2022 from https:\/\/developer.android.com\/studio\/command-line\/adb"},{"key":"e_1_3_2_1_10_1","unstructured":"Apple. 2022. Apple Accessibility Scanner. https:\/\/developer.apple.com\/library\/archive\/documentation\/Accessibility\/Conceptual\/AccessibilityMacOSX\/OSXAXTestingApps.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Meditation\u00a0Moments B.V.2022. Meditation Moments. Retrieved March 10 2022 from https:\/\/play.google.com\/store\/apps\/details?id=com.meditationmoments.meditationmoments&hl=en_US&gl=US"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Campbell Mikey","year":"2021","unstructured":"Mikey Campbell. 2021. Lock screen bypass enables access to Notes in iOS 15. Retrieved February 26, 2022 from https:\/\/appleinsider.com\/articles\/21\/09\/20\/lock-screen-bypass-enables-access-to-notes-in-ios-15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180240"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380327"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409691"},{"key":"e_1_3_2_1_16_1","unstructured":"Bettye\u00a0Rose Connell. 1997. The principles of universal design version 2.0. http:\/\/www. design. ncsu. edu\/cud\/univ_design\/princ_overview. htm (1997)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00021"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2020. AccessibilityNodeInfo. Retrieved March 6 2022 from https:\/\/developer.android.com\/reference\/android\/view\/accessibility\/AccessibilityNodeInfo#isVisibleToUser()"},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2020. Get started on android with talkback - android accessibility help.https:\/\/support.google.com\/accessibility\/android\/answer\/6283677?hl=en."},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","year":"2022","unstructured":"Google. 2022. AccessibilityFlags. Retrieved March 16, 2022 from https:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityServiceInfo#attr_android:accessibilityFlags"},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2022. AccessibilityInteractionController.java. Retrieved May 3 2022 from https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/80943d8\/core\/java\/android\/view\/AccessibilityInteractionController.java#680"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","year":"2022","unstructured":"Google. 2022. AccessibilityNodeInfo. Retrieved March 12, 2022 from https:\/\/developer.android.com\/reference\/android\/view\/accessibility\/AccessibilityNodeInfo"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_25_1","volume-title":"Constraining Accessibility Service Misuse on Android. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Huang Jie","year":"2021","unstructured":"Jie Huang, Michael Backes, and Sven Bugiel. 2021. A11y and Privacy don\u2019t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. In 30th USENIX Security Symposium (USENIX Security 21). 3631\u20133648."},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"IBM.","year":"2020","unstructured":"IBM. 2020. IBM Accessibility Checklist. Retrieved September 14, 2020 from https:\/\/www.ibm.com\/able\/guidelines\/ci162\/accessibility_checklist.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660295"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","year":"2022","unstructured":"KewlApps. 2022. AppLock. Retrieved March 10, 2022 from https:\/\/play.google.com\/store\/apps\/details?id=com.gamemalt.applocker"},{"key":"e_1_3_2_1_29_1","unstructured":"Swati Khandelwal. 2017. New ransomware not just encrypts your Android but also changes Pin Lock. https:\/\/thehackernews.com\/2017\/10\/android-ransomware-pin.html"},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","author":"Koroy Filip","year":"2018","unstructured":"Filip Koroy. 2018. Another BAD iOS 12 Passcode Bypass! 12.1\/12.0.1 (Works on XS). Retrieved February 26, 2022 from https:\/\/www.youtube.com\/watch?v=7CyiouCv6Kk"},{"key":"e_1_3_2_1_31_1","volume-title":"Retrieved","author":"Koroy Filip","year":"2018","unstructured":"Filip Koroy. 2018. iOS 12 Passcode Bypass! Photos & Contacts (Works on XS). Retrieved February 26, 2022 from https:\/\/www.youtube.com\/watch?v=YYucGhyOjUE"},{"key":"e_1_3_2_1_32_1","volume-title":"Mobile and Ubiquitous Systems: Computing","author":"Kraunelis Joshua","unstructured":"Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, and Wei Zhao. 2014. On Malware Leveraging the Android Accessibility Framework. In Mobile and Ubiquitous Systems: Computing, Networking, and Services, Ivan Stojmenovic, Zixue Cheng, and Song Guo (Eds.). Springer International Publishing, Cham, 512\u2013523."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468604"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved","year":"2022","unstructured":"Microsoft. 2022. Accessibility Insights for Android. Retrieved March 13, 2022 from https:\/\/accessibilityinsights.io\/docs\/en\/android\/overview\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Matt Miller. 2017. Monetization Insights from App Professionals. https:\/\/www.data.ai\/en\/insights\/app-monetization\/app-marketers-developers-survey-2\/."},{"key":"e_1_3_2_1_36_1","volume-title":"Accessileaks: Investigating privacy leaks exposed by the android accessibility service.","author":"Naseri Mohammad","year":"2019","unstructured":"Mohammad Naseri, Nataniel\u00a0P Borges\u00a0Jr, Andreas Zeller, and Romain Rouvoy. 2019. Accessileaks: Investigating privacy leaks exposed by the android accessibility service. (2019)."},{"key":"e_1_3_2_1_37_1","unstructured":"OverSight. 2022. OverSight. https:\/\/github.com\/seal-hub\/Oversight."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243785"},{"key":"e_1_3_2_1_39_1","unstructured":"Chuangang Ren Peng Liu and Sencun Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android.. In NDSS."},{"key":"e_1_3_2_1_40_1","unstructured":"Robolectric. 2019. robolectric\/robolectric. https:\/\/github.com\/robolectric\/robolectric"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132547"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445455"},{"key":"e_1_3_2_1_43_1","volume-title":"GroundHog: An Automated Accessibility Crawler for Mobile Apps. In 2022 37th IEEE\/ACM International Conference on Automated Software Engineering. IEEE.","author":"Salehnamadi Navid","year":"2022","unstructured":"Navid Salehnamadi, Forough Mehralian, and Sam Malek. 2022. GroundHog: An Automated Accessibility Crawler for Mobile Apps. In 2022 37th IEEE\/ACM International Conference on Automated Software Engineering. IEEE."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00014"},{"key":"e_1_3_2_1_45_1","unstructured":"Dinesh Venkatesan. 2016. \u201cMalware may abuse androids accessibility service to bypass security enhancements."},{"key":"e_1_3_2_1_46_1","volume-title":"Web Content Accessibility Guidelines (WCAG) Overview","year":"2020","unstructured":"W3. 2020. Web Content Accessibility Guidelines (WCAG) Overview. World Wide Web Consortium. Retrieved August 20, 2020 from https:\/\/www.w3.org\/WAI\/standards-guidelines\/wcag\/"},{"key":"e_1_3_2_1_47_1","volume-title":"Perceivable","author":"Principle","year":"2022","unstructured":"W3. 2022. Principle 1: Perceivable. World Wide Web Consortium. Retrieved March 15, 2022 from https:\/\/www.w3.org\/TR\/WCAG20\/#perceivable"},{"key":"e_1_3_2_1_48_1","volume-title":"Operable","author":"Principle","year":"2022","unstructured":"W3. 2022. Principle 2: Operable. World Wide Web Consortium. Retrieved March 15, 2022 from https:\/\/www.w3.org\/TR\/WCAG20\/#operable"},{"key":"e_1_3_2_1_49_1","volume-title":"Understanding the Four Principles of Accessibility","year":"2022","unstructured":"W3. 2022. Understanding the Four Principles of Accessibility. World Wide Web Consortium. Retrieved March 15, 2022 from https:\/\/www.w3.org\/TR\/UNDERSTANDING-WCAG20\/intro.html#introduction-fourprincs-head"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472749.3474763"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860470"},{"key":"e_1_3_2_1_52_1","unstructured":"Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445186"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3560424","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3560424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:57:54Z","timestamp":1755849474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3560424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":53,"alternative-id":["10.1145\/3551349.3560424","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3560424","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}