{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:54:37Z","timestamp":1765961677238,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T00:00:00Z","timestamp":1679702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Grants Council of the Hong Kong Special Administrative Region, China","award":["GRF 14219422"],"award-info":[{"award-number":["GRF 14219422"]}]},{"name":"Direct Grant for Research, The Chinese University of Hong Kong","award":["Project No. 4055151"],"award-info":[{"award-number":["Project No. 4055151"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,25]]},"DOI":"10.1145\/3582016.3582060","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T16:59:03Z","timestamp":1679331543000},"page":"756-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Transparent Runtime Change Handling for Android Apps"],"prefix":"10.1145","author":[{"given":"Zizhan","family":"Chen","sequence":"first","affiliation":[{"name":"Chinese University of Hong Kong, China"}]},{"given":"Zili","family":"Shao","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771786"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1654"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966522"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958793"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897927"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2689012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12029-9_25"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950380"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210327"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_11_1","unstructured":"Google. 2022. Android 10. https:\/\/www.android.com\/android-10\/ \t\t\t\t  Google. 2022. Android 10. https:\/\/www.android.com\/android-10\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2022. Android App Life-Cycle. https:\/\/developer.android.com\/guide\/components\/activities\/activity-lifecycle \t\t\t\t  Google. 2022. Android App Life-Cycle. https:\/\/developer.android.com\/guide\/components\/activities\/activity-lifecycle"},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2022. Android Profiler. https:\/\/developer.android.com\/studio \/profile\/android-profiler \t\t\t\t  Google. 2022. Android Profiler. https:\/\/developer.android.com\/studio \/profile\/android-profiler"},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2022. Fragments. https:\/\/developer.android.com\/guide\/fragments \t\t\t\t  Google. 2022. Fragments. https:\/\/developer.android.com\/guide\/fragments"},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2022. Google Play. https:\/\/play.google.com\/ \t\t\t\t  Google. 2022. Google Play. https:\/\/play.google.com\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2022. Handle configuration changes. https:\/\/developer.android.com\/guide\/topics\/resources\/runtime-changes \t\t\t\t  Google. 2022. Handle configuration changes. https:\/\/developer.android.com\/guide\/topics\/resources\/runtime-changes"},{"key":"e_1_3_2_1_17_1","volume-title":"Arpaci-Dusseau","author":"Gunawi Haryadi S.","year":"2008","unstructured":"Haryadi S. Gunawi , Abhishek Rajimwale , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau . 2008 . SQCK : A Declarative File System Checker. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, Richard Draves and Robbert van Renesse (Eds.). USENIX Association , 131\u2013146. http:\/\/www.usenix.org\/events\/osdi08\/tech\/full_papers\/gunawi\/gunawi.pdf Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2008. SQCK: A Declarative File System Checker. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, Richard Draves and Robbert van Renesse (Eds.). USENIX Association, 131\u2013146. http:\/\/www.usenix.org\/events\/osdi08\/tech\/full_papers\/gunawi\/gunawi.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693097"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.824570"},{"key":"e_1_3_2_1_20_1","volume-title":"Workshop on RFID security. 517","author":"Haselsteiner Ernst","year":"2006","unstructured":"Ernst Haselsteiner and Klemens Breitfu\u00df . 2006 . Security in near field communication (NFC) . In Workshop on RFID security. 517 , 517. https:\/\/www.academia.edu\/download\/27719227\/security_in_nfc.pdf Ernst Haselsteiner and Klemens Breitfu\u00df. 2006. Security in near field communication (NFC). In Workshop on RFID security. 517, 517. https:\/\/www.academia.edu\/download\/27719227\/security_in_nfc.pdf"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982612"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592813"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68690-5_12"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970368"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639131"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2756048"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594311"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830802"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447821"},{"key":"e_1_3_2_1_36_1","unstructured":"T-Firefly. 2022. Welcome to ROC-RK3399-PC-PLUS Manual. https:\/\/wiki.t-firefly.com\/en\/ROC-RK3399-PC-PLUS\/index.html \t\t\t\t  T-Firefly. 2022. Welcome to ROC-RK3399-PC-PLUS Manual. https:\/\/wiki.t-firefly.com\/en\/ROC-RK3399-PC-PLUS\/index.html"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_39_1","volume-title":"IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Michelle","year":"2016","unstructured":"Michelle Y. Wong and David Lie. 2016 . IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016 , San Diego, California, USA , February 21-24, 2016 . The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/intellidroid-targeted-input-generator-dynamic-analysis-android-malware.pdf Michelle Y. Wong and David Lie. 2016. IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/intellidroid-targeted-input-generator-dynamic-analysis-android-malware.pdf"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698894"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189256.1189259"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBS.2013.6614215"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.31"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBS.2013.6614219"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7594872"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7583154"}],"event":{"name":"ASPLOS '23: 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Vancouver BC Canada","acronym":"ASPLOS '23"},"container-title":["Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:46Z","timestamp":1750178806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,25]]},"references-count":46,"alternative-id":["10.1145\/3582016.3582060","10.1145\/3582016"],"URL":"https:\/\/doi.org\/10.1145\/3582016.3582060","relation":{},"subject":[],"published":{"date-parts":[[2023,3,25]]},"assertion":[{"value":"2023-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}