690 24th USENIX Security Symposium USENIX Association
[8] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi,
and B. Shastry. Towards taming privilege-escalation attacks on
android. In NDSS, 2012.
[9] L. Cai and H. Chen. Touc hlogger: inferring keystrokes on touch
screen from smartphone motion. In HotSec, 2011.
[10] J. J. K. Chan, K. W. Tan, L. Jiang, and R. K. Balan. The case
for mobile forensics of private data leaks: Towards large-scale
user-oriented privacy protection. In APSYS, 2013.
[11] S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel l eaks
in web applications: A reality today, a challenge tomorrow. In
Oakland, pages 191–206, 2010.
[12] E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing
inter-application communication in android. In MobiSys, pages
239–252. ACM, 2011.
[13] China IT Research Center. Third-part IMEs us-
age stats in China for 2014 Q1. http://www.cnit-
research.com/c ontent/201405/303.html, 2014.
[14] L. P. Cox, P. Gilbert, G. Lawler, V. Pistol, A. Razeen, B. Wu,
and S. Cheemalapati. Spandex: Secure password tra cking for
android. In USENIX Secur ity, 2014.
[15] M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting
privacy leaks in ios applications. In NDSS, 2011.
[16] W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and
A. Sheth. TaintDroid: an information-flow tracking system for
realtime privacy monitoring on sma r tphones. In OSDI, 2010.
[17] W. Enck, P. Gilber t, S. Han, V. Tendulkar, B. - G. Chun, L. P.
Cox, J. Jung, P. McDanie l, a nd A. N. Sheth. Taintdroid: an
information-flow tracking system for realtime privacy monit or-
ing on smartphones. ACM TOCS, 32(2):5, 2014.
[18] B. Ford and R. Cox. Vx32: Lightweight user-level sandboxing
on the x86. In USENIX ATC, 2008.
[19] T. F r aser, L. Badger, and M. Feldman. Hardening cots software
with generic software wrappers. In Oakland, pages 2–16, 1999.
[20] C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks:
automatically de tecting potential privacy leaks in android appli-
cations on a large scale. In Trust, 2012.
[21] I . Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure
environment for untrusted helper applications confining the wily
hacker. In USENIX Securit y, 1996.
[22] M. Grace, Y. Zhou, Z. Wang, and X. Jia ng. Systemati c detection
of capability leaks in stock android smar tphones. In NDSS, 2012.
[23] N. Hardy. The confused deputy:(or why capabilities might have
been invented). SIGOPS Oper. Sys. Review, 22(4):36–38, 1988.
[24] P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall.
These aren’t the droids you’re looking for: Retrofitting android
to protect data from imperious applications. In CCS, 2011.
[25] S. Jana, D. E. Porter, and V. Shmatikov. Txbox: Building secure,
efficient sandboxes with system transactions. In Oakland, 2011.
[26] T. Kim, X. Wang, N. Zeldovich, M. Kaashoek, et al. Intrusion
recovery using selective re-execution. In OSDI, 2010.
[27] T. Kim and N. Zeldovich. Practical and effective sandboxing for
non-root users. In USENIX ATC, pages 139–144, 2013.
[28] O. Laadan and J. Nieh. Transparent checkpoint-restart of multiple
processes on commodity operating systems. In USENIX ATC,
pages 323–336, 2007.
[29] W. S. Labs. Fake input method editor(ime) trojan.
http://community.websense.com/blogs/securitylabs/archive/
2010/07/05/trojan-using-input-method-inject-tec hnology. aspx.
[30] S. Lee, E. L. Wong, D. Goel, M. Dahli n, and V. Shmatikov. πbox:
a plat f or m for privacy-preserving apps. In NSDI, 2013.
[31] D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screen-
pass: S ecure password entry on touchscree n devices. In MobiSys,
pages 291–304, 2013.
[32] M. N auman, S. Khan, and X. Zhang. A pex: extending android
permission model and enforcement with user-defined runtime
constraints. In ASIACCS, pages 328–332, 2010.
[33] D. E . Porter, O. S. Hofmann, C. J. Rossbach, A. Benn, and
E. Witchel. Operating system transactions. In SOSP, 2009.
[34] V. Rastogi, Y. Chen, a nd W. Enck. Appsplayground: A utomatic
security analysis of smartphone applications. In ACM conference
on Data and application security and privacy, 2013.
[35] S. Rosen, Z. Qian, and Z. M. Mao. Appprofiler: a flexible method
of exposing privacy-related behavior in android applications to
end users. In ACM conference on Data and application security
and privacy, pages 221–232. ACM, 2013.
[36] M. A. Salehi, T. Caldwell, A. Fernandez, E. Mickiewicz, E . W.
Rozier, S. Zonouz, and D. Redberg. R eseed: Regular expression
search over encrypted data in the cloud. In CCGrid, 2014.
[37] S. Sidiroglou, O. Laadan, A. D . Keromytis, and J. Nieh. Using
rescue points to navigate software recovery. In Oakland, 2007.
[38] R. Stevens, C. Gibl er, J. Crussell, J. Erickson, and H. Chen. In-
vestigating user privacy in android ad libraries. In Workshop on
Mobile Security Technologies (MoST), 2012.
[39] K. Subramanyam, C. E. Frank, and D. F. Gall i.
Keyloggers: The overlooked threat to computer se-
curity. http://www.keylogger.org/articles/kishore-
subramanyam/keyloggers-the-overlooked-threat-to-computer-
security-7.html.
[40] TechSpot News. Google fired employees for breach-
ing user privacy. http://www.techspot.com/
news/40280-google-fired-employees-
for-breaching-user-privacy.html, 2010.
[41] Y. Xia, Y. Liu, and H. Chen. Archit ecture support for gues t-
transparent vm protection from untrusted hypervisor and physical
attacks. In HPCA, 2013.
[42] Y. Xia, Y. Li u, C. Tan, M. Ma, H. Guan, B. Zang, and H. Chen.
Tinman: eliminating c onfidential mobile data exposure with se-
curity oriented offloading. In EuroSys, 2015.
[43] R. Xu, H. Sa
¨
ıdi, and R. Anderson. Aurasium: Practical policy
enforcement for android applications. In USE NIX Security, 2012.
[44] W. Yang, X. Xiao, B. Andow, S. Li, T. Xie, and W. Enck. App-
context: Differentiating malicious and benign mobile app behav-
iors using context. In ICSE, 2015.
[45] B. Yee, D. S ehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy,
S. Okasaka, N. Narula, and N. Fullagar. Native client: A sand-
box for portable, untrusted x86 native code. Com mun. ACM,
53(1):91–99, Jan. 2010.
[46] H. Yin, D. Song, M. Egele, C . Kruegel, and E. Kirda. Panorama:
Capturing syste m-wide information flow for malware detection
and analysis. In CCS, 2007.
[47] F. Zhang, J. Chen, H. Chen, and B. Zang. Cloudvisor: retrofitting
protection of virtual machines in multi-tenant cloud with nested
virtualization. In SOSP, 2011.
[48] W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged
smartphone applications in third-party a ndroid marketplaces. In
ACM conference on Data and Application Security and Privacy,
pages 317–326. ACM, 2012.
[49] Y. Zhou and X. Jiang. Disse cting android malware: Characteri-
zation and evolution. In Oakland, 2012.
[50] Y. Zhou and X. Jiang. Detecting passive content leaks and pollu-
tion in android applications. In NDSS, 2013.
[51] Y. Zhou, X. Zhang, X. J iang, and V. W. Fre eh. Taming
information-stealing smartphone applica tions (on android). In
Conference on Trust and Trustworthy Computing, 2011.