{"id":"https://openalex.org/W4288057756","doi":"https://doi.org/10.1109/sp46214.2022.9833563","title":"Exploit the Last Straw That Breaks Android Systems","display_name":"Exploit the Last Straw That Breaks Android Systems","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4288057756","doi":"https://doi.org/10.1109/sp46214.2022.9833563"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833563","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100433828","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0001-7242-5292"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046500178","display_name":"Keke Lian","orcid":"https://orcid.org/0009-0005-9026-8995"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keke Lian","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111353499","display_name":"Haoyu Xiao","orcid":"https://orcid.org/0009-0000-9342-1055"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Xiao","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433028","display_name":"Zhibo Zhang","orcid":"https://orcid.org/0000-0003-4694-8940"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo Zhang","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["The Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368650","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0001-5538-1478"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052437722","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-9714-5545"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["Fudan University"],"affiliations":[{"raw_affiliation_string":"Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067799841","display_name":"Haixin Duan","orcid":"https://orcid.org/0000-0003-0083-733X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haixin Duan","raw_affiliation_strings":["Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100433828"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.854,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.73646096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2230","last_page":"2247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8811556100845337},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8109668493270874},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7176730036735535},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.6473759412765503},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6267869472503662},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.5463027954101562},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46204066276550293},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.44457489252090454},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24462038278579712},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21674451231956482},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.07444027066230774}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8811556100845337},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8109668493270874},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7176730036735535},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.6473759412765503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6267869472503662},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.5463027954101562},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46204066276550293},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.44457489252090454},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24462038278579712},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21674451231956482},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.07444027066230774},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46214.2022.9833563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833563","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327803","display_name":"Shanghai Rising-Star Program","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1677315679","https://openalex.org/W1878544538","https://openalex.org/W1893159092","https://openalex.org/W2038165128","https://openalex.org/W2088983597","https://openalex.org/W2131018820","https://openalex.org/W2163643194","https://openalex.org/W2534511085","https://openalex.org/W2613534458","https://openalex.org/W2701225458","https://openalex.org/W2733408524","https://openalex.org/W2751955863","https://openalex.org/W2752340395","https://openalex.org/W2766540688","https://openalex.org/W2766898821","https://openalex.org/W2795192879","https://openalex.org/W2798442423","https://openalex.org/W2865298191","https://openalex.org/W2890471546","https://openalex.org/W2891235722","https://openalex.org/W2898689050","https://openalex.org/W2900015620","https://openalex.org/W2947182139","https://openalex.org/W2954121408","https://openalex.org/W2956095933","https://openalex.org/W2984839971","https://openalex.org/W3003830046","https://openalex.org/W3005362731","https://openalex.org/W3015365135","https://openalex.org/W3017857447","https://openalex.org/W3019415692","https://openalex.org/W3019428952","https://openalex.org/W3020105429","https://openalex.org/W3023773629","https://openalex.org/W3028062294","https://openalex.org/W3102754236","https://openalex.org/W3106010854","https://openalex.org/W4251369193","https://openalex.org/W6639560864","https://openalex.org/W6683921424","https://openalex.org/W6774432395","https://openalex.org/W6777101196","https://openalex.org/W6777387379","https://openalex.org/W6777655543"],"related_works":["https://openalex.org/W2352737138","https://openalex.org/W2114381667","https://openalex.org/W4285815317","https://openalex.org/W327645657","https://openalex.org/W4253505977","https://openalex.org/W2011124320","https://openalex.org/W4229710179","https://openalex.org/W4298063370","https://openalex.org/W2965382761","https://openalex.org/W4299620683"],"abstract_inverted_index":{"The":[0],"Android":[1,40,68,105],"system":[2,41,84,123],"services":[3,85,124],"usually":[4],"play":[5],"a":[6,46,72],"critical":[7],"role":[8],"in":[9,39],"running":[10],"multiple":[11],"important":[12],"tasks,":[13],"and":[14,43,97,125],"delivering":[15],"seamless":[16],"user":[17,22],"experiences,":[18],"e.g.,":[19,62],"conveniently":[20],"storing":[21,37],"data.":[23],"In":[24],"this":[25],"paper,":[26],"we":[27,70,112],"conduct":[28,135],"the":[29,35,65,87,92,108,149],"first":[30],"systematic":[31],"security":[32,110],"study":[33],"on":[34,103],"data":[36],"process":[38],"services,":[42],"consequently":[44],"discover":[45],"novel":[47,73],"class":[48],"of":[49],"design":[50],"flaws":[51],"(named":[52],"Straw),":[53],"which":[54,130],"can":[55,131],"lead":[56],"to":[57,80,134,151,155],"serious":[58],"DoS":[59,138],"(Denial-of-Service)":[60],"attacks,":[61],"permanently":[63],"crashing":[64],"whole":[66],"victim":[67],"device.Then":[69],"propose":[71],"directed":[74],"fuzzing":[75],"based":[76],"approach,":[77],"called":[78],"StrawFuzzer,":[79],"automatically":[81],"vet":[82],"all":[83],"against":[86],"straw":[88,116],"vulnerabilities.":[89],"StrawFuzzer":[90,102],"balances":[91],"tradeoff":[93],"between":[94],"path":[95],"exploration":[96],"vulnerability":[98,161],"exploitation.":[99],"By":[100],"applying":[101],"three":[104],"systems":[106],"with":[107,145],"latest":[109],"updates,":[111],"identified":[113],"35":[114],"unique":[115],"vulnerabilities":[117,150],"affecting":[118],"474":[119],"interfaces":[120],"across":[121],"77":[122],"successfully":[126],"generated":[127],"corresponding":[128,152],"exploits,":[129],"be":[132],"used":[133],"various":[136],"permanent/temporary":[137],"attacks.":[139],"We":[140],"have":[141],"reported":[142],"our":[143,160],"findings":[144],"suggestions":[146],"for":[147],"repairing":[148],"vendors.":[153],"Up":[154],"now,":[156],"Google":[157],"has":[158],"rated":[159],"as":[162],"high":[163],"severity.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
