{"id":"https://openalex.org/W2538281165","doi":"https://doi.org/10.1145/2976749.2989056","title":"POSTER","display_name":"POSTER","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2538281165","doi":"https://doi.org/10.1145/2976749.2989056","mag":"2538281165"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2989056","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]},{"id":"https://openalex.org/I4210121786","display_name":"Max Planck Institute for Software Systems","ror":"https://ror.org/02pe2kf23","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210121786"]},{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Michael Backes","raw_affiliation_strings":["CISPA, Saarland University &amp; MPI-SWS, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University &amp; MPI-SWS, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I4210121786","https://openalex.org/I91712215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085053271","display_name":"Sven Bugiel","orcid":"https://orcid.org/0000-0002-7151-9614"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]},{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sven Bugiel","raw_affiliation_strings":["CISPA, Saarland University, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101628289","display_name":"Jie Huang","orcid":"https://orcid.org/0000-0002-6126-7214"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]},{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jie Huang","raw_affiliation_strings":["CISPA, Saarland University, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015148802","display_name":"Oliver Schranz","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]},{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Oliver Schranz","raw_affiliation_strings":["CISPA, Saarland University, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA, Saarland University, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801","https://openalex.org/I91712215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004014878"],"corresponding_institution_ids":["https://openalex.org/I4210121786","https://openalex.org/I4210128801","https://openalex.org/I91712215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11313564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1811","last_page":"1813"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7896420955657959},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7593608498573303},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.6532571911811829},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.6165523529052734},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5213750004768372},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.518328070640564},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.4948422312736511},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4717358350753784},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.43966910243034363},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.4306511878967285},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38017091155052185},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.21891191601753235}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7896420955657959},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7593608498573303},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.6532571911811829},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.6165523529052734},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5213750004768372},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.518328070640564},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.4948422312736511},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4717358350753784},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.43966910243034363},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.4306511878967285},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38017091155052185},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.21891191601753235},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2989056","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2071672346","https://openalex.org/W2085101183","https://openalex.org/W2123437505","https://openalex.org/W2441135008","https://openalex.org/W2505939533","https://openalex.org/W2573983983","https://openalex.org/W2949838346"],"related_works":["https://openalex.org/W2033352828","https://openalex.org/W2355810117","https://openalex.org/W4392500255","https://openalex.org/W2726379155","https://openalex.org/W3200050756","https://openalex.org/W191656338","https://openalex.org/W2292865721","https://openalex.org/W4286977168","https://openalex.org/W3154959642","https://openalex.org/W2181712945"],"abstract_inverted_index":{"On":[0],"Android,":[1],"advertising":[2,15,81],"libraries":[3,43,82],"are":[4],"commonly":[5],"integrated":[6],"with":[7,31,103],"their":[8],"host":[9,13,29,88,105,134],"apps.":[10],"Since":[11],"the":[12,18,38,48,87,91,104,130],"and":[14,26,68,75,90,108,135,155,165,172],"components":[16],"share":[17],"application's":[19],"sandbox,":[20],"advertisement":[21,42,136,157],"code":[22,67,71,154],"inherits":[23],"all":[24],"permissions":[25,109],"can":[27],"access":[28,162],"resources":[30,107],"no":[32],"further":[33],"approval":[34],"needed.":[35],"Motivated":[36],"by":[37,112],"privacy":[39],"risks":[40],"of":[41,151],"as":[44],"already":[45],"shown":[46],"in":[47],"literature,":[49],"this":[50],"poster":[51],"introduces":[52],"an":[53],"Android":[54,121],"Runtime":[55],"(ART)":[56],"based":[57],"app":[58,66,89,93,114,122,153],"compartmentalization":[59],"mechanism":[60],"to":[61,128],"achieve":[62],"separation":[63,150],"between":[64,133],"trusted":[65],"untrusted":[69],"library":[70],"without":[72,169],"system":[73],"modification":[74],"application":[76,173],"rewriting.":[77],"With":[78],"our":[79],"approach,":[80],"will":[83,94],"be":[84,95],"isolated":[85],"from":[86],"original":[92],"partitioned":[96],"into":[97],"two":[98],"sub-apps":[99],"that":[100],"run":[101],"independently,":[102],"app's":[106],"being":[110],"protected":[111],"Android's":[113],"sandboxing":[115],"mechanism.":[116],"ARTist":[117],"[1],":[118],"a":[119,141,148],"compiler-based":[120],"instrumentation":[123],"framework,":[124],"is":[125,140],"utilized":[126],"here":[127],"recreate":[129],"communication":[131],"channels":[132],"library.":[137],"The":[138],"result":[139],"robust":[142],"toolchain":[143],"on":[144],"device":[145],"which":[146],"provides":[147],"clean":[149],"developer-written":[152],"third-party":[156],"code,":[158],"allowing":[159],"for":[160],"finer-grained":[161],"control":[163,168],"policies":[164],"information":[166],"flow":[167],"OS":[170],"customization":[171],"rebuilding.":[174]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
