{"id":"https://openalex.org/W2598567693","doi":"https://doi.org/10.1145/3052973.3052998","title":"Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems","display_name":"Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems","publication_year":2017,"publication_date":"2017-03-31","ids":{"openalex":"https://openalex.org/W2598567693","doi":"https://doi.org/10.1145/3052973.3052998","mag":"2598567693"},"language":"en","primary_location":{"id":"doi:10.1145/3052973.3052998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3052998","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3052998&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3052998&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036211273","display_name":"Drew Davidson","orcid":"https://orcid.org/0000-0002-5096-1446"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Drew Davidson","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101663791","display_name":"Yaohui Chen","orcid":"https://orcid.org/0009-0005-6258-4472"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yaohui Chen","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088441839","display_name":"Franklin George","orcid":null},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Franklin George","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013217302","display_name":"Long Lu","orcid":"https://orcid.org/0000-0003-1550-479X"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Long Lu","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088826068","display_name":"Somesh Jha","orcid":"https://orcid.org/0000-0001-5877-0436"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Somesh Jha","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036211273"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":2.0521,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87843084,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"652","last_page":"665"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7601938843727112},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6059582233428955},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5932425260543823},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.5628674030303955},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.5493414998054504},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5115669369697571},{"id":"https://openalex.org/keywords/web-content","display_name":"Web content","score":0.4964211583137512},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.48196646571159363},{"id":"https://openalex.org/keywords/mashup","display_name":"Mashup","score":0.422894686460495},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.41839706897735596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39040276408195496},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11789131164550781}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7601938843727112},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6059582233428955},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5932425260543823},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5628674030303955},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.5493414998054504},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5115669369697571},{"id":"https://openalex.org/C2776324614","wikidata":"https://www.wikidata.org/wiki/Q3948731","display_name":"Web content","level":3,"score":0.4964211583137512},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.48196646571159363},{"id":"https://openalex.org/C196126337","wikidata":"https://www.wikidata.org/wiki/Q821080","display_name":"Mashup","level":4,"score":0.422894686460495},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.41839706897735596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39040276408195496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11789131164550781}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3052973.3052998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3052998","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3052998&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3052973.3052998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3052973.3052998","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3052998&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1996023551","display_name":"TWC: Medium: Collaborative: Extending Smart-Phone Application Analysis","funder_award_id":"1228620","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4301530282","display_name":null,"funder_award_id":"CNS-1228782","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4764891271","display_name":null,"funder_award_id":"FA-8650-15-C-7562","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5524522455","display_name":null,"funder_award_id":"DARPA","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G5813769722","display_name":null,"funder_award_id":"W911NF-17-1-0039","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G599432671","display_name":"TWC: Phase: Medium: Collaborative Proposal: Understanding and Exploiting Parallelism in Deep Packet Inspection on Concurrent Architectures","funder_award_id":"1228782","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6209727506","display_name":"TWC: Small: STRUCT: Enabling Secure and Trustworthy Compartments in Mobile Applications","funder_award_id":"1421824","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6873865046","display_name":null,"funder_award_id":"CNS-1421824, CNS-1228782, CNS-1228620","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7946973416","display_name":null,"funder_award_id":"CNS-1421824","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2598567693.pdf","grobid_xml":"https://content.openalex.org/works/W2598567693.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W36948825","https://openalex.org/W1464836909","https://openalex.org/W1555215938","https://openalex.org/W1605360721","https://openalex.org/W1964424075","https://openalex.org/W1992661913","https://openalex.org/W2049917012","https://openalex.org/W2058664481","https://openalex.org/W2066428817","https://openalex.org/W2080573945","https://openalex.org/W2080696000","https://openalex.org/W2087804676","https://openalex.org/W2119249378","https://openalex.org/W2123437505","https://openalex.org/W2124153277","https://openalex.org/W2126242334","https://openalex.org/W2139026102","https://openalex.org/W2142503704","https://openalex.org/W2148009765","https://openalex.org/W2167661907","https://openalex.org/W2171240827","https://openalex.org/W2235876906","https://openalex.org/W2248426850","https://openalex.org/W2296324027","https://openalex.org/W2350778671","https://openalex.org/W2399762640","https://openalex.org/W2536021772","https://openalex.org/W2560459036","https://openalex.org/W2574401928","https://openalex.org/W2949838346"],"related_works":["https://openalex.org/W141137031","https://openalex.org/W2091418534","https://openalex.org/W1958659856","https://openalex.org/W2328404009","https://openalex.org/W2410286004","https://openalex.org/W2111074577","https://openalex.org/W2030862479","https://openalex.org/W4231441891","https://openalex.org/W2913452075","https://openalex.org/W2167278502"],"abstract_inverted_index":{"A":[0],"majority":[1],"of":[2,9,49,71],"today's":[3],"mobile":[4],"apps":[5,143,172,206,218],"integrate":[6],"web":[7,19,32,43,78,105,118,132,146],"content":[8,20,33,44,79,106,147],"various":[10],"kinds.":[11],"Unfortunately,":[12],"the":[13,39,47,59,72,91,125,136,174],"interactions":[14,170],"between":[15,74,115,127,171],"app":[16,27,52,75,128,186,191],"code":[17,76,129],"and":[18,62,77,102,110,119,130,144,167,173,207,219],"expose":[21],"new":[22],"attack":[23],"vectors:":[24],"a":[25,97],"malicious":[26,42],"can":[28,45,86],"subvert":[29],"its":[30,50],"embedded":[31,131,145],"to":[34,53,148,153,193],"steal":[35],"user":[36],"secrets;":[37],"on":[38,203,216],"other":[40],"hand,":[41],"use":[46],"privileges":[48],"embedding":[51],"exfiltrate":[54],"sensitive":[55],"information":[56],"such":[57,164],"as":[58,165],"user's":[60],"location":[61],"contacts.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67],"discuss":[68],"security":[69,162],"weaknesses":[70],"interface":[73,126],"through":[80],"attacks,":[81],"then":[82],"introduce":[83,178],"defenses":[84,94],"that":[85,99,189],"be":[87],"deployed":[88],"without":[89],"modifying":[90],"OS.":[92],"Our":[93,200],"feature":[95],"WIREframe,":[96],"service":[98],"securely":[100],"embeds":[101],"renders":[103],"external":[104],"in":[107,111],"Android":[108],"apps,":[109,211],"turn,":[112],"prevents":[113],"attacks":[114],"em-":[116],"bedded":[117],"host":[120],"apps.":[121,199],"WIREframe":[122,140,195],"fully":[123],"mediates":[124],"content.":[133],"Un-":[134],"like":[135],"existing":[137,198],"web-embedding":[138],"mechanisms,":[139],"allows":[141,190],"both":[142],"define":[149],"simple":[150],"access":[151],"policies":[152,159],"protect":[154],"their":[155],"own":[156],"resources.":[157],"These":[158],"recognize":[160],"fine-grained":[161],"principals,":[163],"origins,":[166],"control":[168],"all":[169],"web.":[175],"We":[176],"also":[177],"WIRE":[179],"(Web":[180],"Isolation":[181],"Rewriting":[182],"Engine),":[183],"an":[184],"offline":[185],"rewriting":[187],"tool":[188],"users":[192],"inject":[194],"protections":[196],"into":[197],"evaluation,":[201],"based":[202],"7166":[204],"popular":[205],"20":[208],"specially":[209],"selected":[210],"shows":[212],"these":[213],"techniques":[214],"work":[215],"complex":[217],"incur":[220],"acceptable":[221],"end-to-end":[222],"performance":[223],"overhead.":[224]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
