{"id":"https://openalex.org/W2803537118","doi":"https://doi.org/10.1145/3196494.3196527","title":"iOracle","display_name":"iOracle","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2803537118","doi":"https://doi.org/10.1145/3196494.3196527","mag":"2803537118"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196527","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046111765","display_name":"Luke Deshotels","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Luke Deshotels","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072899308","display_name":"R\u0103zvan Deaconescu","orcid":"https://orcid.org/0000-0001-8287-1712"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Razvan Deaconescu","raw_affiliation_strings":["University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046116660","display_name":"Costin Caraba\u0219","orcid":"https://orcid.org/0000-0003-4078-202X"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Costin Carabas","raw_affiliation_strings":["University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017989985","display_name":"Iulia Manda","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Iulia Manda","raw_affiliation_strings":["University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024034310","display_name":"William Enck","orcid":"https://orcid.org/0000-0002-3043-8092"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Enck","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089215288","display_name":"Mihai Chiroiu","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Mihai Chiroiu","raw_affiliation_strings":["University POLITEHNICA of Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"University POLITEHNICA of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101471208","display_name":"Ninghui Li","orcid":"https://orcid.org/0000-0001-8207-9717"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ninghui Li","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technische Universitat Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universitat Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5046111765"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.9949,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76336325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.9107458591461182},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8393188714981079},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6190953254699707},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.6035786271095276},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5981907248497009},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.5952386856079102},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5833895206451416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5287004709243774},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5067997574806213},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4888448119163513},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2878706455230713},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.20314687490463257}],"concepts":[{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.9107458591461182},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8393188714981079},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6190953254699707},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.6035786271095276},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5981907248497009},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.5952386856079102},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5833895206451416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5287004709243774},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5067997574806213},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4888448119163513},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2878706455230713},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.20314687490463257},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2813281112","display_name":null,"funder_award_id":"W911NF-16-1-0127","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G3366966419","display_name":null,"funder_award_id":"W911NF-16-1","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G4143225217","display_name":null,"funder_award_id":"W911NF-16-1-0299","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G5260495741","display_name":null,"funder_award_id":"CRC 1119 CROSSING","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5966817483","display_name":null,"funder_award_id":"W911NF1610299, W911NF1610127","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G657448715","display_name":null,"funder_award_id":"W911NF-16-1-","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6671297155","display_name":null,"funder_award_id":"CAREER","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7145350082","display_name":"CAREER: Secure OS Views for Modern Computing Platforms","funder_award_id":"1253346","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7730874732","display_name":null,"funder_award_id":"CNS-1253346","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8482022808","display_name":null,"funder_award_id":"CRC 1119","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2803537118.pdf","grobid_xml":"https://content.openalex.org/works/W2803537118.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W109911468","https://openalex.org/W781283046","https://openalex.org/W1425914613","https://openalex.org/W1454815643","https://openalex.org/W1555215938","https://openalex.org/W1590752147","https://openalex.org/W1953670109","https://openalex.org/W1977634174","https://openalex.org/W1989734217","https://openalex.org/W1997080570","https://openalex.org/W2048714945","https://openalex.org/W2076252092","https://openalex.org/W2105258265","https://openalex.org/W2121805588","https://openalex.org/W2143396794","https://openalex.org/W2155166319","https://openalex.org/W2161533689","https://openalex.org/W2165269684","https://openalex.org/W2232411669","https://openalex.org/W2235876906","https://openalex.org/W2294481702","https://openalex.org/W2397986719","https://openalex.org/W2405120356","https://openalex.org/W2510008933","https://openalex.org/W2516747684","https://openalex.org/W2532435403","https://openalex.org/W2603707637","https://openalex.org/W2750917225"],"related_works":["https://openalex.org/W2104122177","https://openalex.org/W2353301435","https://openalex.org/W4293199628","https://openalex.org/W2516239820","https://openalex.org/W1969848899","https://openalex.org/W2417169999","https://openalex.org/W2034015980","https://openalex.org/W2053343487","https://openalex.org/W2247935400","https://openalex.org/W2188853935"],"abstract_inverted_index":{"Modern":[0],"operating":[1],"systems,":[2],"such":[3,50],"as":[4],"iOS,":[5],"use":[6],"multiple":[7],"access":[8,134,168],"control":[9,135,169],"policies":[10,22,63],"to":[11,56,95,100,108,118,130,151,176],"define":[12],"an":[13],"overall":[14],"protection":[15,36,48],"system.":[16,37],"However,":[17],"the":[18,32,35,46,81,109,157,164],"complexity":[19,82],"of":[20,34,83,142,159,166],"these":[21,143],"and":[23,64,74,77,104,155],"their":[24],"interactions":[25],"can":[26,53],"hide":[27],"policy":[28,59,87,102,125,144,182],"flaws":[29,103,126,145,183],"that":[30,43,51,127],"compromise":[31],"security":[33,179],"We":[38,89],"propose":[39],"iOracle,":[40],"a":[41,173],"framework":[42],"logically":[44],"models":[45,62],"iOS":[47,69,119,167,178],"system":[49,139],"queries":[52,84],"be":[54],"made":[55],"automatically":[57],"detect":[58],"flaws.":[60],"iOracle":[61,78,91,121,171],"runtime":[65],"context":[66],"extracted":[67],"from":[68],"firmware":[70],"images,":[71],"developer":[72],"resources,":[73],"jailbroken":[75],"devices,":[76],"significantly":[79],"reduces":[80],"by":[85,92,180],"modeling":[86],"semantics.":[88],"evaluate":[90],"using":[93],"it":[94],"successfully":[96],"triage":[97],"executables":[98,110],"likely":[99],"have":[101],"comparing":[105],"our":[106],"results":[107],"exploited":[111],"in":[112],"four":[113],"recent":[114],"jailbreaks.":[115],"When":[116],"applied":[117],"10,":[120],"identifies":[122],"previously":[123],"unknown":[124],"allow":[128],"attackers":[129],"modify":[131],"or":[132],"bypass":[133],"policies.":[136],"For":[137],"compromised":[138],"processes,":[140],"consequences":[141],"include":[146],"sandbox":[147],"escapes":[148],"(with":[149],"respect":[150],"read/write":[152],"file":[153],"access)":[154],"changing":[156],"ownership":[158],"arbitrary":[160],"files.":[161],"By":[162],"automating":[163],"evaluation":[165],"policies,":[170],"provides":[172],"practical":[174],"approach":[175],"hardening":[177],"identifying":[181],"before":[184],"they":[185],"are":[186],"exploited.":[187]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2018-06-01T00:00:00"}
