{"id":"https://openalex.org/W3092585369","doi":"https://doi.org/10.1145/3320269.3384713","title":"NativeX: Native Executioner Freezes Android","display_name":"NativeX: Native Executioner Freezes Android","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092585369","doi":"https://doi.org/10.1145/3320269.3384713","mag":"3092585369"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3384713","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091516773","display_name":"Qinsheng Hou","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qinsheng Hou","raw_affiliation_strings":["QI-ANXIN Technology Research Institute &amp; Legendsec Information Technology (Beijing) Inc., Beijing, China"],"affiliations":[{"raw_affiliation_string":"QI-ANXIN Technology Research Institute &amp; Legendsec Information Technology (Beijing) Inc., Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020074265","display_name":"Yao Cheng","orcid":"https://orcid.org/0000-0002-1560-5526"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yao Cheng","raw_affiliation_strings":["Huawei International, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Huawei International, Singapore, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100414046","display_name":"Lingyun Ying","orcid":"https://orcid.org/0000-0001-7445-9103"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingyun Ying","raw_affiliation_strings":["QI-ANXIN Technology Research Institute &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"QI-ANXIN Technology Research Institute &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091516773"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11724819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"458","last_page":"470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8801121115684509},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7393240928649902},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.531670331954956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5084084868431091},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.4492071866989136},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4282544255256653},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3983895182609558},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11633813381195068}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8801121115684509},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7393240928649902},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.531670331954956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5084084868431091},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.4492071866989136},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4282544255256653},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3983895182609558},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11633813381195068}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3384713","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1630356589","https://openalex.org/W1893159092","https://openalex.org/W1988036170","https://openalex.org/W2018956134","https://openalex.org/W2027538101","https://openalex.org/W2049977316","https://openalex.org/W2078197322","https://openalex.org/W2087804676","https://openalex.org/W2088983597","https://openalex.org/W2163643194","https://openalex.org/W2166743230","https://openalex.org/W2273325114","https://openalex.org/W2291268284","https://openalex.org/W2398484989","https://openalex.org/W2407386804","https://openalex.org/W2533703061","https://openalex.org/W2534511085","https://openalex.org/W2573570214","https://openalex.org/W2626290556","https://openalex.org/W2751955863","https://openalex.org/W2893216860","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2347997421","https://openalex.org/W2484510436","https://openalex.org/W2070989512","https://openalex.org/W4388140715","https://openalex.org/W2345419794","https://openalex.org/W2016620927","https://openalex.org/W3022936767","https://openalex.org/W1565885216","https://openalex.org/W3127878313","https://openalex.org/W3190628911"],"abstract_inverted_index":{"Android":[0,18,46,85,98,105,187],"is":[1,41],"a":[2,54,73],"Linux-based":[3],"multi-thread":[4],"open-source":[5],"operating":[6],"system":[7,65,69,82],"that":[8,34],"dominates":[9],"85%":[10],"of":[11,38,124,186],"the":[12,31,35,64,68,80,97,103,116,122,125,139,151,155,159,163,184],"worldwide":[13],"smartphone":[14],"market":[15],"share.":[16],"Though":[17],"has":[19],"its":[20,24,88],"established":[21],"management":[22,37,185],"for":[23,30],"framework":[25],"layer":[26],"processes,":[27],"we":[28,177],"discovered":[29],"first":[32],"time":[33],"weak":[36],"native":[39,89,188],"processes":[40],"posing":[42],"tangible":[43],"threats":[44],"to":[45,51,70,94,101,133,149,182],"systems":[47],"from":[48],"version":[49],"4.2":[50],"9.0.":[52],"As":[53],"consequence,":[55],"any":[56,60],"third-party":[57],"application":[58],"without":[59],"permission":[61],"can":[62,113],"freeze":[63],"or":[66,77],"force":[67],"go":[71],"through":[72],"reboot":[74],"by":[75],"starving":[76],"significantly":[78],"delaying":[79],"critical":[81],"services":[83],"using":[84],"commands":[86],"in":[87],"processes.":[90,189],"We":[91,128,143],"design":[92],"NativeX":[93,112],"systematically":[95],"analyze":[96],"source":[99],"code":[100],"identify":[102],"risky":[104,110],"commands.":[106],"For":[107],"each":[108],"identified":[109],"command,":[111],"automatically":[114],"generate":[115],"PoC":[117,172],"(Proof-of-Concept)":[118],"application,":[119],"and":[120,162],"verify":[121],"effectiveness":[123],"generated":[126],"PoC.":[127],"conduct":[129],"manual":[130],"vulnerability":[131],"analysis":[132],"reveal":[134],"two":[135],"root":[136],"causes":[137],"beyond":[138],"superficial":[140],"attack":[141,152],"consequences.":[142],"further":[144],"carry":[145],"out":[146],"quantitative":[147],"experiments":[148],"demonstrate":[150],"consequences,":[153],"including":[154],"device":[156],"temperature":[157],"surge,":[158],"battery":[160],"degeneration,":[161],"computing":[164],"performance":[165],"decrease,":[166],"based":[167],"on":[168],"which,":[169],"three":[170],"representative":[171],"attacks":[173],"are":[174],"engineered.":[175],"Finally,":[176],"discuss":[178],"possible":[179],"defense":[180],"approaches":[181],"improve":[183]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
