{"id":"https://openalex.org/W4308411159","doi":"https://doi.org/10.1145/3548606.3560666","title":"Watch Out for Race Condition Attacks When Using Android External Storage","display_name":"Watch Out for Race Condition Attacks When Using Android External Storage","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308411159","doi":"https://doi.org/10.1145/3548606.3560666"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560666","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074938901","display_name":"Shaoyong Du","orcid":"https://orcid.org/0000-0002-7572-1959"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shaoyong Du","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352263","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-7357-6671"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xin Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020327434","display_name":"Guoqing Lai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guoqing Lai","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074938901"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2444,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.40491184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"891","last_page":"904"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7891095876693726},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7722053527832031},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.553178608417511},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4974680244922638},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.4914463758468628}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7891095876693726},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7722053527832031},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.553178608417511},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4974680244922638},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.4914463758468628}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3560666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560666","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[{"id":"https://openalex.org/G2994352327","display_name":null,"funder_award_id":"62002386, U1804263, 62172435","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2014235365","https://openalex.org/W2014390890","https://openalex.org/W2034256728","https://openalex.org/W2038165128","https://openalex.org/W2146521047","https://openalex.org/W2148009765","https://openalex.org/W2277397892","https://openalex.org/W2416754814","https://openalex.org/W2471405957","https://openalex.org/W2508576555","https://openalex.org/W2560459036","https://openalex.org/W2578991858","https://openalex.org/W2618852163","https://openalex.org/W2735004968","https://openalex.org/W2753521774","https://openalex.org/W2763131031","https://openalex.org/W2793974819","https://openalex.org/W2810406511","https://openalex.org/W2906643866","https://openalex.org/W2911958453","https://openalex.org/W2927543040","https://openalex.org/W2944171511","https://openalex.org/W2963237187","https://openalex.org/W3000788914","https://openalex.org/W3016185124","https://openalex.org/W3197476301"],"related_works":["https://openalex.org/W1565885216","https://openalex.org/W753420207","https://openalex.org/W2353896575","https://openalex.org/W2379000728","https://openalex.org/W2368354671","https://openalex.org/W2389631998","https://openalex.org/W2362483455","https://openalex.org/W2355113374","https://openalex.org/W2391476234","https://openalex.org/W37549629"],"abstract_inverted_index":{"Currently,":[0],"in":[1],"Android,":[2],"applications":[3],"(apps":[4],"for":[5,240],"short)":[6],"rely":[7],"heavily":[8],"on":[9,82,105,132,157],"external":[10,83,158,246],"storage":[11,76,103,159],"to":[12,41,77,100,120,136,215,228],"provide":[13],"their":[14],"services.":[15],"Race":[16,50],"conditions":[17],"are":[18,200,226],"introduced":[19,74],"by":[20],"the":[21,28,33,38,162,179,186,207,223],"inappropriate":[22],"file":[23,34,154,164,172,196,204],"operations.":[24],"Through":[25],"race":[26,133,232],"conditions,":[27],"malicious":[29],"app":[30,40,122,241],"can":[31,53],"manipulate":[32],"content":[35],"and":[36,60,160,213],"induce":[37],"victim":[39],"perform":[42],"unexpected":[43],"actions,":[44],"which":[45,152],"we":[46,127,169,182],"callrace":[47],"condition":[48,51,134,233],"attack.":[49],"attack":[52,135,234],"cause":[54],"a":[55,97,129,191,217,237],"series":[56,218],"of":[57,67,90,115,189,194,219,222],"security":[58,124],"problems":[59],"prior":[61],"work":[62],"has":[63,73,235],"already":[64],"implemented":[65],"some":[66],"them.":[68],"From":[69,178],"Android":[70,92,143,245],"10,":[71],"Google":[72],"scoped":[75,102],"defend":[78],"against":[79],"attacks":[80,220],"based":[81],"storage.":[84,247],"However,":[85],"considering":[86],"current":[87,110,140],"market":[88],"shares":[89],"different":[91],"versions,":[93],"it":[94,117],"is":[95,118,210],"still":[96],"long":[98],"way":[99],"have":[101],"deployed":[104],"each":[106],"device.":[107],"To":[108],"protect":[109],"users":[111],"from":[112],"this":[113,229],"kind":[114],"attack,":[116],"essential":[119],"raise":[121],"developers'":[123],"awareness.":[125],"Therefore,":[126],"conduct":[128],"comprehensive":[130],"survey":[131],"learn":[137],"about":[138],"its":[139],"status":[141],"over":[142,175],"apps.":[144],"We":[145],"propose":[146],"an":[147],"analysis":[148,180],"engine,":[149],"named":[150],"RECAST,":[151,168],"gathers":[153],"operation":[155,165,173],"events":[156,174],"infers":[161],"associated":[163],"processes.":[166],"With":[167],"collect":[170],"5,359,339":[171],"105,963":[176],"files.":[177],"result,":[181],"find":[183],"that,":[184],"with":[185],"limited":[187],"kinds":[188],"events,":[190],"tremendous":[192],"number":[193],"unique":[195],"operating":[197,205],"patterns":[198],"(1,977)":[199],"constituted.":[201],"Over":[202],"these":[203],"patterns,":[206],"time":[208],"window":[209],"much":[211],"common":[212],"available":[214],"launch":[216],"(94.26%":[221],"tested":[224],"files":[225],"vulnerable":[227],"problem).":[230],"Consequently,":[231],"become":[236],"non-negligible":[238],"issue":[239],"developers":[242],"when":[243],"using":[244]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
