{"id":"https://openalex.org/W4400121562","doi":"https://doi.org/10.1145/3634737.3645001","title":"RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop","display_name":"RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400121562","doi":"https://doi.org/10.1145/3634737.3645001"},"language":"en","primary_location":{"id":"doi:10.1145/3634737.3645001","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3645001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103133996","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0002-3310-4258"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chao Wang","raw_affiliation_strings":["The Ohio State University, Columbus, OH, United States of America"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, United States of America","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333755","display_name":"Yue Zhang","orcid":"https://orcid.org/0000-0002-7786-0231"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yue Zhang","raw_affiliation_strings":["Drexel University, Philadelphia, PA, United States of America"],"affiliations":[{"raw_affiliation_string":"Drexel University, Philadelphia, PA, United States of America","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026864098","display_name":"Zhiqiang Lin","orcid":"https://orcid.org/0000-0001-6527-5994"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Lin","raw_affiliation_strings":["The Ohio State University, Columbus, OH, United States of America"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, United States of America","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103133996"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":0.3735,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52829684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"830","last_page":"842"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7500395774841309},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4368022084236145},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36804652214050293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3313409090042114}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7500395774841309},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4368022084236145},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36804652214050293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3313409090042114}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3634737.3645001","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3634737.3645001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5891408935","display_name":null,"funder_award_id":"2330264","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2275370587","https://openalex.org/W2293624369","https://openalex.org/W2771265143","https://openalex.org/W2886209944","https://openalex.org/W2912568927","https://openalex.org/W3097802856","https://openalex.org/W3169031765","https://openalex.org/W4255015421","https://openalex.org/W4284690649","https://openalex.org/W4308391531","https://openalex.org/W4380992530","https://openalex.org/W4384302769","https://openalex.org/W4388958887","https://openalex.org/W4388958904","https://openalex.org/W4388958910","https://openalex.org/W4388958931","https://openalex.org/W6601719842","https://openalex.org/W6637329632","https://openalex.org/W6724288768"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0,101],"recent":[1],"years,":[2],"there":[3,120],"has":[4],"been":[5,191],"a":[6,17,27],"surge":[7],"in":[8,98],"the":[9,31,82,107,111,139,150,154,164,168],"popularity":[10],"of":[11,19,126,187],"mobile":[12,41,132],"super":[13,43,84,133,140,151],"apps,":[14],"which":[15],"consolidate":[16],"variety":[18],"services,":[20],"including":[21,56],"messaging,":[22],"ride-hailing,":[23],"and":[24,47,77,91,145,163,172,185],"e-commerce,":[25],"into":[26],"single":[28,83],"application,":[29],"eliminating":[30],"need":[32],"to":[33,53,167],"switch":[34],"between":[35],"different":[36,59,63,96,99,114],"apps.":[37],"Originally":[38],"tailored":[39],"for":[40],"usage,":[42],"apps":[44,141,152],"like":[45],"WeChat":[46],"WeCom":[48],"have":[49,62,159,189],"expanded":[50],"their":[51],"reach":[52],"desktop":[54],"platforms,":[55],"Windows.":[57],"However,":[58],"operating":[60],"systems":[61],"threat":[64],"models":[65],"(e.g.,":[66],"Windows":[67],"can":[68,93],"directly":[69],"grant":[70],"users":[71],"with":[72],"root":[73],"privilege":[74],"but":[75],"Android":[76],"iOS":[78],"do":[79],"not).":[80],"Therefore,":[81],"app":[85,90,170],"(including":[86],"both":[87],"its":[88],"host":[89,169],"miniapps)":[92],"face":[94],"completely":[95],"threats":[97],"platforms.":[100,115],"this":[102],"paper,":[103],"we":[104,117],"systematically":[105],"study":[106],"attacks":[108,138,149,162],"caused":[109],"by":[110],"discrepancies":[112],"from":[113,142,153],"Specifically,":[116],"show":[118],"that":[119,137,148],"are":[121,179],"at":[122],"least":[123],"two":[124],"classes":[125],"attacks,":[127,130],"dubbed":[128],"RootFree":[129],"against":[131],"apps:":[134],"layer":[135,146],"below":[136],"privileged":[143],"software,":[144],"up":[147],"internal":[155],"malicious":[156],"miniapps.":[157],"We":[158],"disclosed":[160],"our":[161],"corresponding":[165],"vulnerabilities":[166,177],"vendor,":[171],"received":[173],"bug":[174],"bounties.":[175],"These":[176],"all":[178],"ranked":[180],"as":[181],"high":[182],"severity":[183],"vulnerabilities,":[184],"some":[186],"them":[188],"already":[190],"patched.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
