{"id":"https://openalex.org/W4411721787","doi":"https://doi.org/10.1145/3734477.3734704","title":"ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space","display_name":"ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space","publication_year":2025,"publication_date":"2025-06-27","ids":{"openalex":"https://openalex.org/W4411721787","doi":"https://doi.org/10.1145/3734477.3734704"},"language":"en","primary_location":{"id":"doi:10.1145/3734477.3734704","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3734477.3734704","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3734477.3734704","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064938665","display_name":"Yan Long","orcid":"https://orcid.org/0000-0002-3429-7127"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yan Long","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005922817","display_name":"Jiancong Cui","orcid":"https://orcid.org/0000-0003-1444-2056"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiancong Cui","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071031796","display_name":"Yuqing Yang","orcid":"https://orcid.org/0000-0002-5149-7913"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuqing Yang","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113116976","display_name":"Tobias Alam","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tobias Alam","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026864098","display_name":"Zhiqiang Lin","orcid":"https://orcid.org/0000-0001-6527-5994"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Lin","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113708992","display_name":"Kevin Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Fu","raw_affiliation_strings":["Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064938665"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21678823,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"100","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8483721017837524},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.821559727191925},{"id":"https://openalex.org/keywords/armour","display_name":"Armour","score":0.6624892354011536},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5634870529174805},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4002799689769745},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35527122020721436},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33421266078948975},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.09821906685829163}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8483721017837524},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.821559727191925},{"id":"https://openalex.org/C73492039","wikidata":"https://www.wikidata.org/wiki/Q377804","display_name":"Armour","level":3,"score":0.6624892354011536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5634870529174805},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4002799689769745},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35527122020721436},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33421266078948975},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.09821906685829163},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3734477.3734704","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3734477.3734704","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2507.02177","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.02177","pdf_url":"https://arxiv.org/pdf/2507.02177","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3734477.3734704","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3734477.3734704","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2074367177","https://openalex.org/W2079154980","https://openalex.org/W2093316511","https://openalex.org/W2150097065","https://openalex.org/W2294170611","https://openalex.org/W2509042760","https://openalex.org/W2599393174","https://openalex.org/W2612281133","https://openalex.org/W2624032679","https://openalex.org/W2757581071","https://openalex.org/W2766315610","https://openalex.org/W2810308567","https://openalex.org/W2885834555","https://openalex.org/W2891928976","https://openalex.org/W2943952292","https://openalex.org/W2957423437","https://openalex.org/W2963930878","https://openalex.org/W3007498683","https://openalex.org/W3029255035","https://openalex.org/W3135773993","https://openalex.org/W3186393204","https://openalex.org/W3210626783","https://openalex.org/W4244726870","https://openalex.org/W4285356403","https://openalex.org/W4288057735","https://openalex.org/W4308632256","https://openalex.org/W4323349048","https://openalex.org/W4324007172","https://openalex.org/W4382046084","https://openalex.org/W4385080386","https://openalex.org/W4385187265","https://openalex.org/W4387298358","https://openalex.org/W4391724823"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"This":[0],"work":[1,73,115],"investigates":[2],"how":[3,55,76,146],"to":[4,7,16,26,63,77,85,117,143,156],"monitor":[5,145],"access":[6,22,161],"Android":[8,43],"zero-permission":[9,203,215],"sensors":[10,33,216],"which":[11],"could":[12,58],"cause":[13],"privacy":[14],"leakage":[15],"users.":[17],"Moreover,":[18],"monitoring":[19],"such":[20,34,81,92,190],"sensitive":[21],"allows":[23],"security":[24,154],"researchers":[25,155],"characterize":[27],"potential":[28],"sensor":[29,61,87,150,160,176,187],"abuse":[30,188],"patterns.":[31],"Zero-permission":[32],"as":[35,82,93,191],"accelerometers":[36],"have":[37],"become":[38],"an":[39],"indispensable":[40],"part":[41],"of":[42,102,137,172,193,201,209],"devices.":[44],"The":[45],"critical":[46],"information":[47],"they":[48],"provide":[49],"has":[50,74],"attracted":[51],"extensive":[52],"research":[53],"investigating":[54],"data":[56,62,79,151,200],"collectors":[57],"capture":[59],"more":[60],"enable":[64,78],"both":[65],"benign":[66],"and":[67,96,109,134,152,181,184,217,220],"exploitative":[68],"applications.":[69],"In":[70],"contrast,":[71],"little":[72],"explored":[75],"providers,":[80],"end":[83],"users,":[84],"understand":[86],"usage.":[88],"While":[89],"existing":[90],"methods":[91],"static":[94],"analysis":[95,99],"hooking-based":[97],"dynamic":[98],"face":[100],"challenges":[101],"requiring":[103],"complicated":[104],"development":[105],"chains,":[106],"rooting":[107],"privilege,":[108],"app-specific":[110],"reverse":[111],"engineering":[112],"analysis,":[113],"our":[114],"aims":[116],"bridge":[118],"this":[119],"gap":[120],"by":[121],"developing":[122],"ARMOUR":[123,139,173],"for":[124],"user-space":[125],"runtime":[126],"monitoring,":[127],"leveraging":[128],"the":[129,170,207],"intrinsic":[130],"sampling":[131],"rate":[132],"variation":[133],"convergence":[135],"behaviors":[136],"Android.":[138],"enables":[140],"privacy-aware":[141],"users":[142],"easily":[144],"third-party":[147],"apps":[148,194],"use":[149],"support":[153],"perform":[157],"rapid":[158],"app-agnostic":[159],"analysis.":[162],"Our":[163],"evaluation":[164],"with":[165],"1,448":[166],"commercial":[167],"applications":[168],"shows":[169],"effectiveness":[171],"in":[174,178],"detecting":[175],"usage":[177],"obfuscated":[179],"code":[180],"other":[182],"conditions,":[183],"observes":[185],"salient":[186],"patterns":[189],"50%":[192],"from":[195],"seemingly":[196],"sensor-independent":[197],"categories":[198],"accessing":[199],"multiple":[202],"sensors.":[204],"We":[205],"analyze":[206],"impact":[208],"Android's":[210],"recent":[211],"policy":[212],"changes":[213],"on":[214],"remaining":[218],"technical":[219],"regulatory":[221],"problems.":[222]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
