{"id":"https://openalex.org/W3213911884","doi":"https://doi.org/10.1145/3460120.3484801","title":"Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services","display_name":"Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3213911884","doi":"https://doi.org/10.1145/3460120.3484801","mag":"3213911884"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484801","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484801","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484801","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484801","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046027082","display_name":"Xiaobo Xiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaobo Xiang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences; Alpha Lab; and 360 Government &amp; Enterprise Security Group, Beijing, China","University of Chinese Academy of Sciences","Alpha Lab","Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences; Alpha Lab; and 360 Government &amp; Enterprise Security Group, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Alpha Lab","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100384134","display_name":"Ren Zhang","orcid":"https://orcid.org/0000-0003-2063-1769"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ren Zhang","raw_affiliation_strings":["Nervos &amp; Shandong Institute of Blockchain, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Nervos &amp; Shandong Institute of Blockchain, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002741273","display_name":"Hanxiang Wen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanxiang Wen","raw_affiliation_strings":["Ant Group, Hanzhou, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Hanzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112932908","display_name":"Xiaorui Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaorui Gong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031113046","display_name":"Baoxu Liu","orcid":"https://orcid.org/0009-0006-9851-5548"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baoxu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046027082"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6172,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68173611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1581","last_page":"1597"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7789349555969238},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6693652272224426},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5988284349441528},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5630006790161133},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5126115679740906},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.49208396673202515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49084144830703735},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4768441915512085},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4533195197582245},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.43042320013046265},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.244137704372406}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7789349555969238},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6693652272224426},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5988284349441528},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5630006790161133},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5126115679740906},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.49208396673202515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49084144830703735},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4768441915512085},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4533195197582245},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.43042320013046265},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.244137704372406}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460120.3484801","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484801","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484801","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3460120.3484801","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484801","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484801","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G3390532264","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320325175","display_name":"China University of Political Science and Law","ror":"https://ror.org/00e49gy82"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3213911884.pdf","grobid_xml":"https://content.openalex.org/works/W3213911884.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W2007842496","https://openalex.org/W2088983597","https://openalex.org/W2102197271","https://openalex.org/W2114275288","https://openalex.org/W2129586531","https://openalex.org/W2140095007","https://openalex.org/W2185329476","https://openalex.org/W2273325114","https://openalex.org/W2573570214","https://openalex.org/W2605404816","https://openalex.org/W2626301739","https://openalex.org/W2733408524","https://openalex.org/W2770003285","https://openalex.org/W2771587641","https://openalex.org/W2789555918","https://openalex.org/W2890471546","https://openalex.org/W2891458271","https://openalex.org/W2945945312","https://openalex.org/W2963894653","https://openalex.org/W3017716388","https://openalex.org/W3017857447","https://openalex.org/W3029787669","https://openalex.org/W3157182687","https://openalex.org/W4229843836","https://openalex.org/W4246319420","https://openalex.org/W4285719527","https://openalex.org/W4298218030"],"related_works":["https://openalex.org/W3169101995","https://openalex.org/W327645657","https://openalex.org/W4229710179","https://openalex.org/W4390187619","https://openalex.org/W4298063370","https://openalex.org/W2965382761","https://openalex.org/W4299620683","https://openalex.org/W3092209205","https://openalex.org/W2464350861","https://openalex.org/W4253505977"],"abstract_inverted_index":{"Binder,":[0],"the":[1,20,24,27,30,39,59,69,76,79,93,101,104,109,118,123,134,148,169],"main":[2],"mechanism":[3],"for":[4],"Android":[5,124,128],"applications":[6],"to":[7,42,49,52,82,163],"access":[8],"system":[9,21,40,80,156],"services,":[10],"adopts":[11],"a":[12,33,45,53,85,154,165,175],"client-server":[13],"role":[14],"model":[15],"in":[16,113,144],"its":[17],"design,":[18],"assuming":[19],"service":[22,41,81],"as":[23,29,44],"server":[25,55,88],"and":[26,48,89,115,172,184],"application":[28],"client.":[31],"However,":[32],"growing":[34],"number":[35],"of":[36,103,133,168,177],"scenarios":[37],"require":[38],"act":[43],"Binder":[46,54,70,87,94,111,135],"client":[47],"send":[50],"queries":[51],"possibly":[56],"instantiated":[57],"by":[58,107,139,151,182],"application.":[60],"Departing":[61],"from":[62,92],"this":[63,66],"role-reversal":[64],"possibility,":[65],"paper":[67],"proposes":[68],"Transaction":[71],"Redirection":[72],"(BiTRe)":[73],"attacks,":[74],"where":[75],"attacker":[77],"induces":[78],"transact":[83],"with":[84,122],"customized":[86],"then":[90],"attacks":[91],"server---an":[95],"often":[96],"unprotected":[97],"direction.":[98],"We":[99,146],"demonstrate":[100],"scale":[102],"attack":[105,119,170],"surface":[106,120],"enumerating":[108],"utilizable":[110],"interfaces":[112,136],"BiTRe,":[114],"discover":[116],"that":[117,157],"grows":[121],"release":[125],"version.":[126],"In":[127],"11,":[129],"more":[130],"than":[131],"70%":[132],"are":[137,180],"affected":[138],"or":[140],"can":[141,158],"be":[142],"utilized":[143],"BiTRe.":[145],"prove":[147],"attacks'":[149],"feasibility":[150],"(1)":[152],"constructing":[153],"prototype":[155],"automatically":[159],"generate":[160],"executable":[161],"programs":[162],"reach":[164],"substantial":[166],"part":[167],"surface,":[171],"(2)":[173],"identifying":[174],"series":[176],"vulnerabilities,":[178],"which":[179],"acknowledged":[181],"Google":[183],"assigned":[185],"ten":[186],"CVEs.":[187]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
