{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:16:44Z","timestamp":1740097004650,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Development and Reform Commission","award":["Guidelines for protecting personal information"]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1223495","CNS-1017782","CNS-1223477","CNS-1117106"],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660302","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"978-989","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Mayhem in the Push Clouds"],"prefix":"10.1145","author":[{"given":"Tongxin","family":"Li","sequence":"first","affiliation":[{"name":"Peking University, Peking, China"}]},{"given":"Xiaoyong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington & Samsung Research America, Bloomington, IN, USA"}]},{"given":"Luyi","family":"Xing","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Yeonjoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Muhammad","family":"Naveed","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Xinhui","family":"Han","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"adb logcat. http:\/\/developer.android.com\/tools\/help\/logcat.html. adb logcat. http:\/\/developer.android.com\/tools\/help\/logcat.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Android Device Manager. https:\/\/www.google.com\/android\/devicemanager. Android Device Manager. https:\/\/www.google.com\/android\/devicemanager."},{"key":"e_1_3_2_1_3_1","unstructured":"Android Security Acknowledgements. https:\/\/source.android.com\/devices\/tech\/security\/acknowledgements.html. Android Security Acknowledgements. https:\/\/source.android.com\/devices\/tech\/security\/acknowledgements.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Baksmali. https:\/\/code.google.com\/p\/smali\/. Baksmali. https:\/\/code.google.com\/p\/smali\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Cybercriminals use Google Cloud Messaging to control malware on Android devices. http:\/\/www.pcworld.com\/article\/2046642\/cybercriminals-usegoogle-cloud-messaging-service-tocontrol-malware-on-android-devices.html. Cybercriminals use Google Cloud Messaging to control malware on Android devices. http:\/\/www.pcworld.com\/article\/2046642\/cybercriminals-usegoogle-cloud-messaging-service-tocontrol-malware-on-android-devices.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Dex2jar. http:\/\/code.google.com\/p\/dex2jar\/. Dex2jar. http:\/\/code.google.com\/p\/dex2jar\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Google Cloud Messaging for Android. http:\/\/developer.android.com\/google\/gcm\/index.html. Google Cloud Messaging for Android. http:\/\/developer.android.com\/google\/gcm\/index.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Google I\/O 2013. http:\/\/www.zdnet.com\/io-2013-more-thanhalf-of-apps-in-google-play-now-usecloud-messaging-7000015511\/. Google I\/O 2013. http:\/\/www.zdnet.com\/io-2013-more-thanhalf-of-apps-in-google-play-now-usecloud-messaging-7000015511\/."},{"key":"e_1_3_2_1_9_1","unstructured":"JD-GUI. http:\/\/jd.benow.ca\/. JD-GUI. http:\/\/jd.benow.ca\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Kindle Fire's market share. http:\/\/www.geekwire.com\/2013\/kindlefire-scorching-android-tablet-market-33-share\/. Kindle Fire's market share. http:\/\/www.geekwire.com\/2013\/kindlefire-scorching-android-tablet-market-33-share\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Mallory. https:\/\/intrepidusgroup.com\/insight\/mallory\/. Mallory. https:\/\/intrepidusgroup.com\/insight\/mallory\/."},{"key":"e_1_3_2_1_12_1","unstructured":"mitmproxy. http:\/\/mitmproxy.org\/. mitmproxy. http:\/\/mitmproxy.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Sina. http:\/\/www.sina.com.cn\/. Sina. http:\/\/www.sina.com.cn\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Sina Weibo. https:\/\/play.google.com\/store\/apps\/details?id=com.sina.weibo. Sina Weibo. https:\/\/play.google.com\/store\/apps\/details?id=com.sina.weibo."},{"key":"e_1_3_2_1_15_1","unstructured":"Supporting materials. https:\/\/sites.google.com\/site\/cloudmsging\/. Supporting materials. https:\/\/sites.google.com\/site\/cloudmsging\/."},{"key":"e_1_3_2_1_16_1","unstructured":"UrbanAirship. http:\/\/urbanairship.com\/. UrbanAirship. http:\/\/urbanairship.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.08.007"},{"key":"e_1_3_2_1_18_1","volume-title":"Network and Distributed System Security Symposium","author":"Bai G.","year":"2013","unstructured":"G. Bai , J. Lei , G. Meng , S. S. Venkatraman , P. Saxena , J. Sun , Y. Liu , and J. S. Dong . Authscan: Automatic extraction of web authentication protocols from implementations . In Network and Distributed System Security Symposium , 2013 . G. Bai, J. Lei, G. Meng, S. S. Venkatraman, P. Saxena, J. Sun, Y. Liu, and J. S. Dong. Authscan: Automatic extraction of web authentication protocols from implementations. In Network and Distributed System Security Symposium, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.27"},{"key":"e_1_3_2_1_20_1","first-page":"18","volume-title":"19th Annual Network & Distributed System Security Symposium (NDSS)","volume":"17","author":"Bugiel S.","year":"2012","unstructured":"S. Bugiel , L. Davi , A. Dmitrienko , T. Fischer , A.-R. Sadeghi , and B. Shastry . Towards taming privilege-escalation attacks on android . In 19th Annual Network & Distributed System Security Symposium (NDSS) , volume 17 , pages 18 -- 25 , 2012 . S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In 19th Annual Network & Distributed System Security Symposium (NDSS), volume 17, pages 18--25, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight provenance for smart phone operating systems . In USENIX Security Symposium , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symposium","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. McDaniel , and S. Chaudhuri . A study of android application security . In USENIX Security Symposium , 2011 . W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In USENIX Security Symposium , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security","author":"Grace M.","year":"2012","unstructured":"M. Grace , Y. Zhou , Z. Wang , and X. Jiang . Systematic detection of capability leaks in stock android smartphones . In Proceedings of the 19th Annual Symposium on Network and Distributed System Security , 2012 . M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1629656"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382238"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.30"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516727"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_34_1","first-page":"24","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS","author":"Xing L.","year":"2013","unstructured":"L. Xing , Y. Chen , X. Wang , and S. Chen . Integuard: Toward automatic protection of third-party web service integrations . In 20th Annual Network and Distributed System Security Symposium, NDSS , pages 24 -- 27 , 2013 . L. Xing, Y. Chen, X. Wang, and S. Chen. Integuard: Toward automatic protection of third-party web service integrations. In 20th Annual Network and Distributed System Security Symposium, NDSS, pages 24--27, 2013."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420968"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 20th Annual Symposium on Network and Distributed System Security","author":"Zhou Y.","year":"2013","unstructured":"Y. Zhou and X. Jiang . Detecting passive content leaks and pollution in android applications . In Proceedings of the 20th Annual Symposium on Network and Distributed System Security , 2013 . Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, 2013."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T03:16:41Z","timestamp":1672975001000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660302"}},"subtitle":["Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":36,"alternative-id":["10.1145\/2660267.2660302","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660302","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}