{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:00:35Z","timestamp":1742382035320,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["focussed research award"],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P505445\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808117.2808118","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"87-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Security Metrics for the Android Ecosystem"],"prefix":"10.1145","author":[{"given":"Daniel R.","family":"Thomas","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Andrew","family":"Rice","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Critical vulnerability in browser security metrics. Web 2.0 Security & Privacy (W2SP)","author":"Acer M.","year":"2010","unstructured":"Acer , M. , and Jackson , C . Critical vulnerability in browser security metrics. Web 2.0 Security & Privacy (W2SP) ( 2010 ). Acer, M., and Jackson, C. Critical vulnerability in browser security metrics. Web 2.0 Security & Privacy (W2SP) (2010)."},{"key":"e_1_3_2_1_2_1","volume-title":"Network and Distributed System Security (NDSS)","author":"Arp D.","year":"2014","unstructured":"Arp , D. , Spreitzenbarth , M. , Malte , H. , Gascon , H. , and Rieck , K . Drebin: Effective and Explainable Detection of Android Malware in Your Pocket . In: Network and Distributed System Security (NDSS) . Internet Society , San Diego, CA, USA , 02\/ 2014 , 23--26. isbn: 1891562355. Arp, D., Spreitzenbarth, M., Malte, H., Gascon, H., and Rieck, K. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. In: Network and Distributed System Security (NDSS). Internet Society, San Diego, CA, USA, 02\/2014, 23--26. isbn: 1891562355."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Hot Topics in Security. USENIX","author":"Bellissimo A.","year":"2006","unstructured":"Bellissimo , A. , Burgess , J. , and Fu , K . Secure software updates: disappointments and new challenges . In: USENIX Hot Topics in Security. USENIX , 2006 , 37--43. Bellissimo, A., Burgess, J., and Fu, K. Secure software updates: disappointments and new challenges. In: USENIX Hot Topics in Security. USENIX, 2006, 37--43."},{"key":"e_1_3_2_1_4_1","first-page":"20","article-title":"Package management security. Tech. rep. University of Arizona","volume":"1","author":"Cappos J.","year":"2008","unstructured":"Cappos , J. , and Samuel , J . Package management security. Tech. rep. University of Arizona , Computer Science Department , 2008 , 1 -- 20 . Cappos, J., and Samuel, J. Package management security. Tech. rep. University of Arizona, Computer Science Department, 2008, 1--20.","journal-title":"Computer Science Department"},{"key":"e_1_3_2_1_5_1","unstructured":"CESG End User Devices Security Guidance: Android 4.2. 10\/2013. url: https:\/\/www.gov.uk\/government\/publications\/end-user-devices-security-guidance-android-42 (visited on 2015-07-28). CESG End User Devices Security Guidance: Android 4.2. 10\/2013. url: https:\/\/www.gov.uk\/government\/publications\/end-user-devices-security-guidance-android-42 (visited on 2015-07-28)."},{"key":"e_1_3_2_1_6_1","unstructured":"CESG Samsung Galaxy S6 & S6 Edge - Certification Details. 07\/2015. url: http:\/\/www.cesg.gov.uk\/servicecatalogue\/Product-Assurance\/CPA\/Pages\/Samsung-Galaxy-S6-and-S6-Edge-Certification-Details.aspx (visited on 2015-07-24). CESG Samsung Galaxy S6 & S6 Edge - Certification Details. 07\/2015. url: http:\/\/www.cesg.gov.uk\/servicecatalogue\/Product-Assurance\/CPA\/Pages\/Samsung-Galaxy-S6-and-S6-Edge-Certification-Details.aspx (visited on 2015-07-24)."},{"key":"e_1_3_2_1_7_1","first-page":"182","volume-title":"AnDarwin: Scalable Detection of Semantically Similar Android Applications","author":"Crussell J.","year":"2013","unstructured":"Crussell , J. , Gibler , C. , and Chen , H . AnDarwin: Scalable Detection of Semantically Similar Android Applications . In : Computer Security--ESORICS. Springer Berlin Heidelberg , 2013 , pp 182 -- 199 . isbn: 978-3-642-40202-9. Crussell, J., Gibler, C., and Chen, H. AnDarwin: Scalable Detection of Semantically Similar Android Applications. In: Computer Security--ESORICS. Springer Berlin Heidelberg, 2013, pp 182--199. isbn: 978-3-642-40202-9."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science (LNCS) 6027 LNCS","volume-title":"Web browser security update effectiveness","author":"Duebendorfer T.","year":"2010","unstructured":"Duebendorfer , T. , and Frei , S . Web browser security update effectiveness . Lecture Notes in Computer Science (LNCS) 6027 LNCS ( 2010 ), 124--137. issn: 03029743. Duebendorfer, T., and Frei, S. Web browser security update effectiveness. Lecture Notes in Computer Science (LNCS) 6027 LNCS (2010), 124--137. issn: 03029743."},{"key":"e_1_3_2_1_9_1","volume-title":"April. ETH Zurich","author":"Duebendorfer T.","year":"2009","unstructured":"Duebendorfer , T. , and Frei , S . Why silent updates boost security. Tech. rep . April. ETH Zurich , 2009 . Duebendorfer, T., and Frei, S. Why silent updates boost security. Tech. rep. April. ETH Zurich, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_11_1","volume":"03","author":"Forristal","unstructured":"Forristal , J. Uncovering Android Master Key That Makes 99% of Devices Vulnerable. 03\/2013 . url: https:\/\/bluebox.com\/technical\/uncovering-android-master-key-that-makes-99-of-devices-vulnerable\/ (visited on 2015-04-08). Forristal, J. Uncovering Android Master Key That Makes 99% of Devices Vulnerable. 03\/2013. url: https:\/\/bluebox.com\/technical\/uncovering-android-master-key-that-makes-99-of-devices-vulnerable\/ (visited on 2015-04-08).","journal-title":"J. Uncovering Android Master Key That Makes 99% of Devices Vulnerable."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496094"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159961"},{"key":"e_1_3_2_1_14_1","unstructured":"Google Jelly Bean version information. 2015. url: https:\/\/developer.android.com\/about\/versions\/jelly-bean.html (visited on 2015-04-08). Google Jelly Bean version information. 2015. url: https:\/\/developer.android.com\/about\/versions\/jelly-bean.html (visited on 2015-04-08)."},{"key":"e_1_3_2_1_15_1","unstructured":"Google and Ludwig A. Android Security 2014 Year in Review. 04\/2015. url: https:\/\/source.android.com\/devices\/tech\/security\/reports\/Google_Android_Security_2014_Report_Final.pdf. Google and Ludwig A. Android Security 2014 Year in Review. 04\/2015. url: https:\/\/source.android.com\/devices\/tech\/security\/reports\/Google_Android_Security_2014_Report_Final.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_17_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Grace M.","year":"2012","unstructured":"Grace , M. , Zhou , Y. , Wang , Z. , and Jiang , X . Systematic detection of capability leaks in stock Android smartphones . Network and Distributed System Security Symposium (NDSS) ( 2012 ). Grace, M., Zhou, Y., Wang, Z., and Jiang, X. Systematic detection of capability leaks in stock Android smartphones. Network and Distributed System Security Symposium (NDSS) (2012)."},{"key":"e_1_3_2_1_18_1","unstructured":"HTC The anatomy of an Android OS update. 2013. url: http:\/\/www.htc.com\/us\/go\/htc-software-updates-process\/ (visited on 2015-06-03). HTC The anatomy of an Android OS update. 2013. url: http:\/\/www.htc.com\/us\/go\/htc-software-updates-process\/ (visited on 2015-06-03)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Lindorfer M. Neugschwandtner M. Weichselbaum L. Fratantonio Y. Veen V. van der and Platzer C. ANDRUBIS - 1 000 000 Apps Later: A View on Current Android Malware Behaviors. In: Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). Wroclaw Poland 09\/2014. Lindorfer M. Neugschwandtner M. Weichselbaum L. Fratantonio Y. Veen V. van der and Platzer C. ANDRUBIS - 1 000 000 Apps Later: A View on Current Android Malware Behaviors. In: Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). Wroclaw Poland 09\/2014.","DOI":"10.1109\/BADGERS.2014.7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.48"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"key":"e_1_3_2_1_22_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Smalley S.","year":"2013","unstructured":"Smalley , S. , and Craig , R . Security Enhanced (SE) Android: Bringing Flexible MAC to Android . Network and Distributed System Security Symposium (NDSS) ( 2013 ). Smalley, S., and Craig, R. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. Network and Distributed System Security Symposium (NDSS) (2013)."},{"key":"e_1_3_2_1_23_1","volume-title":"ACLU FTC Android updates","author":"Soghoian C.","year":"2013","unstructured":"Soghoian , C. , and Wizner , B . ACLU FTC Android updates . 2013 . url: http:\/\/www.aclu.org\/files\/assets\/aclu_-_android_ftc_complaint_-_final.pdf. Soghoian, C., and Wizner, B. ACLU FTC Android updates. 2013. url: http:\/\/www.aclu.org\/files\/assets\/aclu_-_android_ftc_complaint_-_final.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"An introduction to error analysis","author":"Taylor J. R.","year":"1997","unstructured":"Taylor , J. R. An introduction to error analysis . 2 nd ed. University Science Books Sausalito , California , 1997 . isbn: 093570275X. Taylor, J. R. An introduction to error analysis. 2nd ed. University Science Books Sausalito, California, 1997. isbn: 093570275X.","edition":"2"},{"key":"e_1_3_2_1_25_1","volume-title":"AndroidVulnerabilities.org","author":"Thomas D. R.","year":"2015","unstructured":"Thomas , D. R. , and Beresford , A. R . AndroidVulnerabilities.org . 2015 . url: http:\/\/androidvulnerabilities.org\/. Thomas, D. R., and Beresford, A. R. AndroidVulnerabilities.org. 2015. url: http:\/\/androidvulnerabilities.org\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Thomas D. R. Wagner D. T. Beresford A. R. and Rice A. Supporting data for: \"Security metrics for the Android ecosystem\". 07\/2015. url: https:\/\/www.repository.cam.ac.uk\/handle\/1810\/249077 (visited on 2015-07-27). Thomas D. R. Wagner D. T. Beresford A. R. and Rice A. Supporting data for: \"Security metrics for the Android ecosystem\". 07\/2015. url: https:\/\/www.repository.cam.ac.uk\/handle\/1810\/249077 (visited on 2015-07-27)."},{"key":"e_1_3_2_1_27_1","volume-title":"The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface","author":"Thomas D. R.","year":"2015","unstructured":"Thomas , D. R. , Beresford , A. R. , Coudray , T. , Sutcliffe , T. , and Taylor , A . The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface . In : Security Protocols XXIII. Springer , 03\/ 2015 . Thomas, D. R., Beresford, A. R., Coudray, T., Sutcliffe, T., and Taylor, A. The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface. In: Security Protocols XXIII. Springer, 03\/2015."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592003"},{"key":"e_1_3_2_1_29_1","volume-title":"Big Data Workshop. ACM","author":"Wagner D. T.","year":"2013","unstructured":"Wagner , D. T. , Rice , A. , and Beresford , A. R . Device Analyzer: Large-scale mobile data collection. In: Sigmetrics , Big Data Workshop. ACM , Pittsburgh, PA, 06\/ 2013 . Wagner, D. T., Rice, A., and Beresford, A. R. Device Analyzer: Large-scale mobile data collection. In: Sigmetrics, Big Data Workshop. ACM, Pittsburgh, PA, 06\/2013."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium","author":"Wang T.","year":"2013","unstructured":"Wang , T. , Lu , K , Lu , L. , Chung , S. , and Lee , W . Jekyll on iOS: when benign apps become evil . USENIX Security Symposium ( 2013 ), 559--572. Wang, T., Lu, K, Lu, L., Chung, S., and Lee, W. Jekyll on iOS: when benign apps become evil. USENIX Security Symposium (2013), 559--572."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium.","volume":"46","author":"Watson R. N. M.","year":"2010","unstructured":"Watson , R. N. M. , Anderson , J. , Kennaway , K. , and Laurie , B . Capsicum: practical capabilities for UNIX . In: USENIX Security Symposium. Vol. 46 . 2. USENIX Association, 08\/ 2010 , 29--46. Watson, R. N. M., Anderson, J., Kennaway, K., and Laurie, B. Capsicum: practical capabilities for UNIX. In: USENIX Security Symposium. Vol. 46. 2. USENIX Association, 08\/2010, 29--46."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.32"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_35_1","volume-title":"Network and Distributed System Security Symposium (NDSS). 2","author":"Zhou Y.","year":"2012","unstructured":"Zhou , Y. , Wang , Z. , Zhou , W. , and Jiang , X . Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets . In: Network and Distributed System Security Symposium (NDSS). 2 . San Diego, CA, 02\/ 2012 . Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In: Network and Distributed System Security Symposium (NDSS). 2. San Diego, CA, 02\/2012."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808117.2808118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T12:31:38Z","timestamp":1673008298000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808117.2808118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":34,"alternative-id":["10.1145\/2808117.2808118","10.1145\/2808117"],"URL":"https:\/\/doi.org\/10.1145\/2808117.2808118","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}