{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:01:24Z","timestamp":1725771684500},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T00:00:00Z","timestamp":1571097600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["DARPA-15-15-TC-FP006"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243785","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1120-1136","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["ClickShield"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Possemato","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"Universita' degli Studi di Milano, Milan, Italy"}]},{"given":"Simon Pak Ho","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Yanick","family":"Fratantonio","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Yair Amit. 2016. 95.4 Percent of All Android Devices Are Susceptible to Accessibility Clickjacking Exploits. https:\/\/www.skycure.com\/blog\/95--4-android-devices-susceptible-accessibility-clickjacking-exploits\/. Yair Amit. 2016. 95.4 Percent of All Android Devices Are Susceptible to Accessibility Clickjacking Exploits. https:\/\/www.skycure.com\/blog\/95--4-android-devices-susceptible-accessibility-clickjacking-exploits\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Yair Amit. 2016. \"Accessibility Clickjacking\" -- The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. https:\/\/www.skycure.com\/blog\/accessibility-clickjacking\/. Yair Amit. 2016. \"Accessibility Clickjacking\" -- The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. https:\/\/www.skycure.com\/blog\/accessibility-clickjacking\/."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098247"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP","year":"2017","author":"Carlini Nicholas","key":"e_1_3_2_2_5_1"},{"volume-title":"Proc. of the USENIX Security Symposium.","year":"2014","author":"Chen Qi Alfred","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","unstructured":"F-Droid. 2018. Free and Open Source (FOSS) software on the Android platform. https:\/\/f-droid.org\/en\/ F-Droid. 2018. Free and Open Source (FOSS) software on the Android platform. https:\/\/f-droid.org\/en\/"},{"volume-title":"Proc. of IEEE Workshop on Web 2.0 Security & Privacy (W2SP).","year":"2011","author":"Felt Adrienne Porter","key":"e_1_3_2_2_8_1"},{"volume-title":"Proc. of Financial Cryptography and Data Security (FC).","year":"2016","author":"Fernandes Earlence","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.39"},{"key":"e_1_3_2_2_11_1","unstructured":"geeksonsecurity. 2018. Android Overlay Protector. https:\/\/geeksonsecurity.github.io\/overlay-protector-website\/. geeksonsecurity. 2018. Android Overlay Protector. https:\/\/geeksonsecurity.github.io\/overlay-protector-website\/."},{"volume-title":"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In USENIX Security Symposium.","year":"2015","author":"Huang Jianjun","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","unstructured":"Google Inc. 2018. Documentation for the FLAG_WINDOW_IS_OBSCURED flag. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent.html#FLAG_WINDOW_IS_OBSCURED Google Inc. 2018. Documentation for the FLAG_WINDOW_IS_OBSCURED flag. https:\/\/developer.android.com\/reference\/android\/view\/MotionEvent.html#FLAG_WINDOW_IS_OBSCURED"},{"key":"e_1_3_2_2_15_1","unstructured":"Amar Menezes. 2018. Privilege Escalation via adbd Misconfiguration. https:\/\/labs.mwrinfosecurity.com\/assets\/BlogFiles\/mwri-android-adbd-privilege-escalation-advisory-2018-01--17.pdf . Amar Menezes. 2018. Privilege Escalation via adbd Misconfiguration. https:\/\/labs.mwrinfosecurity.com\/assets\/BlogFiles\/mwri-android-adbd-privilege-escalation-advisory-2018-01--17.pdf ."},{"volume-title":"UIPicker: User-Input Privacy Identification in Mobile Applications. In USENIX Security Symposium.","year":"2015","author":"Nan Yuhong","key":"e_1_3_2_2_16_1"},{"volume-title":"UI Redressing Attacks on Android devices. Black Hat Abu Dhabi","year":"2012","author":"Niemietz Marcus","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23529"},{"volume-title":"Proc. of USENIX Security Symposium.","year":"2015","author":"Ren Chuangang","key":"e_1_3_2_2_20_1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"volume-title":"Proc. of the USENIX Conference on Offensive Technologies.","year":"2010","author":"Rydstedt Gustav","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","unstructured":"Tara Seals. 2016. Autorooting Overlay Malware Are Rising Android Threats. http:\/\/www.infosecurity-magazine.com\/news\/autorooting-overlay-malware-are\/. Tara Seals. 2016. Autorooting Overlay Malware Are Rising Android Threats. http:\/\/www.infosecurity-magazine.com\/news\/autorooting-overlay-malware-are\/."},{"key":"e_1_3_2_2_25_1","unstructured":"SFYLABS. {n. d.}. Client Side Detection (CSD). https:\/\/clientsidedetection.com. SFYLABS. {n. d.}. Client Side Detection (CSD). https:\/\/clientsidedetection.com."},{"key":"e_1_3_2_2_26_1","unstructured":"Tom Spring. 2016. SCOURGE OF ANDROID OVERLAY MALWARE ON RISE. https:\/\/threatpost.com\/scourge-of-android-overlay-malware-on-rise\/117720\/. Tom Spring. 2016. SCOURGE OF ANDROID OVERLAY MALWARE ON RISE. https:\/\/threatpost.com\/scourge-of-android-overlay-malware-on-rise\/117720\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Cameron Summerson. 2017. How to Fix the \"Screen Overlay Detected\" Error on Android. https:\/\/www.howtogeek.com\/271519\/how-to-fix-the-screen-overlay-detected-error-on-android\/ Cameron Summerson. 2017. How to Fix the \"Screen Overlay Detected\" Error on Android. https:\/\/www.howtogeek.com\/271519\/how-to-fix-the-screen-overlay-detected-error-on-android\/"},{"key":"e_1_3_2_2_28_1","unstructured":"Urbandroid Team. 2018. Twilight App. https:\/\/play.google.com\/store\/apps\/details?id=com.urbandroid.lux&hl=en. Urbandroid Team. 2018. Twilight App. https:\/\/play.google.com\/store\/apps\/details?id=com.urbandroid.lux&hl=en."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860470"},{"key":"e_1_3_2_2_30_1","unstructured":"Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator. http:\/\/www.symantec.com\/connect\/blogs\/android-ransomware-variant-uses-clickjacking-become-device-administrator. Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator. http:\/\/www.symantec.com\/connect\/blogs\/android-ransomware-variant-uses-clickjacking-become-device-administrator."},{"key":"e_1_3_2_2_31_1","unstructured":"Wu Zhou Linhai Song Jens Monrad Junyuan Zeng and Jimmy Su. 2016. The Latest Android Overlay Malware Spreading via SMS Phishing in Europe. https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/06\/latest-android-overlay-malware-spreading-in-europe.html. Wu Zhou Linhai Song Jens Monrad Junyuan Zeng and Jimmy Su. 2016. The Latest Android Overlay Malware Spreading via SMS Phishing in Europe. https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/06\/latest-android-overlay-malware-spreading-in-europe.html."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243785","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T06:02:35Z","timestamp":1673330555000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243785"}},"subtitle":["Are You Hiding Something? Towards Eradicating Clickjacking on Android"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":30,"alternative-id":["10.1145\/3243734.3243785","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243785","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}