Benjamin E. Andow Lentzsch, C., Shah, S. J., Andow, B., Degeling, M., Das, A., & Enck, W. (2021). Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021). https://doi.org/10.14722/ndss.2021.23111 Gorski, S. A., III, Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., & Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36. https://doi.org/10.1145/3292006.3300023 Andow, B., Nadkarni, A., Bassett, B., Enck, W., & Xie, T. (2016). A Study of Grayware on Google Play. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233. https://doi.org/10.1109/spw.2016.40 Shu, R., Wang, P., Gorski, S. A., Andow, B., Nadkarni, A., Deshotels, L., … Gu, X. (2016). A Study of Security Isolation Techniques. ACM COMPUTING SURVEYS, 49(3). https://doi.org/10.1145/2988545 Nadkarni, A., Andow, B., Enck, W., & Jha, S. (2016). Practical DIFC enforcement on android. Proceedings of the 25th USENIX Security Symposium, 1119–1136. Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., & Enck, W. (2015). AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, Vol. 1, pp. 303–313. https://doi.org/10.1109/icse.2015.50