{"id":"https://openalex.org/W3015284722","doi":"https://doi.org/10.1109/access.2020.2987059","title":"Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique","display_name":"Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3015284722","doi":"https://doi.org/10.1109/access.2020.2987059","mag":"3015284722"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2987059","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2987059","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2020.2987059","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100741442","display_name":"Sunghoon Lee","orcid":"https://orcid.org/0000-0002-7129-825X"},"institutions":[{"id":"https://openalex.org/I88761825","display_name":"Korea University of Science and Technology","ror":"https://ror.org/000qzf213","country_code":"KR","type":"education","lineage":["https://openalex.org/I88761825"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sung-Hoon Lee","raw_affiliation_strings":["Information Security Engineering, Ph.D. Student, University of Science and Technology, Daejeon, South Korea","ORCiD"],"raw_orcid":"https://orcid.org/0000-0002-7129-825X","affiliations":[{"raw_affiliation_string":"Information Security Engineering, Ph.D. Student, University of Science and Technology, Daejeon, South Korea","institution_ids":["https://openalex.org/I88761825"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100454614","display_name":"Seung-Hyun Kim","orcid":"https://orcid.org/0000-0001-8934-3648"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seung-Hyun Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001319728","display_name":"Jung Yeon Hwang","orcid":"https://orcid.org/0000-0002-8123-0507"},"institutions":[{"id":"https://openalex.org/I165677929","display_name":"Sungshin Women's University","ror":"https://ror.org/0500xzf72","country_code":"KR","type":"education","lineage":["https://openalex.org/I165677929"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jung Yeon Hwang","raw_affiliation_strings":["Department of Mathematics, Sungshin Women\u2019s University, Seoul, South Korea","Department of Mathematics, Sungshin Women&#x2019;s University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Sungshin Women\u2019s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]},{"raw_affiliation_string":"Department of Mathematics, Sungshin Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100605819","display_name":"Soohyung Kim","orcid":"https://orcid.org/0000-0002-3190-0293"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soohyung Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108458789","display_name":"Seunghun Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seung-Hun Jin","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100741442"],"corresponding_institution_ids":["https://openalex.org/I88761825"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.4558,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.59604206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":null,"first_page":"83248","last_page":"83264"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8440337181091309},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6740992665290833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6241570711135864},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5622396469116211},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4818666875362396},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4482552707195282},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4464784562587738},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44641271233558655},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.4260020852088928},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4156447649002075},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.41224268078804016},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.40277770161628723},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3536991477012634},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2045149803161621}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8440337181091309},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6740992665290833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6241570711135864},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5622396469116211},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4818666875362396},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4482552707195282},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4464784562587738},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44641271233558655},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.4260020852088928},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4156447649002075},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.41224268078804016},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.40277770161628723},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3536991477012634},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2045149803161621},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2987059","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2987059","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ed77631501114f76bb3ec3a449a3fcea","is_oa":true,"landing_page_url":"https://doaj.org/article/ed77631501114f76bb3ec3a449a3fcea","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 83248-83264 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2987059","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2987059","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W53797064","https://openalex.org/W594373990","https://openalex.org/W847546454","https://openalex.org/W1959168623","https://openalex.org/W1988506816","https://openalex.org/W2067512661","https://openalex.org/W2114275288","https://openalex.org/W2125011234","https://openalex.org/W2139806091","https://openalex.org/W2145400454","https://openalex.org/W2243523040","https://openalex.org/W2264131323","https://openalex.org/W2400329213","https://openalex.org/W2503093001","https://openalex.org/W2607128324","https://openalex.org/W2741515051","https://openalex.org/W2770334135","https://openalex.org/W2790631818","https://openalex.org/W2792393499","https://openalex.org/W2900587422","https://openalex.org/W2901356191","https://openalex.org/W2962826729","https://openalex.org/W6618045497","https://openalex.org/W6623464991"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"With":[0],"the":[1,38,59,74,136,156,159,187,204,210,215,222,236],"popularization":[2],"of":[3,40,241],"smart":[4,17,29],"devices,":[5,30],"companies":[6],"are":[7,25,34,100,172],"adopting":[8],"bring-your-own-device":[9],"or":[10,69],"mobile":[11],"office":[12],"policies":[13],"that":[14,231],"utilize":[15],"personal":[16],"devices":[18],"for":[19],"work.":[20],"However,":[21],"as":[22,37,103],"work":[23],"data":[24],"stored":[26],"on":[27,81,91,151],"individual":[28],"critical":[31],"security":[32,66,87,125,147,170,179,205,223,243],"threats":[33],"emerging,":[35],"such":[36,102],"leakage":[39],"confidential":[41],"documents.":[42],"Enterprises":[43],"want":[44],"to":[45,117,145,198],"address":[46],"this":[47,110,232],"issue":[48],"by":[49,131],"adapting":[50],"enterprise":[51],"mobility":[52],"management":[53],"(EMM)":[54],"solutions.":[55],"Appwrapping":[56],"is":[57,207],"among":[58],"core":[60],"technologies":[61],"in":[62,200,217],"EMM":[63],"solutions,":[64],"enabling":[65],"function":[67,88,126,197,206,224,244],"insertion":[68,89],"misused":[70,84],"code":[71,85,128,141],"patching":[72],"without":[73,135,184],"original":[75,137],"application":[76],"(app)":[77],"source":[78,138],"code.":[79,139,189,246],"Studies":[80],"permission":[82],"control,":[83],"patching,":[86],"based":[90,150],"static":[92],"policies,":[93],"etc.,":[94],"have":[95],"been":[96],"conducted,":[97],"but":[98],"there":[99],"limitations":[101],"poor":[104],"user":[105],"convenience":[106,240],"and":[107,182,220,239],"overhead.":[108],"In":[109,165],"paper,":[111],"we":[112],"propose":[113],"an":[114],"AppWrapper":[115,191],"toolkit":[116,192],"support":[118],"dynamic":[119],"polices.":[120],"Basically":[121],"it":[122],"can":[123,161,176,213],"insert":[124],"execution":[127,245],"into":[129],"apps":[130],"using":[132],"appwrapping":[133],"technology":[134],"This":[140],"uses":[142],"Java":[143,174],"reflection":[144,175],"invoke":[146,177],"functions":[148,171,180],"dynamically":[149,181],"preset":[152],"policies.":[153],"Accordingly,":[154],"after":[155],"initial":[157],"appwrapping,":[158],"policy":[160],"be":[162],"changed":[163],"easily.":[164],"addition,":[166],"even":[167],"when":[168],"multiple":[169,178],"required,":[173],"simultaneously":[183],"conflicting":[185],"with":[186],"existing":[188],"The":[190],"also":[193],"provides":[194],"a":[195],"log":[196,216],"check":[199,214],"real":[201,218],"time":[202,219],"where":[203,225],"needed.":[208,226],"Hence,":[209],"policy-setting":[211],"administrator":[212],"implement":[221],"Our":[227],"experimental":[228],"results":[229],"show":[230],"technique":[233],"improves":[234],"significantly":[235],"efficiency,":[237],"effectiveness,":[238],"adding":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
