{"id":"https://openalex.org/W2958606732","doi":"https://doi.org/10.1109/icc.2019.8761572","title":"Overprivileged Permission Detection for Android Applications","display_name":"Overprivileged Permission Detection for Android Applications","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2958606732","doi":"https://doi.org/10.1109/icc.2019.8761572","mag":"2958606732"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017695790","display_name":"Sha Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sha Wu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108050448","display_name":"Jiajia Liu","orcid":"https://orcid.org/0000-0003-4273-8866"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Liu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017695790"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":2.4879,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90033141,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9879461526870728},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8519409894943237},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6656697392463684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6066721081733704},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4544352889060974},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3958127200603485},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1581544280052185}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9879461526870728},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8519409894943237},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6656697392463684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6066721081733704},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4544352889060974},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3958127200603485},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1581544280052185},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1971017525","https://openalex.org/W2060537671","https://openalex.org/W2061338588","https://openalex.org/W2064853889","https://openalex.org/W2102197271","https://openalex.org/W2114275288","https://openalex.org/W2129490689","https://openalex.org/W2140095007","https://openalex.org/W2156368183","https://openalex.org/W2170347235","https://openalex.org/W2724356736","https://openalex.org/W2734415351","https://openalex.org/W2770011597","https://openalex.org/W6740520566"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W4210309948","https://openalex.org/W2755037920","https://openalex.org/W4388923452","https://openalex.org/W2072937473","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W609672658"],"abstract_inverted_index":{"Android":[0,22,140,163],"applications":[1],"(Apps)":[2],"have":[3],"penetrated":[4],"almost":[5],"every":[6],"aspect":[7],"of":[8,34,49,90,106,119,129,132,139,159,162,202,210],"our":[9],"lives,":[10],"bring":[11],"users":[12,44,84,95,178],"great":[13],"convenience":[14],"as":[15,17,38],"well":[16],"security":[18],"concerns.":[19],"Even":[20],"though":[21],"system":[23],"adopts":[24],"permission":[25,59,63,89,98,120],"mechanism":[26],"to":[27,53,71,85,115,184],"restrict":[28],"Apps":[29,193],"from":[30,195],"accessing":[31],"important":[32],"resources":[33],"a":[35,147],"smartphone,":[36],"such":[37],"telephony,":[39],"camera":[40],"and":[41,136,177,198],"GPS":[42],"location,":[43],"face":[45],"still":[46],"significant":[47],"risk":[48,105],"privacy":[50],"leakage":[51],"due":[52],"the":[54,61,66,87,101,104,117,130,137,157,212],"overprivileged":[55,58,88,160],"permissions.":[56],"The":[57],"means":[60],"extra":[62],"declared":[64,99],"by":[65,100],"App":[67,133],"but":[68],"has":[69],"nothing":[70],"do":[72],"with":[73],"its":[74],"function.":[75],"Unfortunately,":[76],"there":[77],"doesn't":[78],"exist":[79],"any":[80,97,181],"tool":[81,149],"for":[82,156,207],"ordinary":[83],"detect":[86],"an":[91],"App,":[92,102],"hence":[93],"most":[94],"grant":[96],"intensifying":[103],"private":[107],"information":[108],"leakage.":[109],"Although":[110],"some":[111],"previous":[112],"studies":[113],"tried":[114],"solve":[116],"problem":[118],"overprivilege,":[121],"their":[122,185],"methods":[123],"are":[124,204],"not":[125],"applicable":[126],"nowadays":[127],"because":[128],"progress":[131],"protection":[134],"technology":[135],"update":[138],"system.":[141],"Towards":[142],"this":[143],"end,":[144],"we":[145,188],"develop":[146],"user-friendly":[148],"based":[150],"on":[151,191],"frequent":[152],"item":[153],"set":[154],"mining":[155],"detection":[158],"permissions":[161],"Apps,":[164],"which":[165],"is":[166],"named":[167],"Droidtector.":[168],"Droidtector":[169,190],"can":[170,179],"operate":[171],"in":[172],"online":[173],"or":[174],"offline":[175],"mode":[176,182],"choose":[180],"according":[183],"situation.":[186],"Finally,":[187],"run":[189],"1000":[192],"crawled":[194],"Google":[196],"Play":[197],"find":[199],"that":[200],"479":[201],"them":[203],"overprivileged,":[205],"accounting":[206],"about":[208],"48%":[209],"all":[211],"sample":[213],"Apps.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
