{"id":"https://openalex.org/W1672097094","doi":"https://doi.org/10.1109/icccn.2015.7288451","title":"Privacy Sensitive Resource Access Monitoring for Android Systems","display_name":"Privacy Sensitive Resource Access Monitoring for Android Systems","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1672097094","doi":"https://doi.org/10.1109/icccn.2015.7288451","mag":"1672097094"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2015.7288451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288451","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058762901","display_name":"Leah L. Zhao","orcid":"https://orcid.org/0000-0003-4293-8745"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Leah Zhao","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031745967","display_name":"Neil Wong Hon Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neil Wong Hon Chan","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022627080","display_name":"Shanchieh Jay Yang","orcid":"https://orcid.org/0009-0004-5503-2082"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shanchieh Jay Yang","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103436438","display_name":"Roy Melton","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roy W. Melton","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058762901"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":1.7365,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84670611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8146206140518188},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7325109243392944},{"id":"https://openalex.org/keywords/panorama","display_name":"Panorama","score":0.7023532390594482},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6585684418678284},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5363852381706238},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42254024744033813},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42112329602241516},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4084145426750183},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2642575204372406},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1427210569381714},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11979684233665466}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8146206140518188},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7325109243392944},{"id":"https://openalex.org/C2780580889","wikidata":"https://www.wikidata.org/wiki/Q41363","display_name":"Panorama","level":2,"score":0.7023532390594482},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6585684418678284},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5363852381706238},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42254024744033813},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42112329602241516},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4084145426750183},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2642575204372406},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1427210569381714},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11979684233665466},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icccn.2015.7288451","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288451","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.rit.edu:theses-9383","is_oa":false,"landing_page_url":"https://scholarworks.rit.edu/theses/8337","pdf_url":null,"source":{"id":"https://openalex.org/S4306402456","display_name":"RIT Scholar Works (Rochester Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155173764","host_organization_name":"Rochester Institute of Technology","host_organization_lineage":["https://openalex.org/I155173764"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Theses","raw_type":"text"},{"id":"pmh:oai:repository.rit.edu:theses-9383","is_oa":false,"landing_page_url":"https://repository.rit.edu/theses/8337","pdf_url":null,"source":{"id":"https://openalex.org/S4306402456","display_name":"RIT Scholar Works (Rochester Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155173764","host_organization_name":"Rochester Institute of Technology","host_organization_lineage":["https://openalex.org/I155173764"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Theses","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W132923154","https://openalex.org/W1485815177","https://openalex.org/W1878305936","https://openalex.org/W1963971515","https://openalex.org/W1977752466","https://openalex.org/W1984361257","https://openalex.org/W1990649188","https://openalex.org/W1997931601","https://openalex.org/W2001081968","https://openalex.org/W2017634428","https://openalex.org/W2033624312","https://openalex.org/W2058996704","https://openalex.org/W2060692877","https://openalex.org/W2141596757","https://openalex.org/W2143554828","https://openalex.org/W2152660559","https://openalex.org/W2153207204","https://openalex.org/W2399891510","https://openalex.org/W6639371725","https://openalex.org/W6646503152","https://openalex.org/W6712192629"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"Existing":[0],"works":[1],"have":[2],"studied":[3],"how":[4,92],"to":[5,14,38,75,86,90,100,165],"collect":[6,39,76],"and":[7,98,119,133,158],"analyze":[8,91],"human":[9,20],"usage":[10,41],"of":[11,19,80,113,123,149,156,161,168],"mobile":[12,33,96,114],"devices,":[13],"aid":[15],"in":[16,116],"further":[17],"understanding":[18],"behavior.":[21,82],"Typical":[22],"data":[23,42,53],"collection":[24],"utilizes":[25],"applications":[26,103],"or":[27],"background":[28,93],"services":[29,94],"installed":[30],"on":[31,57],"the":[32,58,88,111,121,146,154],"device":[34],"with":[35,163],"user":[36,40,81,107,128],"permission":[37],"via":[43],"accelerometer,":[44],"call":[45],"logs,":[46],"location,":[47],"Wi-Fi":[48],"transmission,":[49],"etc.":[50],"through":[51],"a":[52,64,140,159,166],"tainting":[54],"process.":[55],"Built":[56],"existing":[59],"work,":[60],"this":[61],"research":[62],"developed":[63],"system":[65],"called":[66],"Panorama":[67,109,157],"(Privacy-sensitive":[68],"Resource":[69],"Access":[70],"Monitoring":[71],"for":[72,135],"Android":[73],"Systems)":[74],"application":[77,170],"behavior":[78],"instead":[79],"The":[83,137],"goal":[84],"is":[85,131,139],"provide":[87],"means":[89],"access":[95,105,112],"resources,":[97],"potentially":[99],"identify":[101],"suspicious":[102],"that":[104,144],"sensitive":[106],"information.":[108],"tracks":[110],"resources":[115],"real":[117],"time":[118],"enhances":[120],"concept":[122],"taint":[124],"tracking.":[125,136],"Each":[126],"identified":[127],"privacy-sensitive":[129],"resource":[130],"tagged":[132],"marked":[134],"result":[138],"dynamic,":[141],"real-time":[142],"tool":[143],"monitors":[145],"process":[147],"flow":[148],"applications.":[150],"This":[151],"paper":[152],"presents":[153],"development":[155],"set":[160],"analysis":[162],"respect":[164],"variety":[167],"legitimate":[169],"behaviors.":[171]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
