{"id":"https://openalex.org/W2949837509","doi":"https://doi.org/10.1109/infocom.2019.8737510","title":"Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection","display_name":"Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2949837509","doi":"https://doi.org/10.1109/infocom.2019.8737510","mag":"2949837509"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2019.8737510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033189459","display_name":"Hao Fu","orcid":"https://orcid.org/0000-0002-8003-0212"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hao Fu","raw_affiliation_strings":["Department of Computer Science, University of California, Davis, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Davis, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101615991","display_name":"Zizhan Zheng","orcid":"https://orcid.org/0000-0003-4799-1051"},"institutions":[{"id":"https://openalex.org/I114832834","display_name":"Tulane University","ror":"https://ror.org/04vmvtb21","country_code":"US","type":"education","lineage":["https://openalex.org/I114832834"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zizhan Zheng","raw_affiliation_strings":["Department of Computer Science, Tulane University, New Orleans, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tulane University, New Orleans, USA","institution_ids":["https://openalex.org/I114832834"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["Department of Computer Science, Pennsylvania State University, University Park, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086439160","display_name":"Prasant Mohapatra","orcid":"https://orcid.org/0000-0002-2768-5308"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prasant Mohapatra","raw_affiliation_strings":["Department of Computer Science, University of California, Davis, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Davis, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033189459"],"corresponding_institution_ids":["https://openalex.org/I84218800"],"apc_list":null,"apc_paid":null,"fwci":1.4927,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.82907819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2089","last_page":"2097"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8304392099380493},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6917072534561157},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48990148305892944},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.47787919640541077},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4489172101020813},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2210141122341156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8304392099380493},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6917072534561157},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48990148305892944},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.47787919640541077},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4489172101020813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2210141122341156},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2019.8737510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W794140516","https://openalex.org/W1437814062","https://openalex.org/W1582716752","https://openalex.org/W2032724464","https://openalex.org/W2066266646","https://openalex.org/W2077568170","https://openalex.org/W2085577046","https://openalex.org/W2114275288","https://openalex.org/W2139047213","https://openalex.org/W2147658271","https://openalex.org/W2166743230","https://openalex.org/W2168649891","https://openalex.org/W2187373861","https://openalex.org/W2444232594","https://openalex.org/W2512627987","https://openalex.org/W2519002880","https://openalex.org/W2525947671","https://openalex.org/W2533895917","https://openalex.org/W2591624555","https://openalex.org/W2604458809","https://openalex.org/W2604764484","https://openalex.org/W2620787348","https://openalex.org/W2735250639","https://openalex.org/W2950968983","https://openalex.org/W2964162141","https://openalex.org/W4244726870","https://openalex.org/W6603196380","https://openalex.org/W6622679236","https://openalex.org/W6628346335","https://openalex.org/W6686595536"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2392916544","https://openalex.org/W2124367090","https://openalex.org/W1992436224","https://openalex.org/W2386396757"],"abstract_inverted_index":{"Recent":[0],"studies":[1],"observe":[2],"that":[3,11,41,71,110,135,169],"app":[4,53],"foreground":[5,77],"is":[6],"the":[7,13,33,45,48,60,73,112,151,161],"most":[8],"striking":[9],"component":[10],"influences":[12],"access":[14,50],"control":[15],"decisions":[16,162],"in":[17,82,144,155],"mobile":[18],"platform,":[19],"as":[20,177],"users":[21,166],"tend":[22],"to":[23,84,106,121],"deny":[24],"permission":[25,35],"requests":[26],"lacking":[27],"visible":[28],"evidence.":[29],"However,":[30],"none":[31],"of":[32,65,98,153],"existing":[34],"models":[36,109],"provides":[37],"a":[38,67,95,178,182],"systematic":[39],"approach":[40],"can":[42,117,171],"automatically":[43],"answer":[44],"question:":[46],"Is":[47],"resource":[49],"indicated":[51],"by":[52,127],"foreground?":[54],"In":[55],"this":[56],"work,":[57],"we":[58],"present":[59],"design,":[61],"implementation,":[62],"and":[63,79,88,103,141,167],"evaluation":[64],"COSMOS,":[66],"context-aware":[68],"mediation":[69],"system":[70,86],"bridges":[72],"semantic":[74],"gap":[75],"between":[76],"interaction":[78],"background":[80],"access,":[81],"order":[83],"protect":[85],"integrity":[87],"user":[89,104,124,131,158],"privacy.":[90],"Specifically,":[91],"COSMOS":[92,136,154,170],"learns":[93],"from":[94,164],"large":[96],"set":[97],"apps":[99],"with":[100,130,181],"similar":[101],"functionalities":[102],"interfaces":[105],"construct":[107],"generic":[108],"detect":[111],"outliers":[113],"at":[114],"runtime.":[115],"It":[116],"be":[118,172],"further":[119],"customized":[120],"satisfy":[122],"specific":[123,157],"privacy":[125],"preference":[126],"continuously":[128],"evolving":[129],"decisions.":[132],"Experiments":[133],"show":[134],"achieves":[137],"both":[138],"high":[139,142],"precision":[140],"recall":[143],"detecting":[145],"malicious":[146],"requests.":[147],"We":[148],"also":[149],"demonstrate":[150],"effectiveness":[152],"capturing":[156],"preferences":[159],"using":[160],"collected":[163],"24":[165],"illustrate":[168],"easily":[173],"deployed":[174],"on":[175],"smartphones":[176],"real-time":[179],"guard":[180],"very":[183],"low":[184],"performance":[185],"overhead.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
