{"id":"https://openalex.org/W2752818243","doi":"https://doi.org/10.1109/iscc.2017.8024534","title":"Contextual approach for identifying malicious Inter-Component privacy leaks in Android apps","display_name":"Contextual approach for identifying malicious Inter-Component privacy leaks in Android apps","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2752818243","doi":"https://doi.org/10.1109/iscc.2017.8024534","mag":"2752818243"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2017.8024534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2017.8024534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058417883","display_name":"Daojuan Zhang","orcid":"https://orcid.org/0009-0000-7173-8895"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Daojuan Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030187602","display_name":"Yuanfang Guo","orcid":"https://orcid.org/0000-0003-4592-8083"},"institutions":[{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanfang Guo","raw_affiliation_strings":["State Key Laboratory of Information Security, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, CAS, Beijing, China","institution_ids":["https://openalex.org/I4391768012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002015794","display_name":"Dianjie Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dianjie Guo","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100431257","display_name":"Rui Wang","orcid":"https://orcid.org/0009-0003-8935-3119"},"institutions":[{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Wang","raw_affiliation_strings":["State Key Laboratory of Information Security, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, CAS, Beijing, China","institution_ids":["https://openalex.org/I4391768012"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011041282","display_name":"Guangming Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guangming Yu","raw_affiliation_strings":["Chinese research institute of general technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese research institute of general technology, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058417883"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1849,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.45622024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"12","issue":null,"first_page":"228","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.733099102973938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6977531313896179},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.6094964742660522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47883346676826477},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42470207810401917},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1993388831615448}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.733099102973938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6977531313896179},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.6094964742660522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47883346676826477},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42470207810401917},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1993388831615448},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2017.8024534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2017.8024534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W124941384","https://openalex.org/W134132330","https://openalex.org/W1630356589","https://openalex.org/W1972796262","https://openalex.org/W1982773740","https://openalex.org/W1986480799","https://openalex.org/W1988036170","https://openalex.org/W1994588724","https://openalex.org/W2027538101","https://openalex.org/W2047636717","https://openalex.org/W2047877275","https://openalex.org/W2077202047","https://openalex.org/W2078197322","https://openalex.org/W2113115074","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2140095007","https://openalex.org/W2153542583","https://openalex.org/W2166743230","https://openalex.org/W2277576447","https://openalex.org/W2398354233","https://openalex.org/W2544992706","https://openalex.org/W4242210993","https://openalex.org/W4245027182","https://openalex.org/W4251061013","https://openalex.org/W4251541794","https://openalex.org/W6682754051","https://openalex.org/W6712318706","https://openalex.org/W6999986095","https://openalex.org/W7056732649"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Inter-Component":[0],"Communication":[1],"(ICC)":[2],"enables":[3],"developers":[4],"to":[5,42,48,68,118],"create":[6],"rich":[7],"and":[8,89,131],"innovative":[9],"applications":[10],"in":[11,75],"Android":[12,76],"platform.":[13],"However,":[14],"some":[15],"privacy":[16,73,109,114,147,163],"problems":[17],"occur":[18],"because":[19],"of":[20,29,53,84,145],"the":[21,27,50,70,81,91,96,101,107,112,119,143,151],"interactions":[22],"among":[23,165],"multiple":[24],"components.":[25],"Since":[26],"flow":[28,52,83],"sensitive":[30,54,85,97],"data":[31,86],"across":[32,87],"components":[33,88],"may":[34],"be":[35],"legal":[36,113],"or":[37],"malicious,":[38],"it":[39],"is":[40],"necessary":[41],"perform":[43],"a":[44,61,126],"precise":[45],"ICC":[46],"analysis":[47,64],"identify":[49,69],"malicious":[51,71,108],"data.":[55],"In":[56,150],"this":[57],"paper,":[58],"we":[59,124],"propose":[60],"static":[62],"taint":[63],"method,":[65],"named":[66],"IccChecker,":[67],"ICC-based":[72,146,162],"leaks":[74,110,164],"applications.":[77,133],"IccChecker":[78,141],"first":[79],"tracks":[80],"potential":[82],"extracts":[90],"contextual":[92,121],"factors":[93],"which":[94],"trigger":[95],"behavior.":[98],"By":[99],"leveraging":[100],"context":[102],"information,":[103],"our":[104,156],"approach":[105,157],"differentiates":[106],"from":[111,176],"information":[115],"exchanges":[116],"according":[117],"proposed":[120],"policy.":[122],"Moreover,":[123],"present":[125],"comprehensive":[127],"assessment":[128],"with":[129,137,153,161],"benchmarks":[130,138],"real-world":[132,154],"Our":[134],"evaluation":[135,152],"results":[136],"demonstrate":[139],"that":[140],"improves":[142],"precision":[144],"leak":[148],"detection.":[149],"applications,":[155],"identifies":[158],"4":[159],"apps":[160,169,173],"168":[166],"Google":[167],"Play":[168],"(2.3%)":[170],"while":[171],"31":[172],"are":[174],"identified":[175],"49":[177],"malwares":[178],"(63.3%).":[179]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
