{"id":"https://openalex.org/W4200470080","doi":"https://doi.org/10.1109/pst52912.2021.9647851","title":"Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions","display_name":"Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200470080","doi":"https://doi.org/10.1109/pst52912.2021.9647851"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063884427","display_name":"Pranav Kotak","orcid":null},"institutions":[{"id":"https://openalex.org/I226983648","display_name":"Narsee Monjee Institute of Management Studies","ror":"https://ror.org/04qksbm30","country_code":"IN","type":"education","lineage":["https://openalex.org/I226983648"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pranav Kotak","raw_affiliation_strings":["Mukesh Patel School of Technology Management and Engineering, NMIMS University, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Mukesh Patel School of Technology Management and Engineering, NMIMS University, Mumbai, India","institution_ids":["https://openalex.org/I226983648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102724757","display_name":"Shweta Bhandari","orcid":"https://orcid.org/0000-0002-2701-9866"},"institutions":[{"id":"https://openalex.org/I33552525","display_name":"LNM Institute of Information Technology","ror":"https://ror.org/03jp7rg16","country_code":"IN","type":"education","lineage":["https://openalex.org/I33552525"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shweta Bhandari","raw_affiliation_strings":["The LNM Institute of Information Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"The LNM Institute of Information Technology, Jaipur, India","institution_ids":["https://openalex.org/I33552525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084035589","display_name":"Akka Zemmari","orcid":"https://orcid.org/0000-0002-9776-0449"},"institutions":[{"id":"https://openalex.org/I4210142254","display_name":"Laboratoire Bordelais de Recherche en Informatique","ror":"https://ror.org/03adqg323","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I15057530","https://openalex.org/I4210142254","https://openalex.org/I4210159245","https://openalex.org/I4210160189"]},{"id":"https://openalex.org/I4210160189","display_name":"Institut Polytechnique de Bordeaux","ror":"https://ror.org/054qv7y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210160189"]},{"id":"https://openalex.org/I15057530","display_name":"Universit\u00e9 de Bordeaux","ror":"https://ror.org/057qpr032","country_code":"FR","type":"education","lineage":["https://openalex.org/I15057530"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Akka Zemmari","raw_affiliation_strings":["LaBRI, University of Bordeaux, Talence, France"],"affiliations":[{"raw_affiliation_string":"LaBRI, University of Bordeaux, Talence, France","institution_ids":["https://openalex.org/I15057530","https://openalex.org/I4210142254","https://openalex.org/I4210160189"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050286990","display_name":"Jaykrishna Joshi","orcid":null},"institutions":[{"id":"https://openalex.org/I226983648","display_name":"Narsee Monjee Institute of Management Studies","ror":"https://ror.org/04qksbm30","country_code":"IN","type":"education","lineage":["https://openalex.org/I226983648"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jaykrishna Joshi","raw_affiliation_strings":["Mukesh Patel School of Technology Management and Engineering, NMIMS University, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Mukesh Patel School of Technology Management and Engineering, NMIMS University, Mumbai, India","institution_ids":["https://openalex.org/I226983648"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063884427"],"corresponding_institution_ids":["https://openalex.org/I226983648"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17701149,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7521324157714844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7433769106864929},{"id":"https://openalex.org/keywords/digitization","display_name":"Digitization","score":0.6267209053039551},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6084229946136475},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5407933592796326},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.5249526500701904},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5062138438224792},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5033378005027771},{"id":"https://openalex.org/keywords/android-application","display_name":"Android application","score":0.4431341886520386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4261821210384369},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4148833453655243},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36771252751350403},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26446205377578735},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.22355961799621582},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12625080347061157}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7521324157714844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433769106864929},{"id":"https://openalex.org/C2779308522","wikidata":"https://www.wikidata.org/wiki/Q843958","display_name":"Digitization","level":2,"score":0.6267209053039551},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6084229946136475},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5407933592796326},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.5249526500701904},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5062138438224792},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5033378005027771},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.4431341886520386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4261821210384369},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4148833453655243},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36771252751350403},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26446205377578735},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.22355961799621582},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12625080347061157},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst52912.2021.9647851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1982730827","https://openalex.org/W2003516014","https://openalex.org/W2059515884","https://openalex.org/W2092712591","https://openalex.org/W2114275288","https://openalex.org/W2122672392","https://openalex.org/W2343420619","https://openalex.org/W2593474785","https://openalex.org/W2727469818","https://openalex.org/W2735392951","https://openalex.org/W2756021496","https://openalex.org/W2784097977","https://openalex.org/W2806937472","https://openalex.org/W2888194137","https://openalex.org/W2897230315","https://openalex.org/W2960036860","https://openalex.org/W3000145624","https://openalex.org/W3085758173","https://openalex.org/W3109572743"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W3025122950","https://openalex.org/W2311926078","https://openalex.org/W3200508744","https://openalex.org/W2462192250","https://openalex.org/W4312234627","https://openalex.org/W3195312353","https://openalex.org/W2717179875"],"abstract_inverted_index":{"Data":[0],"theft":[1],"is":[2,128],"a":[3,27,62,84],"significant":[4],"security":[5],"threat":[6],"for":[7,32,87,130],"mobile":[8],"app":[9],"users.":[10],"The":[11],"growing":[12],"importance":[13],"of":[14,19,55,102,122,136],"digitization":[15],"motivates":[16],"the":[17,47,56,68,100,119,126,137],"diversity":[18],"available":[20],"applications.":[21,58],"In":[22,105],"this":[23],"paper,":[24],"we":[25],"propose":[26],"novel":[28],"and":[29,39,98,111,125],"lightweight":[30],"method":[31],"classifying":[33],"Android":[34,57],"apps":[35,69],"into":[36,70],"low,":[37],"medium,":[38],"high-risk":[40],"categories.":[41,73,90],"Our":[42],"approach":[43,117],"relies":[44],"largely":[45],"on":[46],"other":[48,78,113],"permissions":[49,79],"(also":[50],"termed":[51],"as":[52,83],"hidden":[53],"permissions)":[54],"We":[59,74,91],"have":[60,92],"proposed":[61,116],"linear":[63],"regression-based":[64],"technique":[65],"to":[66,96],"classify":[67],"different":[71],"risk":[72,89,120],"will":[75],"show":[76],"how":[77],"can":[80],"be":[81],"used":[82,93],"strong":[85],"indicator":[86],"defining":[88],"K-means":[94],"clustering":[95],"validate":[97],"explain":[99],"decision":[101],"our":[103,115],"method.":[104],"an":[106,123],"evaluation":[107],"with":[108],"500":[109],"applications":[110],"101":[112],"permissions,":[114],"decides":[118],"factor":[121],"app,":[124],"explanation":[127],"provided":[129],"each":[131],"detection":[132],"reveal":[133],"relevant":[134],"properties":[135],"detected":[138],"risk.":[139]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
