{"id":"https://openalex.org/W2766623551","doi":"https://doi.org/10.1109/tdsc.2017.2768536","title":"senDroid: Auditing Sensor Access in Android System-Wide","display_name":"senDroid: Auditing Sensor Access in Android System-Wide","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2766623551","doi":"https://doi.org/10.1109/tdsc.2017.2768536","mag":"2766623551"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2768536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2768536","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011724449","display_name":"Weili Han","orcid":"https://orcid.org/0000-0001-8663-436X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weili Han","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, Shanghai, China","Software School, Fudan University"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Software School, Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103047919","display_name":"Chang Cao","orcid":"https://orcid.org/0000-0003-1663-5919"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Cao","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, Shanghai, China","Software School, Fudan University"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Software School, Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353550","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-4072-0710"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407353","display_name":"Dong Li","orcid":"https://orcid.org/0000-0001-6008-1410"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Li","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, Shanghai, China","Software School, Fudan University"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Software School, Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085289950","display_name":"Zheran Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheran Fang","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, Shanghai, China","Software School, Fudan University"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Software School, Fudan University","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017641955","display_name":"X. Sean Wang","orcid":"https://orcid.org/0009-0005-4668-3120"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"X. Sean Wang","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, Shanghai, China","Software School, Fudan University"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Software School, Fudan University","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5011724449"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.3738,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.59196227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"17","issue":"2","first_page":"407","last_page":"421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8260866403579712},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7763930559158325},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7143644094467163},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5736287236213684},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4641249179840088},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36330246925354004},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3213464319705963},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1397055685520172},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08064797520637512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8260866403579712},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7763930559158325},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7143644094467163},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5736287236213684},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4641249179840088},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36330246925354004},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3213464319705963},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1397055685520172},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08064797520637512},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2017.2768536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2768536","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:hub.hku.hk:10722/346654","is_oa":false,"landing_page_url":"https://hub.hku.hk/handle/10722/346654","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1665086995","display_name":null,"funder_award_id":"61572136","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6539836586","display_name":null,"funder_award_id":"61472358","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6876066958","display_name":null,"funder_award_id":"61370080","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W313427955","https://openalex.org/W794140516","https://openalex.org/W1220317179","https://openalex.org/W1438441013","https://openalex.org/W1522939654","https://openalex.org/W1537246865","https://openalex.org/W1587084186","https://openalex.org/W1658739283","https://openalex.org/W1963971515","https://openalex.org/W1984879109","https://openalex.org/W1991685971","https://openalex.org/W2009613904","https://openalex.org/W2032616120","https://openalex.org/W2043579558","https://openalex.org/W2060692877","https://openalex.org/W2085577046","https://openalex.org/W2089529331","https://openalex.org/W2090465075","https://openalex.org/W2093316511","https://openalex.org/W2095410061","https://openalex.org/W2105103777","https://openalex.org/W2117811484","https://openalex.org/W2144169341","https://openalex.org/W2150097065","https://openalex.org/W2224973694","https://openalex.org/W2237686084","https://openalex.org/W2294170611","https://openalex.org/W2400528202","https://openalex.org/W2593458616","https://openalex.org/W6603356336","https://openalex.org/W6622679236","https://openalex.org/W6628072596","https://openalex.org/W6631222091","https://openalex.org/W6632379278","https://openalex.org/W6635015058","https://openalex.org/W6636829475","https://openalex.org/W6658713452","https://openalex.org/W6688899891","https://openalex.org/W6689548625","https://openalex.org/W6697491314","https://openalex.org/W6713182605","https://openalex.org/W6734242111"],"related_works":["https://openalex.org/W2404937507","https://openalex.org/W2030757640","https://openalex.org/W3121186197","https://openalex.org/W2373849942","https://openalex.org/W3034529322","https://openalex.org/W151161666","https://openalex.org/W2118407572","https://openalex.org/W2113597336","https://openalex.org/W1991580985","https://openalex.org/W2115913271"],"abstract_inverted_index":{"Sensors":[0],"are":[1,98,105,246,276],"widely":[2],"used":[3],"in":[4,213,260,288],"modern":[5],"mobile":[6],"devices":[7,72],"(e.g.,":[8,37],"smartphones,":[9],"watches)":[10],"and":[11,26,40,60,81,100,163,177,180,192,278,300,303],"may":[12],"gather":[13],"abundant":[14],"information":[15],"from":[16,183,249],"environments":[17],"as":[18,20,43,202],"well":[19],"about":[21],"users,":[22],"e.g.,":[23],"photos,":[24],"sounds":[25],"locations.":[27],"The":[28],"rich":[29],"set":[30],"of":[31,70,159,210,220],"sensor":[32,103,112,135,148,297,331],"data":[33,59,104,113,136],"enables":[34],"various":[35],"applications":[36,230],"health":[38],"monitoring)":[39],"personalized":[41],"apps":[42,259,270,275,281,286,313],"well.":[44],"However,":[45],"the":[46,67,85,96,108,156,160,207,229,235,243,250,274,285,289,294,325],"powerful":[47],"sensing":[48,168],"abilities":[49],"provide":[50],"opportunities":[51],"for":[52],"attackers":[53],"to":[54,87,120,133,146,154,170,201,227,323],"steal":[55],"both":[56],"personal":[57],"sensitive":[58],"commercial":[61],"secrets":[62],"like":[63],"never":[64],"before.":[65],"Unfortunately,":[66],"current":[68],"design":[69],"smart":[71],"only":[73],"provides":[74],"a":[75,128,142,198,217],"coarse":[76],"access":[77,271,282,314],"control":[78],"on":[79,256,305],"sensors":[80,97,212,272,283,315],"does":[82],"not":[83],"have":[84],"capability":[86],"audit":[88,181,191,228],"sensing.":[89],"We":[90],"argue":[91],"that":[92,130,267,310],"knowing":[93],"how":[94,101],"often":[95],"accessed":[99],"much":[102],"collected":[106],"is":[107,118],"first-line":[109],"defense":[110],"against":[111],"breach.":[114],"Such":[115],"an":[116],"ability":[117],"yet":[119],"be":[121],"designed.":[122],"In":[123,138],"this":[124],"paper,":[125],"we":[126,140,165,196,292],"propose":[127],"framework":[129,237],"allows":[131,224],"users":[132,226],"acquire":[134],"usages.":[137],"particular,":[139],"leverage":[141],"hook-based":[143],"track":[144,147],"method":[145],"accesses.":[149],"Thus,":[150],"with":[151],"no":[152],"need":[153],"change":[155],"source":[157],"codes":[158,245],"Android":[161,225,236,263],"system":[162],"applications,":[164],"can":[166],"intercept":[167],"operations":[169],"graphic":[171],"sensors,":[172,174,176,179],"audio":[173],"location":[175],"standard":[178],"them":[182],"four":[184],"aspects:":[185],"flow":[186],"audit,":[187,189],"frequency":[188],"duration":[190],"invoker":[193],"audit.":[194],"Then,":[195],"implement":[197],"prototype,":[199],"referred":[200],"senDroid,":[203],"which":[204],"visually":[205],"shows":[206,266,309],"quantitative":[208],"usages":[209],"these":[211],"real":[214],"time":[215],"at":[216],"performance":[218],"overhead":[219],"[0.04-8.05]":[221],"percent.":[222],"senDroid":[223],"even":[231],"when":[232,242,273],"they":[233],"bypass":[234],"via":[238,316],"JNI":[239],"invocations":[240],"or":[241],"malicious":[244],"dynamically":[247],"loaded":[248],"server":[251],"side.":[252],"Our":[253,319],"empirical":[254],"study":[255],"1,489":[257],"popular":[258],"three":[261],"well-known":[262],"app":[264],"markets":[265],"26.32":[268],"percent":[269,280,312],"launched,":[277],"11.01":[279],"while":[284],"run":[287],"background.":[290],"Furthermore,":[291],"analyze":[293],"relevance":[295],"between":[296],"usage":[298],"patterns":[299],"third-party":[301,307,317],"libraries,":[302],"reverse-engineering":[304],"suspicious":[306],"libraries":[308],"77.27":[311],"libraries.":[318],"results":[320],"call":[321],"attentions":[322],"address":[324],"users'":[326],"privacy":[327],"concerns":[328],"caused":[329],"by":[330],"access.":[332]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
