{"id":"https://openalex.org/W2444232594","doi":"https://doi.org/10.1109/tifs.2016.2581304","title":"Rethinking Permission Enforcement Mechanism on Mobile Systems","display_name":"Rethinking Permission Enforcement Mechanism on Mobile Systems","publication_year":2016,"publication_date":"2016-06-15","ids":{"openalex":"https://openalex.org/W2444232594","doi":"https://doi.org/10.1109/tifs.2016.2581304","mag":"2444232594"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2581304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2581304","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100368650","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0001-5538-1478"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052437722","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-9714-5545"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["Shanghai Key Laboratory of Data Science, School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Data Science, School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058852421","display_name":"Guofei Gu","orcid":"https://orcid.org/0000-0003-0630-741X"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guofei Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100353550","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-4072-0710"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["Department of Computer Science, University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100368650"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":2.0174,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.87418126,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"11","issue":"10","first_page":"2227","last_page":"2240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9782317280769348},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8548436760902405},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7676407098770142},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.745835542678833},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.630774199962616},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5555061101913452},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.511137068271637},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12337735295295715}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9782317280769348},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8548436760902405},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7676407098770142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.745835542678833},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.630774199962616},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5555061101913452},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.511137068271637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12337735295295715},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2016.2581304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2581304","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:hub.hku.hk:10722/346593","is_oa":false,"landing_page_url":"https://hub.hku.hk/handle/10722/346593","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3987367720","display_name":null,"funder_award_id":"61300027","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6115047661","display_name":null,"funder_award_id":"13511504402","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G8444703991","display_name":null,"funder_award_id":"13JC1400800","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G8665235237","display_name":null,"funder_award_id":"15511103003","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W38766468","https://openalex.org/W187285683","https://openalex.org/W190551272","https://openalex.org/W1433255219","https://openalex.org/W1522939654","https://openalex.org/W1549577837","https://openalex.org/W1680232729","https://openalex.org/W1912565424","https://openalex.org/W1963971515","https://openalex.org/W1973548319","https://openalex.org/W1984879109","https://openalex.org/W1985686072","https://openalex.org/W1988036170","https://openalex.org/W1989255032","https://openalex.org/W1994588724","https://openalex.org/W2010395842","https://openalex.org/W2014390890","https://openalex.org/W2028915091","https://openalex.org/W2033811191","https://openalex.org/W2049917012","https://openalex.org/W2059610428","https://openalex.org/W2071672346","https://openalex.org/W2085101183","https://openalex.org/W2101834106","https://openalex.org/W2105412867","https://openalex.org/W2107881300","https://openalex.org/W2107906795","https://openalex.org/W2121221235","https://openalex.org/W2123437505","https://openalex.org/W2126242334","https://openalex.org/W2144300381","https://openalex.org/W2158888459","https://openalex.org/W2398354233","https://openalex.org/W2398484989","https://openalex.org/W2399034518","https://openalex.org/W2405120356","https://openalex.org/W6607564586","https://openalex.org/W6607702499","https://openalex.org/W6631222091","https://openalex.org/W6632995892","https://openalex.org/W6637412253","https://openalex.org/W6640059210","https://openalex.org/W6641190993","https://openalex.org/W6712318706","https://openalex.org/W6712520696","https://openalex.org/W6712745783","https://openalex.org/W6714048833"],"related_works":["https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W3003485427","https://openalex.org/W2755037920","https://openalex.org/W4210309948","https://openalex.org/W2374393728","https://openalex.org/W2072937473","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W609672658"],"abstract_inverted_index":{"To":[0,144],"protect":[1],"sensitive":[2],"resources":[3],"from":[4],"unauthorized":[5],"use,":[6],"modern":[7],"mobile":[8],"systems,":[9],"such":[10,102,138],"as":[11],"Android":[12],"and":[13,124,185],"iOS,":[14],"design":[15],"a":[16,66,94,129,153,193],"permission-based":[17],"access":[18],"control":[19,28],"model.":[20],"However,":[21],"current":[22],"model":[23],"could":[24,47,87,157],"not":[25],"enforce":[26],"fine-grained":[27],"over":[29],"the":[30,49,62,100,141,147,164,175],"dynamic":[31],"permission":[32,107,111,149],"use":[33,48,112],"contexts,":[34,118],"causing":[35],"two":[36,91],"severe":[37],"security":[38,171],"problems.":[39],"First,":[40],"any":[41],"code":[42],"package":[43],"in":[44],"an":[45,73],"application":[46,68,77,117,142,160],"granted":[50,64],"permissions,":[51],"inducing":[52],"attackers":[53],"to":[54,65,104,115,136,191],"embed":[55],"malicious":[56],"payloads":[57],"into":[58],"benign":[59,67],"apps.":[60],"Second,":[61],"permissions":[63],"may":[69],"be":[70],"utilized":[71],"by":[72,168],"attacker":[74],"through":[75],"vulnerable":[76],"interactions.":[78],"Although":[79],"ad":[80],"hoc":[81],"solutions":[82],"have":[83],"been":[84],"proposed,":[85],"none":[86],"systematically":[88],"solve":[89],"these":[90],"issues":[92],"within":[93],"unified":[95],"framework.":[96],"This":[97],"paper":[98],"presents":[99],"first":[101],"framework":[103,155],"provide":[105],"context-sensitive":[106,148],"enforcement":[108],"that":[109,156],"regulates":[110],"policies":[113],"according":[114],"system-wide":[116],"which":[119],"cover":[120],"both":[121],"intra-application":[122],"context":[123,139],"inter-application":[125],"context.":[126],"We":[127,162],"build":[128],"prototype":[130],"system":[131],"on":[132,174],"Android,":[133],"named":[134],"FineDroid,":[135],"track":[137],"during":[140],"execution.":[143],"flexibly":[145],"regulate":[146],"rules,":[150],"FineDroid":[151,167,188],"features":[152],"policy":[154,176],"express":[158],"generic":[159],"contexts.":[161],"demonstrate":[163],"benefits":[165],"of":[166],"instantiating":[169],"several":[170],"extensions":[172],"based":[173],"framework,":[177],"for":[178],"three":[179],"potential":[180],"users:":[181],"end":[182],"users,":[183],"administrators,":[184],"developers.":[186],"Furthermore,":[187],"is":[189],"showed":[190],"introduce":[192],"minor":[194],"overhead.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
