{"id":"https://openalex.org/W2550306025","doi":"https://doi.org/10.1109/tifs.2016.2631949","title":"Identifying User-Input Privacy in Mobile Applications at a Large Scale","display_name":"Identifying User-Input Privacy in Mobile Applications at a Large Scale","publication_year":2016,"publication_date":"2016-11-23","ids":{"openalex":"https://openalex.org/W2550306025","doi":"https://doi.org/10.1109/tifs.2016.2631949","mag":"2550306025"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2631949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2631949","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065097911","display_name":"Yuhong Nan","orcid":"https://orcid.org/0000-0001-9597-9888"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhong Nan","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101856258","display_name":"Zhemin Yang","orcid":"https://orcid.org/0000-0002-1854-639X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhemin Yang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052437722","display_name":"Min Yang","orcid":"https://orcid.org/0000-0001-9714-5545"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025867892","display_name":"Shunfan Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunfan Zhou","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368650","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0001-5538-1478"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058852421","display_name":"Guofei Gu","orcid":"https://orcid.org/0000-0003-0630-741X"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guofei Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Texas A&M University, College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Texas A&M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114585327","display_name":"XiaoFeng Wang","orcid":"https://orcid.org/0009-0007-7246-3169"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaofeng Wang","raw_affiliation_strings":["Center for Security Informatics, Indiana University Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Center for Security Informatics, Indiana University Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5065097911"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":1.0188,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.78131772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"3","first_page":"647","last_page":"661"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9052861928939819},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5388057231903076},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5032424330711365},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.49232304096221924},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.45728251338005066},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4372740685939789},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.43249988555908203},{"id":"https://openalex.org/keywords/user-information","display_name":"User information","score":0.4288053512573242},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40798741579055786},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30058759450912476},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.26013755798339844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10075893998146057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9052861928939819},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5388057231903076},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5032424330711365},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.49232304096221924},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.45728251338005066},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4372740685939789},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.43249988555908203},{"id":"https://openalex.org/C2777622855","wikidata":"https://www.wikidata.org/wiki/Q7901844","display_name":"User information","level":3,"score":0.4288053512573242},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40798741579055786},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30058759450912476},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.26013755798339844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10075893998146057},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2631949","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2631949","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3987367720","display_name":null,"funder_award_id":"61300027","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4318766154","display_name":null,"funder_award_id":"61602121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4841502848","display_name":null,"funder_award_id":"61602123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8444703991","display_name":null,"funder_award_id":"13JC1400800","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G8665235237","display_name":null,"funder_award_id":"15511103003","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W25021988","https://openalex.org/W79696261","https://openalex.org/W179179905","https://openalex.org/W1437814062","https://openalex.org/W1438616768","https://openalex.org/W1445387515","https://openalex.org/W1658739283","https://openalex.org/W1836727426","https://openalex.org/W1963971515","https://openalex.org/W1985686072","https://openalex.org/W1988036170","https://openalex.org/W2017025011","https://openalex.org/W2019798206","https://openalex.org/W2032724464","https://openalex.org/W2045057497","https://openalex.org/W2078197322","https://openalex.org/W2081580037","https://openalex.org/W2085577046","https://openalex.org/W2105412867","https://openalex.org/W2132870739","https://openalex.org/W2140095007","https://openalex.org/W2141007997","https://openalex.org/W2153579005","https://openalex.org/W2158888459","https://openalex.org/W2163643194","https://openalex.org/W2166743230","https://openalex.org/W2168649891","https://openalex.org/W2175259180","https://openalex.org/W2398354233","https://openalex.org/W2399034518","https://openalex.org/W2405120356","https://openalex.org/W2435251607","https://openalex.org/W2441135008","https://openalex.org/W2508271471","https://openalex.org/W2560459036","https://openalex.org/W3136699861","https://openalex.org/W4294170691","https://openalex.org/W6603196380","https://openalex.org/W6607259140","https://openalex.org/W6628346335","https://openalex.org/W6628353899","https://openalex.org/W6628532452","https://openalex.org/W6636829475","https://openalex.org/W6638766809","https://openalex.org/W6680972884","https://openalex.org/W6682691769","https://openalex.org/W6683921424","https://openalex.org/W6712318706","https://openalex.org/W6712520696","https://openalex.org/W6714048833","https://openalex.org/W6717827561","https://openalex.org/W6718503590","https://openalex.org/W7056732649"],"related_works":["https://openalex.org/W2161684601","https://openalex.org/W4288075818","https://openalex.org/W189451467","https://openalex.org/W3200138464","https://openalex.org/W2077568170","https://openalex.org/W2143793665","https://openalex.org/W2138926267","https://openalex.org/W3010548582","https://openalex.org/W2891986975","https://openalex.org/W2005777545"],"abstract_inverted_index":{"Identifying":[0],"sensitive":[1,55,85,107,146,214],"user":[2,62,86,108,147,215],"inputs":[3,56,148,216],"is":[4,49,154,209],"a":[5,99,114,119,187],"prerequisite":[6],"for":[7,142,174],"privacy":[8,102,129],"protection":[9],"in":[10],"mobile":[11,194],"applications.":[12],"When":[13],"it":[14,173],"comes":[15],"to":[16,98,125,156,211],"today's":[17],"program":[18,168],"analysis":[19,122,192],"systems,":[20],"however,":[21],"only":[22],"those":[23],"data":[24,94],"that":[25,45,80],"go":[26],"through":[27],"well-defined":[28],"system":[29,90],"Application":[30],"Program":[31],"Interface":[32],"(system":[33],"controlled":[34,91],"resources)":[35],"can":[36,185],"be":[37],"automatically":[38],"labeled.":[39],"In":[40,67],"this":[41,46,68,133],"paper,":[42,69],"we":[43,70,136],"show":[44,181],"conventional":[47],"approach":[48,184,199],"far":[50],"from":[51,75],"adequate,":[52],"as":[53,149],"most":[54,217],"are":[57,95],"actually":[58],"entered":[59],"by":[60],"the":[61,150,158,162,167,175,219],"at":[63],"an":[64,139],"app's":[65],"runtime.":[66],"inspect":[71],"13,072":[72],"top":[73],"apps":[74,124,204],"Google":[76,206],"Play,":[77],"and":[78,166,170,224],"find":[79],"38.69%":[81],"of":[82,101,116,123,145,189,218],"them":[83,112],"involve":[84],"inputs.":[87],"Just":[88],"like":[89],"resources,":[92],"these":[93,106],"also":[96],"exposed":[97],"series":[100],"leakage":[103],"threats.":[104],"For":[105],"inputs,":[109],"manually":[110],"marking":[111],"involves":[113],"lot":[115],"efforts,":[117],"impeding":[118],"large-scale,":[120],"automated":[121],"defend":[126],"against":[127],"potential":[128],"leakage.":[130],"To":[131],"address":[132],"important":[134],"issue,":[135],"present":[137],"UIPicker,":[138],"adaptable":[140],"framework":[141],"automatic":[143],"identification":[144],"first":[151],"step.":[152],"UIPicker":[153,208],"designed":[155],"detect":[157],"semantic":[159],"information":[160,179],"within":[161],"application":[163],"layout":[164],"resources":[165],"code,":[169],"further":[171],"analyze":[172],"locations":[176],"where":[177],"security-critical":[178],"may":[180],"up.":[182],"This":[183],"support":[186],"variety":[188],"existing":[190],"security":[191],"on":[193,205],"apps.":[195],"We":[196],"evaluate":[197],"our":[198],"over":[200],"randomly":[201],"selected":[202],"popular":[203],"Play.":[207],"able":[210],"accurately":[212],"label":[213],"time,":[220],"with":[221],"94.0%":[222],"precision":[223],"96.0%":[225],"recall.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
