{"id":"https://openalex.org/W2919545980","doi":"https://doi.org/10.1109/tmc.2019.2903186","title":"Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem","display_name":"Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem","publication_year":2019,"publication_date":"2019-03-05","ids":{"openalex":"https://openalex.org/W2919545980","doi":"https://doi.org/10.1109/tmc.2019.2903186","mag":"2919545980"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2019.2903186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2019.2903186","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100381433","display_name":"Xing Liu","orcid":"https://orcid.org/0000-0001-6531-5001"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xing Liu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070828650","display_name":"Jiqiang Liu","orcid":"https://orcid.org/0000-0003-1147-4327"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiqiang Liu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, The Pennsylvania State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000755750","display_name":"Xiangliang Zhang","orcid":"https://orcid.org/0000-0002-3574-5665"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Xiangliang Zhang","raw_affiliation_strings":["Division of Computer, Electrical, and Mathematical Sciences & Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Division of Computer, Electrical, and Mathematical Sciences & Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100381433"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":17.5939,"has_fulltext":false,"cited_by_count":152,"citation_normalized_percentile":{"value":0.99585062,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"19","issue":"5","first_page":"1184","last_page":"1199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6932350993156433},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.579720139503479},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5572206974029541},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.473509818315506},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4489193260669708},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4120425581932068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38540834188461304},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.341048002243042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6932350993156433},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.579720139503479},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5572206974029541},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.473509818315506},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4489193260669708},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4120425581932068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38540834188461304},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.341048002243042},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tmc.2019.2903186","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2019.2903186","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:repository.kaust.edu.sa:10754/655913","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/655913","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G169035714","display_name":null,"funder_award_id":"CNS-1618684","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3120769444","display_name":null,"funder_award_id":"U1736114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8091656351","display_name":null,"funder_award_id":"61672092","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W26803606","https://openalex.org/W1437814062","https://openalex.org/W1438616768","https://openalex.org/W1963971515","https://openalex.org/W1987507361","https://openalex.org/W2018029308","https://openalex.org/W2018585566","https://openalex.org/W2027538101","https://openalex.org/W2060692877","https://openalex.org/W2078922545","https://openalex.org/W2086893284","https://openalex.org/W2087804676","https://openalex.org/W2087970742","https://openalex.org/W2092298276","https://openalex.org/W2159922008","https://openalex.org/W2376050373","https://openalex.org/W2418497778","https://openalex.org/W2441135008","https://openalex.org/W2489352404","https://openalex.org/W2508271471","https://openalex.org/W2520877058","https://openalex.org/W2527400238","https://openalex.org/W2528826491","https://openalex.org/W2535603283","https://openalex.org/W2574022511","https://openalex.org/W2599393174","https://openalex.org/W2611461819","https://openalex.org/W2624872182","https://openalex.org/W2733005124","https://openalex.org/W2745422701","https://openalex.org/W2746632572","https://openalex.org/W2797171593","https://openalex.org/W2802756541","https://openalex.org/W2803054784","https://openalex.org/W2809739892","https://openalex.org/W2907544104","https://openalex.org/W2963967433","https://openalex.org/W3101244251","https://openalex.org/W3183897436","https://openalex.org/W4244726870","https://openalex.org/W4254194321","https://openalex.org/W6601093590","https://openalex.org/W6628346335","https://openalex.org/W6628353899","https://openalex.org/W6723076198","https://openalex.org/W6739135026","https://openalex.org/W6742605651"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"While":[0],"much":[1],"effort":[2],"has":[3],"been":[4,35],"made":[5],"to":[6,53,66,108,142,169,175,230],"detect":[7,109],"and":[8,91,105,171,185],"measure":[9],"the":[10,15,46,81,110,128,132,149,227],"privacy":[11,40,140],"leakage":[12],"caused":[13],"by":[14,59,80,115,127,158],"advertising":[16],"(ad)":[17],"libraries":[18,51,62,83,168,202,233],"integrated":[19,84],"in":[20,30,85,234],"mobile":[21,31],"applications,":[22],"analytics":[23,50,61,82,116,134,159,167,201,210,232],"libraries,":[24,45],"which":[25],"are":[26,63,212],"also":[27,119],"widely":[28,165],"used":[29,166],"apps":[32,129,178,194],"have":[33,147,219],"not":[34],"systematically":[36],"studied":[37],"for":[38],"their":[39,152,205],"risks.":[41],"Different":[42],"from":[43,180],"ad":[44],"main":[47],"function":[48],"of":[49,208],"is":[52,78,156],"collect":[54],"users'":[55,68,111,197],"in-app":[56,112,153],"actions.":[57],"Hence,":[58],"design":[60,90],"more":[64],"likely":[65],"leak":[67,196],"private":[69,122],"information.":[70],"In":[71],"this":[72],"work,":[73],"we":[74,137,162,218],"study":[75,120,170],"what":[76,121],"information":[77,123,199],"collected":[79,114,157],"popular":[86,177],"Android":[87],"apps.":[88,236],"We":[89,118],"implement":[92],"a":[93],"framework":[94,229],"called":[95],"\u201cAlde\u201d.":[96],"Given":[97],"an":[98,221],"app,":[99],"Alde":[100],"employs":[101],"both":[102,181],"static":[103],"analysis":[104,107],"dynamic":[106],"actions":[113],"libraries.":[117,160],"can":[124],"be":[125],"leaked":[126],"that":[130,151,192,225],"use":[131],"same":[133],"library.":[135],"Moreover,":[136],"analyze":[138],"apps'":[139],"policies":[141],"see":[143],"whether":[144],"app":[145,183,222],"developers":[146],"notified":[148],"users":[150],"action":[154],"data":[155],"Finally,":[161],"select":[163],"eight":[164],"apply":[172],"our":[173],"method":[174],"300":[176],"downloaded":[179],"Chinese":[182],"markets":[184],"Google":[186],"play.":[187],"Our":[188],"experimental":[189],"results":[190],"show":[191],"some":[193],"indeed":[195],"personal":[198],"through":[200],"even":[203],"though":[204],"genuine":[206],"purposes":[207],"using":[209],"services":[211],"legal.":[213],"To":[214],"mitigate":[215],"such":[216],"threats,":[217],"developed":[220],"named":[223],"\u201cALManager\u201d":[224],"leverages":[226],"Xposed":[228],"manage":[231],"other":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":38},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":32},{"year":2019,"cited_by_count":20}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
