{"id":"https://openalex.org/W2736629875","doi":"https://doi.org/10.1109/tse.2017.2730198","title":"Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy","display_name":"Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy","publication_year":2017,"publication_date":"2017-07-21","ids":{"openalex":"https://openalex.org/W2736629875","doi":"https://doi.org/10.1109/tse.2017.2730198","mag":"2736629875"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2017.2730198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2017.2730198","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://ira.lib.polyu.edu.hk/bitstream/10397/105614/1/Yu_Enhancing_Description-To-Behavior_Fidelity.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027733268","display_name":"Le Yu","orcid":"https://orcid.org/0000-0003-1457-6329"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Le Yu","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071764813","display_name":"Chenxiong Qian","orcid":"https://orcid.org/0000-0002-6201-6011"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chenxiong Qian","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328264","display_name":"Shuai Wang","orcid":"https://orcid.org/0000-0002-0866-0308"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091697161","display_name":"Hareton Leung","orcid":"https://orcid.org/0000-0002-1766-7667"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hareton K. N. Leung","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027733268"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":3.9175,"has_fulltext":true,"cited_by_count":58,"citation_normalized_percentile":{"value":0.94775916,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"44","issue":"9","first_page":"834","last_page":"854"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.945141077041626},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9030142426490784},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7277426719665527},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7082164883613586},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.7025310397148132},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5931039452552795},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5669187903404236},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5182145237922668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5171008110046387},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43760547041893005},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.413925439119339},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1844644546508789},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15894758701324463},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.15723463892936707},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15663743019104004}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.945141077041626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9030142426490784},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7277426719665527},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7082164883613586},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.7025310397148132},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5931039452552795},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5669187903404236},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5182145237922668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5171008110046387},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43760547041893005},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.413925439119339},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1844644546508789},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15894758701324463},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.15723463892936707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15663743019104004},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tse.2017.2730198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2017.2730198","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/105614","is_oa":true,"landing_page_url":"http://hdl.handle.net/10397/105614","pdf_url":"http://ira.lib.polyu.edu.hk/bitstream/10397/105614/1/Yu_Enhancing_Description-To-Behavior_Fidelity.pdf","source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal/Magazine Article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/74225","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/74225","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal/Magazine Article"}],"best_oa_location":{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/105614","is_oa":true,"landing_page_url":"http://hdl.handle.net/10397/105614","pdf_url":"http://ira.lib.polyu.edu.hk/bitstream/10397/105614/1/Yu_Enhancing_Description-To-Behavior_Fidelity.pdf","source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal/Magazine Article"},"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1947565259","display_name":null,"funder_award_id":"JCYJ20150630115257892","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2981938667","display_name":null,"funder_award_id":"Shenzhen","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3757194791","display_name":null,"funder_award_id":"JCYJ20","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G44732868","display_name":null,"funder_award_id":"61602371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309893","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322598","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2736629875.pdf","grobid_xml":"https://content.openalex.org/works/W2736629875.grobid-xml"},"referenced_works_count":102,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W83825404","https://openalex.org/W605474867","https://openalex.org/W1437814062","https://openalex.org/W1438616768","https://openalex.org/W1481354592","https://openalex.org/W1558788122","https://openalex.org/W1629985895","https://openalex.org/W1865564993","https://openalex.org/W1912565424","https://openalex.org/W1963971515","https://openalex.org/W1967256553","https://openalex.org/W1969840808","https://openalex.org/W1981568085","https://openalex.org/W1985686072","https://openalex.org/W1985752637","https://openalex.org/W2010395842","https://openalex.org/W2014390890","https://openalex.org/W2018956134","https://openalex.org/W2019798206","https://openalex.org/W2025765878","https://openalex.org/W2041276426","https://openalex.org/W2057726290","https://openalex.org/W2070386561","https://openalex.org/W2075876574","https://openalex.org/W2077202047","https://openalex.org/W2078197322","https://openalex.org/W2078922545","https://openalex.org/W2080696000","https://openalex.org/W2092712591","https://openalex.org/W2101452663","https://openalex.org/W2102197271","https://openalex.org/W2106349977","https://openalex.org/W2114275288","https://openalex.org/W2116174259","https://openalex.org/W2120439777","https://openalex.org/W2120779048","https://openalex.org/W2122672392","https://openalex.org/W2127723417","https://openalex.org/W2140095007","https://openalex.org/W2141105512","https://openalex.org/W2142503704","https://openalex.org/W2150656895","https://openalex.org/W2154790136","https://openalex.org/W2166743230","https://openalex.org/W2167061159","https://openalex.org/W2168103835","https://openalex.org/W2168649891","https://openalex.org/W2171240827","https://openalex.org/W2174706414","https://openalex.org/W2177471439","https://openalex.org/W2187373861","https://openalex.org/W2207751595","https://openalex.org/W2211757780","https://openalex.org/W2264131323","https://openalex.org/W2289508129","https://openalex.org/W2295135469","https://openalex.org/W2396319824","https://openalex.org/W2399891510","https://openalex.org/W2470899015","https://openalex.org/W2475731385","https://openalex.org/W2488579949","https://openalex.org/W2533383364","https://openalex.org/W2535386169","https://openalex.org/W2557385690","https://openalex.org/W2575599800","https://openalex.org/W2612622960","https://openalex.org/W2615082125","https://openalex.org/W3123012225","https://openalex.org/W3124333016","https://openalex.org/W4238165357","https://openalex.org/W4242210993","https://openalex.org/W4297571409","https://openalex.org/W6603196380","https://openalex.org/W6603376165","https://openalex.org/W6618749161","https://openalex.org/W6628346335","https://openalex.org/W6628353899","https://openalex.org/W6633596712","https://openalex.org/W6636607265","https://openalex.org/W6639024520","https://openalex.org/W6640059210","https://openalex.org/W6641190993","https://openalex.org/W6653089499","https://openalex.org/W6669511759","https://openalex.org/W6669987511","https://openalex.org/W6675193097","https://openalex.org/W6676104462","https://openalex.org/W6676999791","https://openalex.org/W6678039958","https://openalex.org/W6680637348","https://openalex.org/W6684610258","https://openalex.org/W6685659434","https://openalex.org/W6686595536","https://openalex.org/W6687771061","https://openalex.org/W6688213676","https://openalex.org/W6697250523","https://openalex.org/W6712192629","https://openalex.org/W6712199254","https://openalex.org/W6721237251","https://openalex.org/W6738424624","https://openalex.org/W7072027933"],"related_works":["https://openalex.org/W2969365378","https://openalex.org/W2963856074","https://openalex.org/W2791844455","https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W2610659201","https://openalex.org/W2067547021","https://openalex.org/W2899569243","https://openalex.org/W2608570228","https://openalex.org/W1997833177"],"abstract_inverted_index":{"Since":[0],"more":[1,34],"than":[2],"96":[3],"percent":[4,202],"of":[5,124,163,205],"mobile":[6],"malware":[7,31,101],"targets":[8],"the":[9,48,100,118,169,206],"Android":[10],"platform,":[11],"various":[12],"techniques":[13],"based":[14,103],"on":[15,104],"static":[16],"code":[17],"analysis":[18,22],"or":[19],"dynamic":[20],"behavior":[21],"have":[23],"been":[24],"proposed":[25,40],"to":[26,74,82,98,111,200],"detect":[27],"malicious":[28],"apps.":[29],"As":[30],"is":[32,109],"becoming":[33],"complicated":[35],"and":[36,54,65,70,95,106,116,132,151,167,185,193],"stealthy,":[37],"recent":[38],"research":[39],"a":[41,142,154,182],"promising":[42],"detection":[43,102],"approach":[44,64],"that":[45,67,175],"looks":[46],"for":[47,147,159],"inconsistency":[49],"between":[50],"an":[51,91],"app's":[52,92],"permissions":[53],"its":[55,96],"description.":[56],"In":[57],"this":[58,63],"paper,":[59],"we":[60,88,139],"first":[61,140],"revisit":[62],"reveal":[66],"using":[68],"description":[69,105],"permission":[71],"will":[72],"lead":[73],"many":[75],"false":[76,203],"positives":[77],"because":[78],"descriptions":[79],"often":[80],"fail":[81],"declare":[83],"all":[84],"sensitive":[85],"operations.":[86],"Then,":[87],"propose":[89,141],"exploiting":[90],"privacy":[93,114,128,149,179,191],"policy":[94,115,180,192],"bytecode":[97,194],"enhance":[99],"permissions.":[107,133],"It":[108],"non-trivial":[110],"automatically":[112],"analyze":[113,178],"perform":[117],"cross-verification":[119],"among":[120],"these":[121,136],"four":[122],"kinds":[123],"software":[125,165],"artifacts":[126,166],"including,":[127],"policy,":[129,150],"bytecode,":[130],"description,":[131],"To":[134],"address":[135],"challenging":[137],"issues,":[138],"novel":[143],"data":[144],"flow":[145],"model":[146],"analyzing":[148],"then":[152],"develop":[153],"new":[155],"system,":[156],"named":[157],"TAPVerifier,":[158],"carrying":[160],"out":[161],"investigation":[162],"individual":[164],"conducting":[168],"cross-verification.":[170],"The":[171],"experimental":[172],"results":[173],"show":[174],"TAPVerifier":[176],"can":[177,197],"with":[181],"high":[183],"accuracy":[184],"recall":[186],"rate.":[187],"More":[188],"importantly,":[189],"integrating":[190],"level":[195],"information":[196],"remove":[198],"up":[199],"59.4":[201],"alerts":[204],"state-of-the-art":[207],"systems,":[208],"such":[209],"as":[210],"AutoCog,":[211],"CHABADA,":[212],"etc.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
