{"id":"https://openalex.org/W2783900365","doi":"https://doi.org/10.1109/uemcon.2017.8248985","title":"SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices","display_name":"SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2783900365","doi":"https://doi.org/10.1109/uemcon.2017.8248985","mag":"2783900365"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon.2017.8248985","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2017.8248985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065598458","display_name":"Brian Krupp","orcid":"https://orcid.org/0000-0001-6815-5621"},"institutions":[{"id":"https://openalex.org/I115364640","display_name":"Baldwin\u2013Wallace College","ror":"https://ror.org/001ghdf98","country_code":"US","type":"education","lineage":["https://openalex.org/I115364640"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brian Krupp","raw_affiliation_strings":["Computer Science Department, Baldwin Wallace University, Berea, OH"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Baldwin Wallace University, Berea, OH","institution_ids":["https://openalex.org/I115364640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012088172","display_name":"Dan Jesenseky","orcid":null},"institutions":[{"id":"https://openalex.org/I115364640","display_name":"Baldwin\u2013Wallace College","ror":"https://ror.org/001ghdf98","country_code":"US","type":"education","lineage":["https://openalex.org/I115364640"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Jesenseky","raw_affiliation_strings":["Computer Science Department, Baldwin Wallace University, Berea, OH"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Baldwin Wallace University, Berea, OH","institution_ids":["https://openalex.org/I115364640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069733265","display_name":"Amanda Szampias","orcid":null},"institutions":[{"id":"https://openalex.org/I115364640","display_name":"Baldwin\u2013Wallace College","ror":"https://ror.org/001ghdf98","country_code":"US","type":"education","lineage":["https://openalex.org/I115364640"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amanda Szampias","raw_affiliation_strings":["Computer Science Department, Baldwin Wallace University, Berea, OH"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Baldwin Wallace University, Berea, OH","institution_ids":["https://openalex.org/I115364640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065598458"],"corresponding_institution_ids":["https://openalex.org/I115364640"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.20258056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"520","last_page":"526"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.734093427658081},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6913231611251831},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5611269474029541},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5410481691360474},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5356212854385376},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.506388783454895},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47633200883865356},{"id":"https://openalex.org/keywords/consumer-privacy","display_name":"Consumer privacy","score":0.451281875371933},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3500713109970093},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2809875011444092},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13302496075630188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734093427658081},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6913231611251831},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5611269474029541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5410481691360474},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5356212854385376},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.506388783454895},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47633200883865356},{"id":"https://openalex.org/C2778656907","wikidata":"https://www.wikidata.org/wiki/Q5164712","display_name":"Consumer privacy","level":3,"score":0.451281875371933},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3500713109970093},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2809875011444092},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13302496075630188}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon.2017.8248985","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2017.8248985","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W32581813","https://openalex.org/W1963971515","https://openalex.org/W1967931674","https://openalex.org/W1968597682","https://openalex.org/W1989734217","https://openalex.org/W2004429690","https://openalex.org/W2007418065","https://openalex.org/W2016449808","https://openalex.org/W2044794048","https://openalex.org/W2053008565","https://openalex.org/W2071717677","https://openalex.org/W2090155521","https://openalex.org/W2100149279","https://openalex.org/W2195987610","https://openalex.org/W2337418851","https://openalex.org/W2465185676","https://openalex.org/W2468282407","https://openalex.org/W2468851708","https://openalex.org/W3169412867","https://openalex.org/W6641190993","https://openalex.org/W6703492850"],"related_works":["https://openalex.org/W2057398560","https://openalex.org/W2584827882","https://openalex.org/W4225340788","https://openalex.org/W317272953","https://openalex.org/W2025792237","https://openalex.org/W2295836226","https://openalex.org/W4245303888","https://openalex.org/W3000750784","https://openalex.org/W3124980950","https://openalex.org/W2596305496"],"abstract_inverted_index":{"Mobile":[0,31],"applications":[1,21,56,88,109,139,217,235,240],"have":[2],"grown":[3],"from":[4],"knowing":[5,10],"basic":[6,74],"personal":[7,47,60],"information":[8,48],"to":[9,28,58,104,131,136,161,186,196],"intimate":[11],"details":[12],"of":[13,18,46,55,66,86,108,152,205,213],"consumer's":[14,133],"lives.":[15],"The":[16],"explosion":[17],"knowledge":[19,128],"that":[20,92,102,114,156],"contain":[22],"and":[23,40,51,76,112,168,223],"share":[24],"can":[25,115],"be":[26],"contributed":[27],"many":[29],"factors.":[30],"devices":[32],"are":[33,80,89,140],"equipped":[34],"with":[35],"advanced":[36],"sensors":[37],"including":[38,49],"GPS":[39],"cameras,":[41],"while":[42],"storing":[43],"large":[44],"amounts":[45],"photos":[50],"contacts.":[52],"With":[53],"millions":[54],"available":[57],"install,":[59],"data":[61,111],"is":[62,166],"at":[63],"constant":[64],"risk":[65],"being":[67],"misused.":[68],"While":[69],"mobile":[70,169],"operating":[71,170,182,188],"systems":[72],"provide":[73,105,132],"security":[75],"privacy":[77],"controls,":[78],"they":[79],"insufficient,":[81],"leaving":[82],"the":[83,159,187,198,214,219],"consumer":[84],"unaware":[85],"how":[87,138],"using":[90,141],"permissions":[91,142],"were":[93],"granted.":[94],"In":[95,226],"this":[96,120],"paper,":[97],"we":[98,122],"propose":[99],"a":[100,127,178,202],"solution":[101,199],"aims":[103],"consumers":[106,195],"awareness":[107,151],"misusing":[110,242],"policies":[113,155],"protect":[116,162],"their":[117,144,163],"data.":[118,164],"From":[119],"investigation":[121],"present":[123],"SPEProxy.":[124],"SPEProxy":[125,148,165,210,229],"utilizes":[126],"based":[129],"approach":[130,193],"an":[134,150],"ability":[135],"understand":[137],"beyond":[143],"stated":[145],"intent.":[146],"Additionally,":[147],"provides":[149],"fine":[153],"grained":[154],"would":[157],"allow":[158],"user":[160],"device":[167,180],"system":[171,183,189],"agnostic,":[172],"meaning":[173],"it":[174],"does":[175],"not":[176],"require":[177],"specific":[179],"or":[181,190],"nor":[184],"modification":[185],"applications.":[191],"This":[192],"allows":[194],"utilize":[197],"without":[200],"requiring":[201],"high":[203],"degree":[204],"technical":[206],"expertise.":[207],"We":[208],"evaluated":[209],"across":[211,233],"817":[212],"most":[215],"popular":[216],"in":[218],"iOS":[220],"App":[221],"Store":[222],"Google":[224],"Play.":[225],"our":[227],"evaluation,":[228],"was":[230],"highly":[231],"effective":[232],"86.55%":[234],"where":[236],"several":[237],"well":[238],"known":[239],"exhibited":[241],"granted":[243],"permissions.":[244]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
