{"id":"https://openalex.org/W2087804676","doi":"https://doi.org/10.1145/2185448.2185464","title":"Unsafe exposure analysis of mobile in-app advertisements","display_name":"Unsafe exposure analysis of mobile in-app advertisements","publication_year":2012,"publication_date":"2012-04-16","ids":{"openalex":"https://openalex.org/W2087804676","doi":"https://doi.org/10.1145/2185448.2185464","mag":"2087804676"},"language":"en","primary_location":{"id":"doi:10.1145/2185448.2185464","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2185448.2185464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112308489","display_name":"Michael Grace","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael C. Grace","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013284593","display_name":"Wu Zhou","orcid":"https://orcid.org/0009-0004-4792-0039"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wu Zhou","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109035300","display_name":"Xuxian Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xuxian Jiang","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technical University Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112308489"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":40.8899,"has_fulltext":false,"cited_by_count":498,"citation_normalized_percentile":{"value":0.99910003,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"101","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7731031179428101},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7616513967514038},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.6934100985527039},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.646914541721344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.640680193901062},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6368192434310913},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6033207774162292},{"id":"https://openalex.org/keywords/app-store","display_name":"App store","score":0.5419124364852905},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5156370401382446},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4988515377044678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4633256793022156},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.45808282494544983},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.45147860050201416},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.43103355169296265},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11586877703666687}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7731031179428101},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7616513967514038},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.6934100985527039},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.646914541721344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.640680193901062},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6368192434310913},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6033207774162292},{"id":"https://openalex.org/C2779794324","wikidata":"https://www.wikidata.org/wiki/Q3814081","display_name":"App store","level":2,"score":0.5419124364852905},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5156370401382446},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4988515377044678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4633256793022156},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.45808282494544983},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.45147860050201416},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.43103355169296265},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11586877703666687},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2185448.2185464","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2185448.2185464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W32581813","https://openalex.org/W81879861","https://openalex.org/W1555215938","https://openalex.org/W1680232729","https://openalex.org/W1912565424","https://openalex.org/W1917620371","https://openalex.org/W1963971515","https://openalex.org/W1989255032","https://openalex.org/W2003276999","https://openalex.org/W2053008565","https://openalex.org/W2056073317","https://openalex.org/W2105412867","https://openalex.org/W2114275288","https://openalex.org/W2121221235","https://openalex.org/W2146707221","https://openalex.org/W2149921703","https://openalex.org/W2153542583","https://openalex.org/W2158583440","https://openalex.org/W2158888459","https://openalex.org/W2160252066","https://openalex.org/W2249915525","https://openalex.org/W2398484989","https://openalex.org/W2399034518","https://openalex.org/W2400528202","https://openalex.org/W2914982603","https://openalex.org/W3125518450","https://openalex.org/W6640059210"],"related_works":["https://openalex.org/W3142571737","https://openalex.org/W2890710341","https://openalex.org/W4387360127","https://openalex.org/W2605037362","https://openalex.org/W3173766926","https://openalex.org/W3120409491","https://openalex.org/W785354139","https://openalex.org/W2734633251","https://openalex.org/W4226085607","https://openalex.org/W2011781116"],"abstract_inverted_index":{"In":[0,79,151],"recent":[1],"years,":[2],"there":[3],"has":[4],"been":[5],"explosive":[6],"growth":[7],"in":[8,121,135,318],"smartphone":[9,22,77],"sales,":[10],"which":[11,275],"is":[12,295],"accompanied":[13],"with":[14],"the":[15,34,43,55,71,108,117,156,171,218,230,234,244,250,273,285,307,312],"availability":[16],"of":[17,21,48,57,70,137,208,246,262],"a":[18,142,256],"huge":[19],"number":[20],"applications":[23],"(or":[24],"simply":[25],"apps).":[26],"End":[27],"users":[28],"or":[29,66,94,186,242],"consumers":[30],"are":[31,51,223,316],"attracted":[32],"by":[33,39,54,61,67,91,227,259],"many":[35,72],"interesting":[36],"features":[37],"offered":[38],"these":[40,49,92,125,300],"devices":[41],"and":[42,87,112,139,163,269,292],"associated":[44],"apps.":[45,320],"The":[46],"developers":[47],"apps":[50,64,115,162,248,294],"also":[52],"benefited":[53],"prospect":[56],"financial":[58],"compensation,":[59],"either":[60],"selling":[62],"their":[63],"directly":[65,267],"embedding":[68],"one":[69,296],"ad":[73,132,158,172,202,290,314],"libraries":[74,97,133,159,203,291,315],"available":[75],"on":[76,84,249],"platforms.":[78],"this":[80,104],"paper,":[81],"we":[82,106,127,153],"focus":[83],"potential":[85,149],"privacy":[86],"security":[88,280],"risks":[89],"posed":[90],"embedded":[93,157,289],"in-app":[95,131],"advertisement":[96],"(henceforth":[98],"\"ad":[99],"libraries,\"":[100],"for":[101,213,309],"brevity).":[102],"To":[103],"end,":[105],"study":[107],"popular":[109],"Android":[110,119,319],"platform":[111],"collect":[113,204],"100,000":[114],"from":[116,160,175,193,272],"official":[118],"Market":[120],"March-May,":[122],"2011.":[123],"Among":[124],"apps,":[126],"identify":[128,148],"100":[129],"representative":[130],"(embedded":[134],"52.1%":[136],"them)":[138],"further":[140,258],"develop":[141],"system":[143,167],"called":[144],"AdRisk":[145],"to":[146,168,182,225,266,278],"systematically":[147],"risks.":[150,281,302],"particular,":[152],"first":[154],"decouple":[155],"host":[161,293],"then":[164],"apply":[165],"our":[166],"statically":[169],"examine":[170],"libraries,":[173],"ranging":[174],"whether":[176,187],"they":[177,188],"will":[178,189],"upload":[179],"privacy-sensitive":[180],"information":[181,231],"remote":[183,194],"(ad)":[184],"servers":[185],"download":[190],"untrusted":[191],"code":[192,271],"servers.":[195],"Our":[196,282],"results":[197,304],"show":[198,306],"that":[199],"most":[200],"existing":[201],"private":[205],"information:":[206],"some":[207],"them":[209],"may":[210],"be":[211],"used":[212],"legitimate":[214],"targeting":[215],"purposes":[216],"(i.e.,":[217],"user's":[219,235],"location)":[220],"while":[221],"others":[222],"hard":[224],"justify":[226],"invasively":[228],"collecting":[229],"such":[232],"as":[233],"call":[236],"logs,":[237],"phone":[238],"number,":[239],"browser":[240],"bookmarks,":[241],"even":[243],"list":[245],"installed":[247],"phone.":[251],"Moreover,":[252],"additional":[253],"ones":[254],"go":[255],"step":[257],"making":[260],"use":[261],"an":[263],"unsafe":[264],"mechanism":[265],"fetch":[268],"run":[270],"Internet,":[274],"immediately":[276],"leads":[277],"serious":[279],"investigation":[283],"indicates":[284],"symbiotic":[286],"relationship":[287],"between":[288],"main":[297],"reason":[298],"behind":[299],"exposed":[301],"These":[303],"clearly":[305],"need":[308],"better":[310],"regulating":[311],"way":[313],"integrated":[317]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":34},{"year":2020,"cited_by_count":40},{"year":2019,"cited_by_count":52},{"year":2018,"cited_by_count":37},{"year":2017,"cited_by_count":64},{"year":2016,"cited_by_count":54},{"year":2015,"cited_by_count":51},{"year":2014,"cited_by_count":60},{"year":2013,"cited_by_count":43},{"year":2012,"cited_by_count":13}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
