{"id":"https://openalex.org/W1995558443","doi":"https://doi.org/10.1145/2381934.2381939","title":"Short paper","display_name":"Short paper","publication_year":2012,"publication_date":"2012-10-19","ids":{"openalex":"https://openalex.org/W1995558443","doi":"https://doi.org/10.1145/2381934.2381939","mag":"1995558443"},"language":"en","primary_location":{"id":"doi:10.1145/2381934.2381939","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2381934.2381939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073687655","display_name":"Chaitrali Amrutkar","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chaitrali Amrutkar","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048941759","display_name":"Patrick Traynor","orcid":"https://orcid.org/0000-0002-7143-5189"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Traynor","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073687655"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.4897,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64778863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7697360515594482},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.725454568862915},{"id":"https://openalex.org/keywords/mobile-web","display_name":"Mobile Web","score":0.6804822683334351},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6342971324920654},{"id":"https://openalex.org/keywords/geolocation","display_name":"Geolocation","score":0.5760089159011841},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5325974822044373},{"id":"https://openalex.org/keywords/html5","display_name":"HTML5","score":0.5060288310050964},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4488251805305481},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44081997871398926},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.42672958970069885},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.417349636554718},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.3459511399269104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7697360515594482},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.725454568862915},{"id":"https://openalex.org/C516764902","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile Web","level":4,"score":0.6804822683334351},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6342971324920654},{"id":"https://openalex.org/C22041718","wikidata":"https://www.wikidata.org/wiki/Q638949","display_name":"Geolocation","level":2,"score":0.5760089159011841},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5325974822044373},{"id":"https://openalex.org/C84063617","wikidata":"https://www.wikidata.org/wiki/Q2053","display_name":"HTML5","level":2,"score":0.5060288310050964},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4488251805305481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44081997871398926},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.42672958970069885},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.417349636554718},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.3459511399269104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2381934.2381939","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2381934.2381939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W58852127","https://openalex.org/W185877518","https://openalex.org/W1489067988","https://openalex.org/W1590281470","https://openalex.org/W1971497680","https://openalex.org/W1994588724","https://openalex.org/W2003276999","https://openalex.org/W2091540464","https://openalex.org/W2099889974","https://openalex.org/W2114275288","https://openalex.org/W2398484989","https://openalex.org/W2399891510","https://openalex.org/W2480399688","https://openalex.org/W2906794128","https://openalex.org/W2911281300","https://openalex.org/W4230542187","https://openalex.org/W4237777791"],"related_works":["https://openalex.org/W2184518632","https://openalex.org/W2044213782","https://openalex.org/W2386542727","https://openalex.org/W487365807","https://openalex.org/W2024831951","https://openalex.org/W4285166874","https://openalex.org/W2100954553","https://openalex.org/W2138803641","https://openalex.org/W2462658326","https://openalex.org/W2404324586"],"abstract_inverted_index":{"The":[0],"distinction":[1],"between":[2,79],"mobile":[3,13,25,58,88,99,109,171,202],"applications":[4],"built":[5],"for":[6,61,92,98,170],"specific":[7],"platforms":[8],"and":[9,24,39,63,135,151,193],"that":[10,75,122,161],"run":[11],"in":[12,112,162,198],"browsers":[14],"is":[15],"increasingly":[16],"being":[17],"blurred.":[18],"As":[19],"HTML5":[20],"becomes":[21],"universally":[22],"deployed":[23],"web":[26,64,89,100,110,133,172,203],"apps":[27,65,81,90,111],"directly":[28],"take":[29],"advantage":[30],"of":[31,50,87,127,153,165,188,201],"device":[32,59],"features":[33],"such":[34,80],"as":[35],"the":[36,54,76,84,94,128,149,163],"camera,":[37],"microphone":[38],"geolocation":[40],"information,":[41],"this":[42,51,70,154],"difference":[43],"will":[44],"vanish":[45],"almost":[46],"entirely.":[47],"In":[48,69,156],"spite":[49],"increasing":[52,77],"similarity,":[53],"permission":[55,96,140],"systems":[56],"protecting":[57],"resources":[60],"native1":[62],"are":[66,177],"dramatically":[67],"different.":[68],"position":[71],"paper,":[72],"we":[73,159],"argue":[74,160],"indistinguishability":[78],"coupled":[82],"with":[83,107,184],"dynamic":[85],"nature":[86],"calls":[91],"reconsidering":[93],"current":[95],"model":[97,169,180],"apps.":[101,116,204],"We":[102,117,143],"first":[103],"discuss":[104,146],"factors":[105],"associated":[106],"securing":[108],"comparison":[113],"to":[114],"traditional":[115],"then":[118,144],"propose":[119],"a":[120,124,132,137,185],"mechanism":[121],"presents":[123],"holistic":[125],"view":[126],"permissions":[129],"required":[130],"by":[131],"app":[134],"provides":[136],"simple,":[138],"single-stop":[139],"management":[141],"process.":[142],"briefly":[145],"issues":[147],"surrounding":[148],"use":[150],"deployment":[152],"technique.":[155],"so":[157],"doing,":[158],"absence":[164],"an":[166],"in-cloud":[167],"security":[168,191,200],"apps,":[173],"client":[174],"side":[175],"defenses":[176],"limited.":[178],"Our":[179],"can":[181],"provide":[182],"users":[183],"better":[186],"chance":[187],"making":[189],"informed":[190],"decisions":[192],"may":[194],"also":[195],"aid":[196],"researchers":[197],"assessing":[199]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
