{"id":"https://openalex.org/W1973548319","doi":"https://doi.org/10.1145/2557547.2557560","title":"Compac","display_name":"Compac","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W1973548319","doi":"https://doi.org/10.1145/2557547.2557560","mag":"1973548319"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100365577","display_name":"Yifei Wang","orcid":"https://orcid.org/0000-0002-1314-8712"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yifei Wang","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028837301","display_name":"Srinivas Hariharan","orcid":null},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinivas Hariharan","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074584116","display_name":"Chenxi Zhao","orcid":"https://orcid.org/0000-0001-7166-2755"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenxi Zhao","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100440966","display_name":"Jiaming Liu","orcid":"https://orcid.org/0000-0001-9629-9788"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiaming Liu","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047825382","display_name":"Wenliang Du","orcid":"https://orcid.org/0000-0002-9234-0912"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenliang Du","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100365577"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":9.8991,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.98582258,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8215590715408325},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8048132658004761},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7170017957687378},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5883487462997437},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5373576879501343},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.5290999412536621},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5185937881469727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4952320158481598},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3495553135871887},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.11975201964378357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8215590715408325},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8048132658004761},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7170017957687378},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5883487462997437},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5373576879501343},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.5290999412536621},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5185937881469727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4952320158481598},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3495553135871887},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.11975201964378357},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W53797064","https://openalex.org/W81879861","https://openalex.org/W131387342","https://openalex.org/W187285683","https://openalex.org/W190551272","https://openalex.org/W1490347130","https://openalex.org/W1522939654","https://openalex.org/W1549577837","https://openalex.org/W1680232729","https://openalex.org/W1865564993","https://openalex.org/W1912565424","https://openalex.org/W1963971515","https://openalex.org/W1989255032","https://openalex.org/W2003276999","https://openalex.org/W2043777221","https://openalex.org/W2049917012","https://openalex.org/W2062340141","https://openalex.org/W2071907540","https://openalex.org/W2079029390","https://openalex.org/W2105412867","https://openalex.org/W2107881300","https://openalex.org/W2114275288","https://openalex.org/W2121221235","https://openalex.org/W2123437505","https://openalex.org/W2125011234","https://openalex.org/W2126242334","https://openalex.org/W2158888459","https://openalex.org/W2167661907","https://openalex.org/W2173076680","https://openalex.org/W2368092000","https://openalex.org/W2399034518","https://openalex.org/W2399891510","https://openalex.org/W2405120356","https://openalex.org/W2784849271","https://openalex.org/W2801888167","https://openalex.org/W2914012796","https://openalex.org/W2914630606"],"related_works":["https://openalex.org/W2374400535","https://openalex.org/W1603110617","https://openalex.org/W2108239983","https://openalex.org/W2892079901","https://openalex.org/W2940342784","https://openalex.org/W2134261832","https://openalex.org/W4385764548","https://openalex.org/W3212610863","https://openalex.org/W2493947570","https://openalex.org/W4312980538"],"abstract_inverted_index":{"In":[0,160],"Android":[1,119],"applications,":[2],"third-party":[3,39,137,169],"components":[4,170],"may":[5],"bring":[6],"potential":[7],"security":[8],"problems,":[9],"because":[10],"they":[11],"have":[12,114,122],"the":[13,17,35,38,70,75,80,84,91,95,105,109,116,136,144,154,157,165],"same":[14],"privilege":[15,36],"as":[16],"applications":[18],"but":[19],"cannot":[20],"be":[21,31],"fully":[22],"trusted.":[23],"It":[24],"is":[25,88],"desirable":[26],"if":[27],"their":[28],"privileges":[29],"can":[30,82,133,163],"restricted.":[32],"To":[33],"minimize":[34],"of":[37,63,69,147,156],"components,":[40],"we":[41],"develop":[42],"Compac":[43,54,132,162],"to":[44,59,67,104],"achieve":[45],"a":[46,61,124],"fine-grained":[47],"access":[48,101],"control":[49],"at":[50],"application's":[51,65,71],"component":[52,85],"level.":[53],"allows":[55],"developers":[56],"and":[57,111,121],"users":[58],"assign":[60],"subset":[62],"an":[64],"permissions":[66],"some":[68],"components.":[72],"By":[73],"leveraging":[74],"runtime":[76],"Java":[77],"package":[78],"information,":[79],"system":[81,96],"acquire":[83],"information":[86],"that":[87,131,143],"running":[89],"in":[90,118],"application.":[92],"After":[93],"that,":[94],"makes":[97],"decisions":[98],"on":[99],"privileged":[100],"requests":[102],"according":[103],"policy":[106],"defined":[107],"by":[108,168],"developer":[110],"user.":[112],"We":[113],"implemented":[115],"prototype":[117],"4.0.4,":[120],"conducted":[123],"comprehensive":[125],"evaluation.":[126],"Our":[127],"case":[128],"studies":[129],"show":[130],"effectively":[134],"restrict":[135],"components'":[138],"permissions.":[139],"Antutu":[140],"benchmark":[141],"shows":[142],"overall":[145],"score":[146,155],"our":[148],"work":[149],"achieves":[150],"97.4%,":[151],"compared":[152],"with":[153,171],"original":[158],"Android.":[159],"conclusion,":[161],"mitigate":[164],"damage":[166],"caused":[167],"ignorable":[172],"overhead.":[173]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
