{"id":"https://openalex.org/W2047421912","doi":"https://doi.org/10.1145/2766498.2766509","title":"WeChecker","display_name":"WeChecker","publication_year":2015,"publication_date":"2015-06-22","ids":{"openalex":"https://openalex.org/W2047421912","doi":"https://doi.org/10.1145/2766498.2766509","mag":"2047421912"},"language":"en","primary_location":{"id":"doi:10.1145/2766498.2766509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2766498.2766509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008799749","display_name":"Xingmin Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Xingmin Cui","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100691572","display_name":"Jingxuan Wang","orcid":"https://orcid.org/0000-0002-1570-7266"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jingxuan Wang","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109853326","display_name":"Lucas C. K. Hui","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Lucas C. K. Hui","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102947045","display_name":"Zhongwei Xie","orcid":"https://orcid.org/0000-0001-6346-0707"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Zhongwei Xie","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100297721","display_name":"Tian Zeng","orcid":"https://orcid.org/0009-0001-1503-2289"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Tian Zeng","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110500992","display_name":"Siu\u2010Ming Yiu","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"S. M. Yiu","raw_affiliation_strings":["The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008799749"],"corresponding_institution_ids":["https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":3.7335,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.93954058,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8646994233131409},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6459729075431824},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5788106918334961},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.5255098342895508},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5086170434951782},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4705997407436371},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.43768173456192017},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43183010816574097},{"id":"https://openalex.org/keywords/data-flow-analysis","display_name":"Data-flow analysis","score":0.4277048110961914},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.41573160886764526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32677268981933594},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.26186108589172363},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24843677878379822},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.23526382446289062},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16316759586334229},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10835063457489014},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09759935736656189}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8646994233131409},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6459729075431824},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5788106918334961},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.5255098342895508},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5086170434951782},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4705997407436371},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.43768173456192017},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43183010816574097},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.4277048110961914},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.41573160886764526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32677268981933594},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.26186108589172363},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24843677878379822},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.23526382446289062},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16316759586334229},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10835063457489014},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09759935736656189},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2766498.2766509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2766498.2766509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:hub.hku.hk:10722/216517","is_oa":false,"landing_page_url":"http://hdl.handle.net/10722/216517","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference_Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W5610905","https://openalex.org/W100599422","https://openalex.org/W124941384","https://openalex.org/W134132330","https://openalex.org/W1490347130","https://openalex.org/W1614825945","https://openalex.org/W1630356589","https://openalex.org/W1827592073","https://openalex.org/W1912565424","https://openalex.org/W1963971515","https://openalex.org/W1988036170","https://openalex.org/W1994588724","https://openalex.org/W2034527657","https://openalex.org/W2048802511","https://openalex.org/W2077565113","https://openalex.org/W2078197322","https://openalex.org/W2085577046","https://openalex.org/W2088383546","https://openalex.org/W2095357205","https://openalex.org/W2096230959","https://openalex.org/W2153497135","https://openalex.org/W2153542583","https://openalex.org/W2166743230","https://openalex.org/W2398484989","https://openalex.org/W2399034518","https://openalex.org/W2913215602"],"related_works":["https://openalex.org/W2360139790","https://openalex.org/W2901649410","https://openalex.org/W1843794072","https://openalex.org/W4240545424","https://openalex.org/W2005010039","https://openalex.org/W2019168903","https://openalex.org/W2135849267","https://openalex.org/W2016796784","https://openalex.org/W2596150641","https://openalex.org/W4376622193"],"abstract_inverted_index":{"Due":[0],"to":[1,12,24,42,56,62,118,155,194,215,227,241,249],"the":[2,26,35,65,79,83,106,145,197,201,207,229,243],"rapid":[3],"increase":[4],"of":[5,69,92,109,123,130,147,174,245,254],"Android":[6,48],"apps":[7],"and":[8,18,218,231,251,257],"their":[9,90],"wide":[10],"usage":[11],"handle":[13],"personal":[14],"data,":[15],"a":[16,128,156,220],"precise":[17],"large-scaling":[19],"checker":[20],"is":[21,140,144,162],"in":[22,47,134,150,179],"need":[23,214],"validate":[25],"apps'":[27],"permission":[28],"flow":[29],"before":[30],"they":[31,60],"are":[32,53,76,112],"listed":[33],"on":[34,82,182],"market.":[36],"Several":[37],"tools":[38,52],"have":[39],"been":[40],"proposed":[41],"detect":[43],"sensitive":[44],"data":[45],"leaks":[46],"apps.":[49],"But":[50],"these":[51,110,120],"not":[54,213],"applicable":[55],"large-scale":[57],"analysis":[58,158,193,211],"since":[59,95],"fail":[61],"deal":[63,195],"with":[64,196,234],"arbitrary":[66,124,202],"execution":[67,107,125,203],"orders":[68,108,126,204],"different":[70],"event":[71,132,148],"handlers":[72,75,133,149],"smartly.":[73],"Event":[74],"invoked":[77,101],"by":[78,102,200,237],"framework":[80],"based":[81],"system":[84],"state,":[85],"therefore":[86],"we":[87,187],"cannot":[88],"pre-determine":[89],"order":[91],"execution.":[93],"Besides,":[94],"all":[96,131],"exported":[97],"components":[98,111],"can":[99],"be":[100],"an":[103,135,151,166,180,189],"external":[104],"app,":[105],"also":[113,225],"arbitrary.":[114],"A":[115],"naive":[116],"way":[117],"simulate":[119],"two":[121],"types":[122,178],"yields":[127],"permutation":[129],"app.":[136,152],"The":[137],"time":[138,222],"complexity":[139],"O(n!)":[141],"where":[142],"n":[143,161],"number":[146,244],"This":[153],"leads":[154],"high":[157,208],"overhead":[159],"when":[160],"big.":[163],"To":[164],"give":[165],"illustration,":[167],"CHEX":[168],"[10]":[169],"found":[170],"50.73":[171],"entry":[172],"points":[173],"44":[175],"unique":[176],"class":[177],"app":[181],"average.":[183],"In":[184],"this":[185],"paper":[186],"propose":[188,226],"improved":[190],"static":[191],"taint":[192],"challenge":[198],"brought":[199],"without":[205],"sacrificing":[206],"precision.":[209],"Our":[210],"does":[212],"make":[216],"permutations":[217],"achieves":[219],"polynomial":[221],"complexity.":[223],"We":[224],"unify":[228],"array":[230,255],"map":[232,258],"access":[233,239,256],"object":[235],"reference":[236],"propagating":[238],"paths":[240],"reduce":[242],"false":[246],"positives":[247],"due":[248],"field-insensitivity":[250],"over":[252],"approximation":[253],"access.":[259]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
