{"id":"https://openalex.org/W2510969985","doi":"https://doi.org/10.1145/2970276.2975935","title":"Automated testing and notification of mobile app privacy leak-cause behaviours","display_name":"Automated testing and notification of mobile app privacy leak-cause behaviours","publication_year":2016,"publication_date":"2016-08-25","ids":{"openalex":"https://openalex.org/W2510969985","doi":"https://doi.org/10.1145/2970276.2975935","mag":"2510969985"},"language":"en","primary_location":{"id":"doi:10.1145/2970276.2975935","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2970276.2975935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009478129","display_name":"Joseph Chan Joo Keng","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Joseph Chan Joo Keng","raw_affiliation_strings":["Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009478129"],"corresponding_institution_ids":["https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":0.5044,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64070501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"880","last_page":"883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8055742383003235},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6923137903213501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5776556730270386},{"id":"https://openalex.org/keywords/leak","display_name":"Leak","score":0.5146980881690979},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.4959426820278168},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.49238264560699463},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.46729519963264465},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4506051540374756},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4497213661670685},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13235881924629211},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1252637505531311},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0840783417224884}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8055742383003235},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6923137903213501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5776556730270386},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.5146980881690979},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.4959426820278168},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.49238264560699463},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.46729519963264465},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4506051540374756},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4497213661670685},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13235881924629211},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1252637505531311},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0840783417224884},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2970276.2975935","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2970276.2975935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W59191864","https://openalex.org/W176206521","https://openalex.org/W1963971515","https://openalex.org/W1968592516","https://openalex.org/W1976652907","https://openalex.org/W1987949765","https://openalex.org/W2013856010","https://openalex.org/W2020224119","https://openalex.org/W2116075317","https://openalex.org/W2164170598","https://openalex.org/W2164539435","https://openalex.org/W2166743230","https://openalex.org/W2405628269","https://openalex.org/W2612503790","https://openalex.org/W2998501028","https://openalex.org/W4244726870"],"related_works":["https://openalex.org/W317272953","https://openalex.org/W2928666135","https://openalex.org/W2108730513","https://openalex.org/W3148806143","https://openalex.org/W3157697804","https://openalex.org/W2582248604","https://openalex.org/W2371258175","https://openalex.org/W3116065443","https://openalex.org/W2789135102","https://openalex.org/W2066004246"],"abstract_inverted_index":{"I":[0,33,36,60,82],"describe":[1,34],"the":[2,20,69,89,99,115],"design,":[3],"implementation":[4],"and":[5,17,23,41,47],"evaluation":[6],"of":[7,25,50,71,88,101],"a":[8,76],"novel":[9],"hybrid":[10,52],"static/dynamic":[11],"analysis":[12],"system":[13],"for":[14,19],"automatically":[15],"uncovering":[16],"testing":[18,48,53],"user-triggered":[21],"causes":[22],"paths":[24],"privacy":[26,65,80,111],"leaks":[27],"in":[28,44,75],"Android":[29],"applications":[30],"(privacy":[31],"'leak-causes').":[32],"how":[35,63,106],"plan":[37],"to":[38,85,98],"further":[39],"evaluate":[40],"demonstrate":[42],"improvements":[43],"accuracy,":[45],"coverage":[46],"speed":[49],"my":[51],"approach":[54],"against":[55],"other":[56],"currently":[57],"available":[58],"systems.":[59],"also":[61],"show":[62],"user":[64],"is":[66,95],"improved":[67],"by":[68],"presentation":[70,100],"information":[72,116],"on":[73],"leak-causes":[74],"field":[77],"study":[78],"as":[79,103,105],"notices.":[81],"present":[83],"plans":[84],"investigate":[86],"which":[87],"commonly":[90],"utilized":[91],"mobile":[92],"notification":[93],"mechanisms":[94],"best":[96],"suited":[97],"leak-causes,":[102],"well":[104],"users":[107],"may":[108],"set":[109],"better":[110],"control":[112],"policies":[113],"with":[114],"provided.":[117]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
