{"id":"https://openalex.org/W2917643641","doi":"https://doi.org/10.1145/3301293.3302356","title":"A Hypervisor-Based Privacy Agent for Mobile and IoT Systems","display_name":"A Hypervisor-Based Privacy Agent for Mobile and IoT Systems","publication_year":2019,"publication_date":"2019-02-22","ids":{"openalex":"https://openalex.org/W2917643641","doi":"https://doi.org/10.1145/3301293.3302356","mag":"2917643641"},"language":"en","primary_location":{"id":"doi:10.1145/3301293.3302356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3301293.3302356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3301293.3302356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3301293.3302356","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071444242","display_name":"Neil Klingensmith","orcid":"https://orcid.org/0000-0003-4047-5070"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Neil Klingensmith","raw_affiliation_strings":["University of Wisconsin, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004429223","display_name":"Younghyun Kim","orcid":"https://orcid.org/0000-0002-5287-9235"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Younghyun Kim","raw_affiliation_strings":["University of Wisconsin, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033218913","display_name":"Suman Banerjee","orcid":"https://orcid.org/0000-0003-1761-5944"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suman Banerjee","raw_affiliation_strings":["University of Wisconsin, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071444242"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":0.5009,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.61339014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.8837109804153442},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8532360792160034},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5244230031967163},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5001537799835205},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.49413254857063293},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4860687553882599},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4686927795410156},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46834036707878113},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.45346322655677795},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4356405436992645},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4192545413970947},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.41050010919570923},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.2209767997264862},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2153375744819641}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8837109804153442},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8532360792160034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5244230031967163},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5001537799835205},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.49413254857063293},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4860687553882599},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4686927795410156},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46834036707878113},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.45346322655677795},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4356405436992645},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4192545413970947},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.41050010919570923},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.2209767997264862},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2153375744819641},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3301293.3302356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3301293.3302356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3301293.3302356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3301293.3302356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3301293.3302356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3301293.3302356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2640532010","display_name":null,"funder_award_id":"1719336","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5226339916","display_name":"II-NEW: WiNEST: A Prototype for a City-scale \"Living Laboratory\" for Wide-area Wireless Experimentation","funder_award_id":"1629833","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5810239003","display_name":null,"funder_award_id":"CNS-1343363","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6250460064","display_name":null,"funder_award_id":"CNS-1647152","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7596924829","display_name":null,"funder_award_id":"CNS-1647152, CNS-1629833","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7650256573","display_name":null,"funder_award_id":"CNS-1719336","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7917285098","display_name":"US Ignite: Focus Area 2: An Infrastructure to support Edge Computing in the Extreme","funder_award_id":"1647152","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2917643641.pdf","grobid_xml":"https://content.openalex.org/works/W2917643641.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1963971515","https://openalex.org/W2151135920","https://openalex.org/W2259009889","https://openalex.org/W2547386464","https://openalex.org/W2787077727","https://openalex.org/W2788306563","https://openalex.org/W2795757960","https://openalex.org/W2963034244"],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W2994243660","https://openalex.org/W2132024542","https://openalex.org/W2006891491","https://openalex.org/W2118333568","https://openalex.org/W2900699882","https://openalex.org/W576625533","https://openalex.org/W2187353989","https://openalex.org/W2154524064"],"abstract_inverted_index":{"We":[0,188],"present":[1],"a":[2,5,25,37,127,190,194,205],"design":[3],"for":[4,174,192],"mobile":[6],"and":[7,23,51,60,69,113,141,182,200],"IoT":[8],"data":[9],"privacy":[10,20,27,44,96,118,129,149,163,196],"agent":[11,21,45,97,119],"that":[12,32,104,134,145,186],"lives":[13],"in":[14,90,204],"software":[15],"on":[16,151,185,208],"end":[17,41],"devices.":[18,153,210],"Our":[19,117],"learns":[22],"enforces":[24],"user's":[26,195],"policy":[28,130,150,164,184,197],"across":[29,131],"all":[30,87,132],"devices":[31,133],"he":[33],"manages.":[34],"Implemented":[35],"as":[36],"hypervisor":[38,84],"onboard":[39],"the":[40,48,65,83,123,139,155],"device,":[42],"our":[43,76,95],"sits":[46],"between":[47,64],"device's":[49,66],"hardware":[50],"its":[52,70],"application":[53],"software.":[54],"It":[55],"can":[56,85,111],"inspect,":[57],"modify,":[58],"block,":[59],"inject":[61],"I/O":[62,88],"traffic":[63,108],"main":[67],"CPU":[68],"peripherals.":[71],"The":[72],"key":[73],"advantage":[74],"of":[75,143,157],"architecture":[77],"is":[78,165],"that,":[79],"unlike":[80],"network":[81,107],"middleboxes,":[82],"track":[86,112],"transactions":[89],"unencrypted":[91],"form.":[92],"This":[93],"makes":[94],"potentially":[98],"much":[99,172],"more":[100],"effective":[101],"than":[102],"those":[103],"only":[105],"monitor":[106],"because":[109],"it":[110,203],"modify":[114],"plaintext":[115],"data.":[116],"also":[120],"gives":[121],"users":[122],"ability":[124],"to":[125,161,176,180],"impose":[126],"uniform":[128],"they":[135],"manage,":[136],"which":[137],"minimizes":[138],"burden":[140],"possibility":[142],"error":[144],"arise":[146],"when":[147],"setting":[148],"individual":[152],"Since":[154],"notion":[156],"per-user":[158],"(as":[159],"opposed":[160],"per-app)":[162],"relatively":[166],"new,":[167],"there":[168],"has":[169],"not":[170],"been":[171],"opportunity":[173],"researchers":[175],"think":[177],"about":[178],"how":[179],"define":[181],"implement":[183],"scale.":[187],"propose":[189],"method":[191],"learning":[193],"one":[198],"time":[199],"automatically":[201],"implementing":[202],"context-aware":[206],"fashion":[207],"multiple":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
