{"id":"https://openalex.org/W2599578646","doi":"https://doi.org/10.1145/3029806.3029843","title":"Prioritized Analysis of Inter-App Communication Risks","display_name":"Prioritized Analysis of Inter-App Communication Risks","publication_year":2017,"publication_date":"2017-03-20","ids":{"openalex":"https://openalex.org/W2599578646","doi":"https://doi.org/10.1145/3029806.3029843","mag":"2599578646"},"language":"en","primary_location":{"id":"doi:10.1145/3029806.3029843","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100453036","display_name":"Fang Liu","orcid":"https://orcid.org/0000-0002-0430-4381"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fang Liu","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076081056","display_name":"Haipeng Cai","orcid":"https://orcid.org/0000-0002-5224-9970"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haipeng Cai","raw_affiliation_strings":["Washington State University, Pullman, WA, USA"],"affiliations":[{"raw_affiliation_string":"Washington State University, Pullman, WA, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367418","display_name":"Gang Wang","orcid":"https://orcid.org/0000-0002-8910-8979"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Wang","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034366344","display_name":"Danfeng Yao","orcid":"https://orcid.org/0000-0001-8969-2792"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danfeng (Daphne) Yao","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050045135","display_name":"Karim O. Elish","orcid":"https://orcid.org/0000-0001-6060-4090"},"institutions":[{"id":"https://openalex.org/I32480017","display_name":"Florida Polytechnic University","ror":"https://ror.org/01e5mdj42","country_code":"US","type":"education","lineage":["https://openalex.org/I32480017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karim O. Elish","raw_affiliation_strings":["Florida Polytechnic University, Lakeland, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida Polytechnic University, Lakeland, FL, USA","institution_ids":["https://openalex.org/I32480017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030733431","display_name":"Barbara G. Ryder","orcid":"https://orcid.org/0000-0002-4755-6941"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Barbara G. Ryder","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100453036"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.5548,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.63133927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8509314060211182},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7590208053588867},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.5952182412147522},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5700857043266296},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5547693967819214},{"id":"https://openalex.org/keywords/app-store","display_name":"App store","score":0.4956547021865845},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4867248833179474},{"id":"https://openalex.org/keywords/smartphone-app","display_name":"Smartphone app","score":0.486246258020401},{"id":"https://openalex.org/keywords/power-graph-analysis","display_name":"Power graph analysis","score":0.48319709300994873},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4644565284252167},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.40898311138153076},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33611035346984863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3157081604003906},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19700339436531067},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14060690999031067},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10279262065887451},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.0832604467868805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8509314060211182},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7590208053588867},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.5952182412147522},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5700857043266296},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5547693967819214},{"id":"https://openalex.org/C2779794324","wikidata":"https://www.wikidata.org/wiki/Q3814081","display_name":"App store","level":2,"score":0.4956547021865845},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4867248833179474},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.486246258020401},{"id":"https://openalex.org/C106937863","wikidata":"https://www.wikidata.org/wiki/Q7236518","display_name":"Power graph analysis","level":3,"score":0.48319709300994873},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4644565284252167},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.40898311138153076},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33611035346984863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3157081604003906},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19700339436531067},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14060690999031067},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10279262065887451},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0832604467868805}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3029806.3029843","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1986480799","https://openalex.org/W1994588724","https://openalex.org/W2077202047","https://openalex.org/W2093763734","https://openalex.org/W2277576447"],"related_works":["https://openalex.org/W2965126671","https://openalex.org/W3142571737","https://openalex.org/W2055561505","https://openalex.org/W2504138768","https://openalex.org/W785354139","https://openalex.org/W3173766926","https://openalex.org/W3035615288","https://openalex.org/W2026101886","https://openalex.org/W4240605836","https://openalex.org/W2787124741"],"abstract_inverted_index":{"Inter-Component":[0],"Communication":[1],"(ICC)":[2],"enables":[3],"useful":[4],"interactions":[5],"between":[6,87],"mobile":[7],"apps.":[8],"However,":[9],"misuse":[10],"of":[11,57,60,154],"ICC":[12,38,62,79,99,107],"exposes":[13],"users":[14],"to":[15,28,95,104,109,115],"serious":[16],"threats":[17],"such":[18],"as":[19],"intent":[20],"hijacking/spoofing":[21],"and":[22,46,54,76,91,119],"app":[23,146],"collusions,":[24],"allowing":[25],"malicious":[26],"apps":[27,90,94,143],"access":[29],"privileged":[30],"user":[31],"data":[32],"via":[33],"another":[34],"app.":[35],"Unfortunately,":[36],"existing":[37],"analyses":[39],"are":[40],"largely":[41],"incompetent":[42],"in":[43,81],"both":[44],"accuracy":[45],"scale.":[47],"This":[48,123],"poster":[49],"points":[50],"out":[51],"the":[52,92,106,152],"need":[53],"technical":[55],"challenges":[56],"prioritized":[58],"analysis":[59,80],"inter-app":[61,78,113],"risks.":[63],"In":[64],"this":[65],"poster,":[66],"we":[67],"propose":[68],"MR-Droid,":[69],"a":[70,97],"MapReduce-based":[71,134],"computing":[72],"framework":[73],"for":[74,112],"accurate":[75],"scalable":[77],"Android.":[82],"MR-Droid":[83],"extracts":[84],"data-flow":[85],"features":[86],"multiple":[88],"communicating":[89],"target":[93],"build":[96],"large-scale":[98],"graph.":[100],"Our":[101,137],"approach":[102],"is":[103,130],"leverage":[105],"graph":[108],"provide":[110],"contexts":[111],"communications":[114],"produce":[116],"precise":[117],"alerts":[118],"prioritize":[120],"risk":[121],"assessments.":[122],"process":[124],"requires":[125],"large":[126],"app-pair":[127],"data,":[128],"which":[129],"enabled":[131],"by":[132],"our":[133,155],"program":[135],"analysis.":[136],"initial":[138],"extensive":[139],"experiments":[140],"on":[141],"11,996":[142],"from":[144],"24":[145],"categories":[147],"(13":[148],"million":[149],"pairs)":[150],"demonstrate":[151],"scalability":[153],"approach.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
