{"id":"https://openalex.org/W2802224856","doi":"https://doi.org/10.4018/ijdcf.2018070108","title":"A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control","display_name":"A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control","publication_year":2018,"publication_date":"2018-05-03","ids":{"openalex":"https://openalex.org/W2802224856","doi":"https://doi.org/10.4018/ijdcf.2018070108","mag":"2802224856"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2018070108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2018070108","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.4018/ijdcf.2018070108","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100676495","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-1286-7141"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Wu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069512755","display_name":"Ran Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ran Sun","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065601551","display_name":"Wenhao Fan","orcid":"https://orcid.org/0000-0001-5288-8708"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Fan","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020422392","display_name":"Yuanan Liu","orcid":"https://orcid.org/0000-0002-8076-1904"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan'An Liu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007029093","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0002-7828-2090"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Liu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100415294","display_name":"Feng Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Liu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering and School of Cybersecurity University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101486498","display_name":"Hui Lu","orcid":"https://orcid.org/0000-0002-4120-7716"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Lu","raw_affiliation_strings":["Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100676495"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04103958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"3","first_page":"1","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8967372179031372},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8462543487548828},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6663581132888794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5185278654098511},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44085100293159485},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.43407493829727173},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4061117172241211},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3968520164489746},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13905978202819824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8967372179031372},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8462543487548828},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6663581132888794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5185278654098511},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44085100293159485},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.43407493829727173},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4061117172241211},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3968520164489746},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13905978202819824}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2018070108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2018070108","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2018070108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2018070108","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W32581813","https://openalex.org/W124941384","https://openalex.org/W1522939654","https://openalex.org/W1982235649","https://openalex.org/W1988195734","https://openalex.org/W1990649188","https://openalex.org/W2005010039","https://openalex.org/W2060692877","https://openalex.org/W2085577046","https://openalex.org/W2092200346","https://openalex.org/W2092898274","https://openalex.org/W2133990480","https://openalex.org/W2140095007","https://openalex.org/W2158888459","https://openalex.org/W2202294605","https://openalex.org/W2601621757","https://openalex.org/W2911964244","https://openalex.org/W4245027182"],"related_works":["https://openalex.org/W2029684113","https://openalex.org/W2060629665","https://openalex.org/W3154138117","https://openalex.org/W2063408151","https://openalex.org/W3212610863","https://openalex.org/W2493947570","https://openalex.org/W1565885216","https://openalex.org/W2942010890","https://openalex.org/W2734812495","https://openalex.org/W2898697275"],"abstract_inverted_index":{"This":[0],"article":[1],"proposes":[2],"a":[3,16,20,50],"system":[4,26,90],"that":[5,55,88,109],"focuses":[6],"on":[7,47,103],"Android":[8,39],"application":[9,95],"runtime":[10,32,96],"behavior":[11,33,97],"forensics.":[12],"Using":[13],"Linux":[14],"processes,":[15],"dynamic":[17],"injection":[18],"and":[19,41,63,99],"Java":[21],"function":[22],"hook":[23],"technology,":[24],"the":[25,31,38,42,65,81,89,92,110,116],"is":[27,59,77],"able":[28],"to":[29,79],"manipulate":[30],"of":[34,94,118],"applications":[35,107],"without":[36],"modifying":[37],"framework":[40],"application's":[43],"source":[44],"code.":[45],"Based":[46],"this":[48],"method,":[49],"privacy":[51,66,112,120],"data":[52,67],"protection":[53],"policy":[54,82,113],"reflects":[56],"users'":[57,119],"intentions":[58],"proposed":[60,78],"by":[61],"extracting":[62],"recording":[64],"usage":[68],"in":[69],"applications.":[70],"Moreover,":[71],"an":[72],"optimized":[73],"random":[74],"forest":[75],"algorithm":[76],"reduce":[80],"training":[83],"time.":[84],"The":[85],"result":[86],"shows":[87,108],"realizes":[91],"functions":[93],"monitor":[98],"control.":[100],"An":[101],"experiment":[102],"134":[104],"widely":[105],"used":[106],"basic":[111],"could":[114],"satisfy":[115],"majority":[117],"intentions.":[121]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
