{"id":"https://openalex.org/W7128466192","doi":"https://doi.org/10.48550/arxiv.2602.07893","title":"Is Your Private Information Logged? An Empirical Study on Android App Logs","display_name":"Is Your Private Information Logged? An Empirical Study on Android App Logs","publication_year":2026,"publication_date":"2026-02-08","ids":{"openalex":"https://openalex.org/W7128466192","doi":"https://doi.org/10.48550/arxiv.2602.07893"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.07893","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.07893","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.07893","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125578459","display_name":"Zhiyuan Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chen, Zhiyuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078661585","display_name":"Soham Sanjay Deo","orcid":"https://orcid.org/0009-0004-0278-6489"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deo, Soham Sanjay","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093538437","display_name":"Poorna Chander Reddy Puttaparthi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Puttaparthi, Poorna Chander Reddy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119998174","display_name":"Vanessa Nava-Camal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nava-Camal, Vanessa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Tang, Yiming","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tang, Yiming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076840219","display_name":"Xueling Zhang","orcid":"https://orcid.org/0000-0001-9202-9764"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Xueling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5056378414","display_name":"Weiyi Shang","orcid":"https://orcid.org/0000-0001-6222-7444"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shang, Weiyi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5125578459"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9028000235557556,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9028000235557556,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.013399999588727951,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.011099999770522118,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.9071999788284302},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.6395999789237976},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.6258999705314636},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.5485000014305115},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49219998717308044},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4047999978065491},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.3952000141143799}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.9071999788284302},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.6395999789237976},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.6258999705314636},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5684999823570251},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.5485000014305115},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5410000085830688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5016999840736389},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49219998717308044},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.46209999918937683},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.39089998602867126},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.32919999957084656},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.32589998841285706},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.27250000834465027}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.07893","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.07893","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.07893","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.07893","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,30,65,91,124,130,139,162,172],"rapid":[2],"growth":[3],"of":[4,32,40,64,80,95,132,149,164,178],"mobile":[5],"apps,":[6,34],"users'":[7],"concerns":[8,111,150],"about":[9],"their":[10,190],"privacy":[11,48,66,96,113,121,155,165,191],"have":[12,46],"become":[13],"increasingly":[14],"prominent.":[15],"Android":[16,33,54,69,81,99,125,134,168],"app":[17,70,82,100,126,135,169],"logs":[18,52,83,136,160],"serve":[19],"as":[20,56],"crucial":[21],"computer":[22],"resources,":[23],"aiding":[24],"developers":[25,153,185],"in":[26,50,68,98,123,167],"debugging":[27],"and":[28,53,84,93,137,161],"monitoring":[29],"status":[31,92],"while":[35],"also":[36],"containing":[37],"a":[38,61,77],"wealth":[39],"software":[41,51,117,159],"system":[42],"information.":[43],"Previous":[44],"studies":[45],"acknowledged":[47],"leaks":[49,67,97,122,166],"apps":[55],"significant":[57],"issues":[58,114,156],"without":[59],"providing":[60],"comprehensive":[62,78],"view":[63],"logs.":[71,101],"In":[72],"this":[73],"study,":[74],"we":[75],"build":[76],"dataset":[79],"conduct":[85],"an":[86],"empirical":[87],"study":[88,103,144,183],"to":[89,116,158,188],"analyze":[90],"severity":[94],"Our":[102,143],"comprises":[104],"three":[105],"aspects:":[106],"(1)":[107],"Understanding":[108],"real-world":[109,152],"developers'":[110,176],"regarding":[112,154],"related":[115,157],"logs;":[118,127],"(2)":[119],"Studying":[120],"(3)":[128],"Investigating":[129],"characteristics":[131],"privacy-leaking":[133],"analyzing":[138],"reasons":[140],"behind":[141],"them.":[142],"reveals":[145],"five":[146],"different":[147],"categories":[148],"from":[151,175,192],"prevalence":[163],"logs,":[170],"with":[171,186],"majority":[173],"stemming":[174],"unawareness":[177],"such":[179],"leaks.":[180],"Additionally,":[181],"our":[182],"provides":[184],"suggestions":[187],"safeguard":[189],"being":[193],"logged.":[194]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-02-11T00:00:00"}
