{"id":"https://openalex.org/W4404213228","doi":"https://doi.org/10.56553/popets-2025-0040","title":"PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps","display_name":"PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps","publication_year":2024,"publication_date":"2024-11-10","ids":{"openalex":"https://openalex.org/W4404213228","doi":"https://doi.org/10.56553/popets-2025-0040"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2025-0040","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0040","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0040.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2025/popets-2025-0040.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115694711","display_name":"Zhaohui Wang","orcid":"https://orcid.org/0009-0009-8731-3598"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhaohui Wang","raw_affiliation_strings":["The University of Kansas"],"affiliations":[{"raw_affiliation_string":"The University of Kansas","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052233895","display_name":"Bo Luo","orcid":"https://orcid.org/0000-0001-8196-2436"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Luo","raw_affiliation_strings":["The University of Kansas"],"affiliations":[{"raw_affiliation_string":"The University of Kansas","institution_ids":["https://openalex.org/I146416000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014556254","display_name":"Fengjun Li","orcid":"https://orcid.org/0000-0003-4079-2228"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fengjun Li","raw_affiliation_strings":["The University of Kansas"],"affiliations":[{"raw_affiliation_string":"The University of Kansas","institution_ids":["https://openalex.org/I146416000"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115694711"],"corresponding_institution_ids":["https://openalex.org/I146416000"],"apc_list":null,"apc_paid":null,"fwci":1.0246,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77241416,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"2025","issue":"1","first_page":"776","last_page":"791"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6668223142623901},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.6205657124519348},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5558416247367859},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5539150834083557},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.48733362555503845},{"id":"https://openalex.org/keywords/smartphone-app","display_name":"Smartphone app","score":0.4630205035209656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.42186883091926575},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18462780117988586}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6668223142623901},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.6205657124519348},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5558416247367859},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5539150834083557},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.48733362555503845},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.4630205035209656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42186883091926575},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18462780117988586},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2025-0040","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0040","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0040.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2025-0040","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0040","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0040.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5460721896","display_name":null,"funder_award_id":"IIS-2014552","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8216956235","display_name":"SCH: INT: Collaborative Research: Privacy-Preserving Federated Transfer Learning for Early Acute Kidney Injury Risk Prediction","funder_award_id":"2014552","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8789246372","display_name":"CyberCorps: New Scholarships for Service (SFS) Program at the University of Kansas - Jayhawk SFS","funder_award_id":"1565570","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404213228.pdf","grobid_xml":"https://content.openalex.org/works/W4404213228.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4315471165","https://openalex.org/W2808363712","https://openalex.org/W3044207086","https://openalex.org/W3033856982","https://openalex.org/W4393103849","https://openalex.org/W4385222898","https://openalex.org/W2890710341","https://openalex.org/W2755693129","https://openalex.org/W2307269468","https://openalex.org/W2938393566"],"abstract_inverted_index":{"The":[0,125],"increasing":[1],"use":[2],"of":[3,6,32,79,98,158,164],"the":[4,77,84,165],"Internet":[5],"Things":[7],"(IoT)":[8],"technology":[9],"has":[10],"made":[11],"our":[12],"lives":[13],"convenient,":[14],"however,":[15],"it":[16],"also":[17],"poses":[18],"new":[19,30],"security":[20],"and":[21,60,82,120,174],"privacy":[22,33,86,99,106,133,159,168],"threats.":[23],"In":[24],"this":[25,67],"work,":[26],"we":[27,69],"study":[28],"a":[29,95,112],"type":[31,157],"threat":[34],"enabled":[35],"by":[36,146],"cross-app":[37,74],"chains":[38,75,144],"built":[39],"among":[40,50],"multiple":[41],"seemingly":[42,148],"benign":[43,149],"IoT":[44,150],"apps.":[45],"We":[46,108],"find":[47],"that":[48,128,135],"interactions":[49],"apps":[51,151],"could":[52,130,152],"leak":[53,153],"privacy-sensitive":[54],"information,":[55,160],"e.g.,":[56],"users'":[57],"identification,":[58],"location":[59],"tracking,":[61],"activity":[62],"patterns,":[63],"etc.":[64],"To":[65],"tackle":[66],"challenge,":[68],"introduce":[70],"PrivacyGuard,":[71],"which":[72],"extracts":[73],"in":[76],"form":[78],"trigger-condition-action":[80],"rules":[81],"identifies":[83],"corresponding":[85],"leakage":[87],"risk":[88],"with":[89,114],"an":[90],"inference":[91],"probability.":[92],"PrivacyGuard":[93,110,129],"supports":[94],"fine-grained":[96],"categorization":[97],"threats":[100],"to":[101,139],"generate":[102],"detailed":[103],"alerts":[104],"about":[105],"leakages.":[107],"evaluated":[109],"on":[111],"dataset":[113],"2,101":[115],"SmartApps,":[116],"2,788":[117],"IFTTT":[118],"rules,":[119,123],"2,086":[121],"OpenHAB":[122],"respectively.":[124],"results":[126],"show":[127],"uncover":[131],"hidden":[132],"leaks":[134,166],"existing":[136],"studies":[137],"fail":[138],"detect.":[140],"For":[141],"example,":[142],"7.67%":[143],"constructed":[145],"two":[147],"at":[154],"least":[155],"one":[156],"while":[161],"over":[162],"80%":[163],"involved":[167],"information":[169],"regarding":[170],"Localization":[171],"&amp;":[172],"Tracking":[173],"Activity":[175],"Profiling.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
