{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T20:56:48Z","timestamp":1764277008103},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9163043","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T17:55:09Z","timestamp":1597082109000},"page":"121-126","source":"Crossref","is-referenced-by-count":7,"title":["Comprehensive Detection of Vulnerable Personal Information Leaks in Android Applications"],"prefix":"10.1109","author":[{"given":"Nattanon","family":"Wongwiwatchai","sequence":"first","affiliation":[]},{"given":"Phannawhat","family":"Pongkham","sequence":"additional","affiliation":[]},{"given":"Kunwadee","family":"Sripanidkulchai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23465"},{"key":"ref11","article-title":"Is our children's apps learning? automatically detecting coppa violations","author":"wijesekera","year":"2017","journal-title":"ConPro"},{"key":"ref12","first-page":"63","article-title":"Wont Somebody Think of the Children? Examining COPPA Compliance at Scale","author":"reyes","year":"0","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"journal-title":"Antshield On-device detection of personal information exposure","year":"2018","author":"shuba","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445948"},{"journal-title":"EU GDPR","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1068-3"},{"journal-title":"Brazil LGPD","year":"0","key":"ref17"},{"journal-title":"Australian APP","year":"0","key":"ref18"},{"journal-title":"Thailand PDPA","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398363"},{"journal-title":"HP Reveals Applications Vulnerable to Attack","year":"0","key":"ref3"},{"key":"ref6","first-page":"259","article-title":"FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps","author":"arzt","year":"2014","journal-title":"PLDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"journal-title":"Mobile Operating System Market Share Worldwide","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2017.8026853"},{"journal-title":"ITU Statistics","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"journal-title":"Summary of the HIPAA Privacy Rule","year":"0","key":"ref21"},{"journal-title":"UI\/Application Exerciser Monkey | Android Developers","year":"0","key":"ref24"},{"journal-title":"mitmproxy","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2020,7,6]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09163043.pdf?arnumber=9163043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:58:27Z","timestamp":1656439107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9163043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9163043","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}