{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:44:10Z","timestamp":1776681850142,"version":"3.51.2"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833764","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2114-2129","source":"Crossref","is-referenced-by-count":8,"title":["FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy"],"prefix":"10.1109","author":[{"given":"Zhi","family":"Yang","sequence":"first","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]},{"given":"Zhanhui","family":"Yuan","sequence":"additional","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]},{"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University,Guangzhou,China"}]},{"given":"Xingyuan","family":"Chen","sequence":"additional","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]},{"given":"Lei","family":"Sun","sequence":"additional","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]},{"given":"Xuehui","family":"Du","sequence":"additional","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]},{"given":"Wenfa","family":"Li","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing,Beijing,China"}]},{"given":"Hongqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"PLA Information Engineering University,Zhengzhou,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2901798"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/2594291.2594299","article-title":"FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps","author":"arzt","year":"2014","journal-title":"proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)"},{"key":"ref12","article-title":"Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks","author":"xu","year":"2006","journal-title":"Proceedings of the 15th conference on USENIX Security Symposium (USENIX-SS&#x2019;06)"},{"key":"ref56","article-title":"Triton: A Dynamic Symbolic Execution Framework","year":"2015","journal-title":"SSTIC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref14","article-title":"FuzzGuard: filtering out unreachable inputs in directed grey-box fuzzing through deep learning","author":"zong","year":"2020","journal-title":"29th USENIX Security Symposium"},{"key":"ref58","first-page":"1687","article-title":"Sensitive information tracking in commodity IoT","author":"celik","year":"2018","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref53","first-page":"531","article-title":"FlowFence: practical data protection for emerging IoT application frameworks","author":"fernandes","year":"2016","journal-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC&#x2019;16)"},{"key":"ref52","article-title":"A general approach for efficiently accelerating software-based dynamic data flow tracking on commodity hardware","author":"jee","year":"2012","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590312"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978343"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"ref16","first-page":"295","article-title":"Automatically hardening web applications using precise tainting","volume":"181","author":"nguyen-tuong","year":"2005","journal-title":"IFIP International Information Security Conference"},{"key":"ref19","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.17"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352622"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23350"},{"key":"ref45","first-page":"451","article-title":"JetStream: cluster-scale parallelization of information flow queries","author":"quinn","year":"2016","journal-title":"Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation (OSDI&#x2019;16)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378538"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346321"},{"key":"ref43","article-title":"InsecureBankv2","year":"0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23092"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00043"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09749-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2733306"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.20"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.158"},{"key":"ref34","first-page":"49","article-title":"Precise interprocedural dataflow analysis via graph reachability","author":"reps","year":"1995","journal-title":"Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL &#x2019;95)"},{"key":"ref37","first-page":"65","article-title":"TaintPipe: pipelined symbolic taint analysis","author":"ming","year":"2015","journal-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC&#x2019;15)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970299"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2494522"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref32","article-title":"DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation","author":"kang","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744830"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00040"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384764"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181313"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00082"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"ref25","first-page":"124","article-title":"Defending against injection attacks through context-sensitive string evaluation","author":"pietraszek","year":"2005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00092"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519073"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.005"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516704"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"ref27","article-title":"Cross site scripting prevention with dynamic data tainting and static analysis","author":"vogt","year":"2007","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866354"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177153"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356069"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455778"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833764.pdf?arnumber=9833764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:27:16Z","timestamp":1699486036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833764","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}