{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T04:38:14Z","timestamp":1768451894828,"version":"3.49.0"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2023,11,1]]},"DOI":"10.1109\/tmc.2022.3197638","type":"journal-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T20:37:03Z","timestamp":1660077423000},"page":"6460-6476","source":"Crossref","is-referenced-by-count":7,"title":["FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6032-3002","authenticated-orcid":false,"given":"Xuechao","family":"Du","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"}]},{"given":"Xiang","family":"Pan","sequence":"additional","affiliation":[{"name":"Google Inc, Mountain View, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9618-4830","authenticated-orcid":false,"given":"Yinzhi","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Boyuan","family":"He","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL, USA"}]},{"given":"Gan","family":"Fan","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4103-1498","authenticated-orcid":false,"given":"Yan","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL, USA"}]},{"given":"Daigang","family":"Xu","sequence":"additional","affiliation":[{"name":"ZTE Corporation, Shenzhen, Guangdong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref3","first-page":"145","article-title":"Turtle guard: Helping android users apply contextual privacy preferences","volume-title":"Proc. 13th Symp. Usable Privacy Secur.","author":"Tsai"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref6","first-page":"527","article-title":"WHYPER: Towards automating risk assessment of mobile applications","volume-title":"Proc. USENIX Conf. Secur.","author":"Pandita"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23034"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref15","first-page":"1669","article-title":"FlowCog: Context-aware semantics extraction and analysis of information flow leaks in android apps","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Pan"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/p14-5010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3403\/00116074"},{"key":"ref18","article-title":"Intent | android developers","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"ref21","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013"},{"key":"ref22","article-title":"Wikicorpus: A word-sense disambiguated multilingual wikipedia corpus","volume-title":"Proc. 7th Int. Conf. Lang. Resour. Eval.","author":"Reese"},{"key":"ref23","article-title":"Jimple: Simplifying java bytecode for analyses and transformations","author":"Vallee-Rai","year":"1998"},{"key":"ref24","article-title":"The soot framework for java program analysis: A retrospective","volume-title":"Proc. Cetus Users Compiler InfaStruct. Workshop","author":"Lam"},{"key":"ref29","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"12th USENIX Symp. Operating Syst. Des. Implementation","author":"Abadi"},{"key":"ref33","article-title":"ICC-bench","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref35","article-title":"Mobilesandbox: Looking deeper into android applications","volume-title":"Proc. 28th Int. ACM Symp. Appl. Comput.","author":"Michael"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00126"},{"key":"ref37","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref38","article-title":"Language models are few-shot learners","author":"Brown","year":"2020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"ref41","first-page":"543","article-title":"Effective inter-component communication mapping in android: An essential step towards holistic security analysis","volume-title":"Proc. 22nd USENIX Secur. Symp.","author":"Octeau"},{"issue":"110","key":"ref42","article-title":"SCANDAL: Static analyzer for detecting privacy leaks in android applications","volume":"12","author":"Kim","year":"2012","journal-title":"MoST"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590312"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_36"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.77"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.238"},{"key":"ref48","first-page":"603","article-title":"50 ways to leak your data: An exploration of apps\u2019 circumvention of the android permissions system","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Reardon"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274744"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"ref52","first-page":"397","article-title":"6thSense: A context-aware sensor-based attack detector for smart devices","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Sikder"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.30"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"ref56","first-page":"361","article-title":"Smartauth: User-centered authorization for the internet of things","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Tian"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813669"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10269771\/09852759.pdf?arnumber=9852759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T18:00:05Z","timestamp":1717092005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9852759\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":51,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2022.3197638","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,1]]}}}