{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T05:21:23Z","timestamp":1773552083638,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232014"],"award-info":[{"award-number":["62232014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272377"],"award-info":[{"award-number":["62272377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372368"],"award-info":[{"award-number":["62372368"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372367"],"award-info":[{"award-number":["62372367"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Talent Fund of Association for Science and Technology in Shaanxi, China"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tse.2024.3479288","type":"journal-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:23:56Z","timestamp":1728926636000},"page":"3225-3248","source":"Crossref","is-referenced-by-count":9,"title":["Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2597-208X","authenticated-orcid":false,"given":"Yin","family":"Wang","sequence":"first","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-0987","authenticated-orcid":false,"given":"Ming","family":"Fan","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7534-5550","authenticated-orcid":false,"given":"Junfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4512-3085","authenticated-orcid":false,"given":"Junjie","family":"Tao","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9137-4635","authenticated-orcid":false,"given":"Wuxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3509-3919","authenticated-orcid":false,"given":"Haijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3460-0043","authenticated-orcid":false,"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Big Data Security Lab, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"MiniApp standardization white paper","year":"2024"},{"key":"ref2","first-page":"2019","article-title":"App store killer? The storm of WeChat mini programs swept over the mobile app ecosystem","volume":"15","author":"Ma","year":"2019"},{"key":"ref3","article-title":"2021 MiniApp internet development white paper","year":"2022"},{"key":"ref4","article-title":"Number of available applications in the Google Play Store from December 2009 to March 2022","year":"2022"},{"key":"ref5","article-title":"MiniApp Personal Information Protection Research Report","author":"Center","year":"2020"},{"key":"ref6","article-title":"Information security technology\u2014Personal information security specification","year":"2020"},{"key":"ref7","article-title":"General data protection regulation","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380401"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2866347"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref12","first-page":"543","article-title":"Effective inter-component communication mapping in Android: An essential step towards holistic security analysis","volume-title":"Proc. 22th USENIX Secur. Symp.","author":"Octeau","year":"2013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2015.48"},{"issue":"201","key":"ref14","first-page":"110","article-title":"Information flow analysis of android applications in droidsafe","volume-title":"Proc. 22nd Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS)","volume":"15","author":"Gordon"},{"key":"ref15","first-page":"1669","article-title":"FlowCog: Context-aware semantics extraction and analysis of information flow leaks in android apps","volume-title":"Proc. 27th USENIX Secur. Symp., USENIX Secur.","author":"Pan","year":"2018"},{"key":"ref16","first-page":"67","article-title":"Static analysis of android apps: A systematic literature review","volume-title":"Inf. Softw. Technol.","volume":"88","author":"Li","year":"2017"},{"key":"ref17","first-page":"993","article-title":"UIPicker: User-input privacy identification in mobile applications","volume-title":"Proc. 24th USENIX Secur. Symp., USENIX Secur. 15","author":"Nan","year":"2015"},{"key":"ref18","first-page":"977","article-title":"SUPOR: Precise and scalable sensitive user input detection for android apps","volume-title":"Proc. 24th USENIX Secur. Symp., USENIX Secur.","author":"Huang","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950348"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00071"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2886875"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"ref24","article-title":"Automated analysis of privacy requirements for mobile apps","volume-title":"Proc. AAAI Fall Symposia","author":"Zimmeck","year":"2016"},{"key":"ref25","first-page":"985","article-title":"Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck","volume-title":"Proc. 29th USENIX Secur. Symp., USENIX Secur.","author":"Andow","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484536"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3287051"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542483"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.4"},{"key":"ref33","article-title":"Understand by SciTools","year":"2024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025125"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00086"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3299945"},{"key":"ref37","first-page":"531","article-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning","volume-title":"Proc. 27th USENIX Secur. Symp., USENIX Secur.","author":"Harkous","year":"2018"},{"key":"ref38","article-title":"Are your mobile apps protecting user data? Automated app analysis helps you understand and verify your app\u2019s privacy behaviors","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref40","article-title":"MiniApp consistency detection system","year":"2024"},{"key":"ref41","article-title":"California consumer privacy act","year":"2022"},{"key":"ref42","article-title":"Personal information protection law of the people\u2019s republic of china"},{"key":"ref43","article-title":"Personal data protection act","year":"2020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3460081"},{"key":"ref45","article-title":"WeChat MiniApp Unpacking Tool: wxappUnpacker","year":"2022"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.18653\/v1\/P16-1126","article-title":"The creation and analysis of a website privacy policy corpus","volume-title":"Proc. 54th Annu. Meeting Assoc. Comput. Linguistics (Volume 1: Long Papers)","author":"Wilson","year":"2016"},{"key":"ref47","first-page":"5460","article-title":"A tale of two regulatory regimes: Creation and analysis of a bilingual privacy policy corpus","volume-title":"Proc. Int. Conf. Lang. Resour. Eval","author":"Arora","year":"2022"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.700"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2015.7330207"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"ref51","article-title":"Analyzing privacy policies through syntax-driven semantic analysis of information types","volume-title":"Inf. Softw. Technol.","volume":"138","author":"Hosseini","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77243-1_3"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510114"},{"key":"ref54","first-page":"585","article-title":"Policylint: Investigating internal privacy policy contradictions on Google play","volume-title":"Proc. 28th USENIX Secur. Symp., USENIX Secur.","author":"Andow","year":"2019"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/pact.2001.953309"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"ref57","article-title":"GPT (generative pre-trained transformer)"},{"key":"ref58","article-title":"Claude","year":"2024"},{"key":"ref59","article-title":"Qwen","author":"Cloud","year":"2024"},{"key":"ref60","article-title":"Ernie","year":"2024"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"ref62","article-title":"Natural language processing for mobile app privacy compliance","volume-title":"Proc. AAAI Spring Symp. Privacy-Enhancing Artif. Intell. Lang. Technol.","volume":"10","author":"Story","year":"2019"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"ref65","article-title":"Smart MiniApp documentation","year":"2024"},{"key":"ref66","article-title":"Alipay MiniApp documentation guidelines","year":"2024"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3199882"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001442"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635904"},{"key":"ref71","article-title":"JSPrime: A JavaScript static security analysis tool","author":"Patnaik"},{"key":"ref72","article-title":"Discover vulnerabilities across a codebase with CodeQL"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ase56229.2023.00151"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417255"},{"key":"ref76","first-page":"1189","article-title":"Industry practice of JavaScript dynamic analysis on WeChat mini-programs","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Liu","year":"2020"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00041"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10794440\/10715677.pdf?arnumber=10715677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:13:17Z","timestamp":1734030797000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10715677\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":81,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3479288","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}