{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:42:24Z","timestamp":1770284544389,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1409668, 1320444, and 1320306"],"award-info":[{"award-number":["1409668, 1320444, and 1320306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA","award":["FA8650-15-C-7562"],"award-info":[{"award-number":["FA8650-15-C-7562"]}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ONR","award":["N000141410468"],"award-info":[{"award-number":["N000141410468"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1145\/2950290.2950348","type":"proceedings-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T09:46:03Z","timestamp":1477993563000},"page":"169-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Detecting sensitive data disclosure via bi-directional text correlation analysis"],"prefix":"10.1145","author":[{"given":"Jianjun","family":"Huang","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/buycott.com\/. Accessed","year":"2016","unstructured":"Buycott. http:\/\/buycott.com\/. Accessed: 03 Mar 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"Git large file storage. https:\/\/git-lfs.github.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Gradle build tool | modern open source build automation. https:\/\/gradle.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Oracle VM VirtualBox. {https:\/\/www.virtualbox.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Universal dependencies. http:\/\/universaldependencies.github. io\/docs\/."},{"key":"e_1_3_2_1_6_1","unstructured":"WALA: T.J. Watson Libraries for Analysis. http:\/\/wala. sourceforge.net."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_8_1","volume-title":"NDSS","author":"GELE M.","year":"2011","unstructured":"E GELE, M., K RUEGEL, C., K IRDA, E., AND V IGNA, G. PiOS: Detecting privacy leaks in iOS applications. In NDSS (2011)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924971"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028088"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660343"},{"key":"e_1_3_2_1_12_1","unstructured":"F ORTI G UARD C ENTER. Information disclosure vulnerability in OpenSSL (Heartbleed). http:\/\/www. fortiguard.com\/advisory\/2014-04-08-informationdisclosure-vulnerability-in-openssl."},{"key":"e_1_3_2_1_13_1","volume-title":"Gartner says smartphone sales surpassed one billion units","author":"ARTNER.","year":"2014","unstructured":"G ARTNER. Gartner says smartphone sales surpassed one billion units in 2014. http:\/\/www.gartner.com\/newsroom\/id\/ 2996817."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_15_1","volume-title":"NDSS","author":"ORDON M. I.","year":"2015","unstructured":"G ORDON, M. I., K IM, D., P ERKINS, J., G ILHAMY, L., N GUYENZ, N., AND R INARD, M. Information-flow analysis of Android applications in DroidSafe. In NDSS (2015)."},{"key":"e_1_3_2_1_16_1","volume-title":"Privacy leakage in mobile computing: Tools, methods, and characteristics. CoRR abs\/1410.4978","author":"ARIS M.","year":"2014","unstructured":"H ARIS, M., H ADDADI, H., AND H UI, P. Privacy leakage in mobile computing: Tools, methods, and characteristics. CoRR abs\/1410.4978 (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831205"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54804-8_10"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"key":"e_1_3_2_1_21_1","volume-title":"MoST","author":"IM J.","year":"2012","unstructured":"K IM, J., Y OON, Y., AND Y I, K. ScanDal: Static analyzer for detecting privacy leaks in Android applications. In MoST (2012)."},{"key":"e_1_3_2_1_22_1","volume-title":"NDSS","author":"EMERLIS V.","year":"2015","unstructured":"L U, K., L I, Z., K EMERLIS, V., W U, Z., L U, L., Z HENG, C., Q IAN, Z., L EE, W., AND J IANG, G. Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting. In NDSS (2015)."},{"key":"e_1_3_2_1_23_1","volume-title":"AND J IANG","author":"EE W.","year":"2012","unstructured":"L U, L., L I, Z., W U, Z., L EE, W., AND J IANG, G. CHEX: Statically vetting Android apps for component hijacking vulnerabilities. In CCS (2012)."},{"key":"e_1_3_2_1_24_1","unstructured":"M AHEMOFF M. \"Offline\": What does it mean and why should I care? http:\/\/www.html5rocks.com\/en\/tutorials\/ offline\/whats-offline\/."},{"key":"e_1_3_2_1_25_1","unstructured":"MITRE. CWE-200: Information exposure. https:\/\/cwe. mitre.org\/data\/definitions\/200.html."},{"key":"e_1_3_2_1_26_1","volume-title":"ICIN","author":"ULLINER C.","year":"2010","unstructured":"M ULLINER, C. Privacy leaks in mobile phone internet access. In ICIN (2010)."},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security","author":"AN Y.","year":"2015","unstructured":"N AN, Y., Y ANG, M., Y ANG, Z., Z HOU, S., G U, G., AND W ANG, X. UIPicker: User-input privacy identification in mobile applications. In USENIX Security (2015)."},{"key":"e_1_3_2_1_28_1","unstructured":"OWASP. Information leakage. https:\/\/www.owasp.org\/ index.php\/Information_Leakage."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534812"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337319"},{"key":"e_1_3_2_1_31_1","volume-title":"CCS","author":"ASTOGI V.","year":"2014","unstructured":"Q U, Z., R ASTOGI, V., Z HANG, X., C HEN, Y., Z HU, T., AND C HEN, Z. AutoCog: Measuring the description-to-permission fidelity in Android applications. In CCS (2014)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_1_33_1","unstructured":"S EARCH E NGINE W ATCH. Mobile now exceeds PC: The biggest shift since the Internet began. https:\/\/ searchenginewatch.com\/sew\/opinion\/2353616\/mobile-nowexceeds-pc-the-biggest-shift-since-the-internet-began."},{"key":"e_1_3_2_1_34_1","unstructured":"The Stanford Natural Language Processing Group 1999. http:\/\/nlp.stanford.edu\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"key":"e_1_3_2_1_36_1","volume-title":"ICSE","author":"AN L.","year":"2011","unstructured":"T AN, L., Z HOU, Y., AND P ADIOLEAU, Y. aComment: Mining annotations from comments and code to detect interrupt-related concurrency bugs. In ICSE (2011)."},{"key":"e_1_3_2_1_37_1","volume-title":"ICST","author":"AN S. H.","year":"2012","unstructured":"T AN, S. H., M ARINOV, D., T AN, L., AND L EAVENS, G. T. @tComment: Testing javadoc comments to detect comment-code inconsistencies. In ICST (2012)."},{"key":"e_1_3_2_1_38_1","volume-title":"OpenSSL \u2019Heartbleed","author":"US-CERT","year":"2014","unstructured":"US-CERT. OpenSSL \u2019Heartbleed\u2019 vulnerability (CVE-2014-0160). https:\/\/www.us-cert.gov\/ncas\/alerts\/ TA14-098A."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486008"},{"key":"e_1_3_2_1_40_1","unstructured":"Z AKAS N. C. Towards more secure client-side data storage. https:\/\/www.nczonline.net\/blog\/2010\/04\/13\/towards-moresecure-client-side-data-storage\/."},{"key":"e_1_3_2_1_41_1","volume-title":"ICSE","author":"HAI J.","year":"2016","unstructured":"Z HAI, J., H UANG, J., M A, S., Z HANG, X., T AN, L., Z HAO, J., AND Q IN, F. Automatic model generation from documentation for Java API functions. In ICSE (2016)."}],"event":{"name":"FSE'16: 24nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering","location":"Seattle WA USA","acronym":"FSE'16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950348","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:39:52Z","timestamp":1763458792000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":41,"alternative-id":["10.1145\/2950290.2950348","10.1145\/2950290"],"URL":"https:\/\/doi.org\/10.1145\/2950290.2950348","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"2016-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}