{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:06:06Z","timestamp":1776107166774,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1513690, CNS-1513939, CNS-1434582"],"award-info":[{"award-number":["CNS-1513690, CNS-1513939, CNS-1434582"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Maryland Procurement Office","award":["H98230-14-C-0141"],"award-info":[{"award-number":["H98230-14-C-0141"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,18]]},"DOI":"10.1145\/3098243.3098247","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:03:43Z","timestamp":1499976223000},"page":"23-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["UiRef"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Andow","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Akhil","family":"Acharya","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Dengfeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Illinois"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Kapil","family":"Singh","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Illinois"}]}],"member":"320","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Modernizing OAuth interactions in Native Apps for Better Usability and Security. https:\/\/developers.googleblog.com\/2016\/08\/modernizing-oauth-interactions-in-native-apps.html. (2016).  2016. Modernizing OAuth interactions in Native Apps for Better Usability and Security. https:\/\/developers.googleblog.com\/2016\/08\/modernizing-oauth-interactions-in-native-apps.html. (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. PCI Security Standards Council. https:\/\/www.pcisecuritystandards.org\/. (2016).  2016. PCI Security Standards Council. https:\/\/www.pcisecuritystandards.org\/. (2016)."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Privacy Rights Clearinghouse Data Breaches. https:\/\/www.privacyrights.org\/data-breaches?title=. (2016).  2016. Privacy Rights Clearinghouse Data Breaches. https:\/\/www.privacyrights.org\/data-breaches?title=. (2016)."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. ApkTool. http:\/\/ibotpeaches.github.io\/Apktool. (2017).  2017. ApkTool. http:\/\/ibotpeaches.github.io\/Apktool. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. UiRef Project Website. https:\/\/wspr.csc.ncsu.edu\/uiref\/. (2017).  2017. UiRef Project Website. https:\/\/wspr.csc.ncsu.edu\/uiref\/. (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_8_1","volume-title":"Breaking Sticks and Ambiguities with Adaptive Skip-gram. arXiv preprint arXiv:1502.07257","author":"Bartunov Sergey","year":"2015","unstructured":"Sergey Bartunov , Dmitry Kondrashkin , Anton Osokin , and Dmitry Vetrov . 2015. Breaking Sticks and Ambiguities with Adaptive Skip-gram. arXiv preprint arXiv:1502.07257 ( 2015 ). Sergey Bartunov, Dmitry Kondrashkin, Anton Osokin, and Dmitry Vetrov. 2015. Breaking Sticks and Ambiguities with Adaptive Skip-gram. arXiv preprint arXiv:1502.07257 (2015)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS).","author":"Demetriou Soteris","unstructured":"Soteris Demetriou , Whitney Merrill , Wei Yang , Aston Zhang , and Carl A. Gunter . 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android . In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS). Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, and Carl A. Gunter. 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS).","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS). Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Enck William","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS).","author":"Han Jin","year":"2013","unstructured":"Jin Han , Qiang Yan , Debin Gao , Jianying Zhou , and Robert Deng . 2013 . Comparing Mobile Privacy Protection through Cross-Platform Applications . In Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS). Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, and Robert Deng. 2013. Comparing Mobile Privacy Protection through Cross-Platform Applications. In Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Huang Jianjun","year":"2015","unstructured":"Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , and Guofei Jiang . 2015 . SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps . In Proceedings of the USENIX Security Symposium. Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/318723.318728"},{"key":"e_1_3_2_1_21_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in neural information processing systems.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in neural information processing systems."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Nan Yuhong","year":"2015","unstructured":"Yuhong Nan , Min Yang , Zhemin Yang , Shunfan Zhou , Guofei Gu , , and XiaoFeng Wang . 2015 . UIPicker: User-Input Privacy Identification in Mobile Applications . In Proceedings of the USENIX Security Symposium. Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, , and XiaoFeng Wang. 2015. UIPicker: User-Input Privacy Identification in Mobile Applications. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.53"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393600"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Octeau Damien","year":"2013","unstructured":"Damien Octeau , Patrick McDaniel , Somesh Jha , Alexandre Bartel , Eric Bodden , Jacques Klein , and Yves Le Traon . 2013 . Effective Inter-component Communication Mapping in Android with EPPIC: An Essential Step Towards Holistic Security Analysis . In Proceedings of the USENIX Security Symposium. Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, and Yves Le Traon. 2013. Effective Inter-component Communication Mapping in Android with EPPIC: An Essential Step Towards Holistic Security Analysis. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proceedings of the USENIX Security Symposium. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435379"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Roesner Franziska","year":"2013","unstructured":"Franziska Roesner and Tadayoshi Kohno . 2013 . Securing Embedded User Interfaces: Android and Beyond . In Proceedings of the USENIX Security Symposium. Franziska Roesner and Tadayoshi Kohno. 2013. Securing Embedded User Interfaces: Android and Beyond. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"Static Window Transition Graphs for Android. In IEEE\/ACM International Conference on Automated Software Engineering.","author":"Yang Shengqian","year":"2015","unstructured":"Shengqian Yang and Hailong Zhang and Haowei Wu and Yan Wang and Dacong Yan and Atanas Rountev . 2015 . Static Window Transition Graphs for Android. In IEEE\/ACM International Conference on Automated Software Engineering. Shengqian Yang and Hailong Zhang and Haowei Wu and Yan Wang and Dacong Yan and Atanas Rountev. 2015. Static Window Transition Graphs for Android. In IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the IEEE International Conference on Hybrid Intelligent Systems (HIS).","author":"Ranga Suri N.N.R.","year":"2012","unstructured":"N.N.R. Ranga Suri , Musti Narasimha Murty , and Gopalasamy Athithan . 2012 . An Algorithm for Mining Outliers in Categorical Data through Ranking . In Proceedings of the IEEE International Conference on Hybrid Intelligent Systems (HIS). N.N.R. Ranga Suri, Musti Narasimha Murty, and Gopalasamy Athithan. 2012. An Algorithm for Mining Outliers in Categorical Data through Ranking. In Proceedings of the IEEE International Conference on Hybrid Intelligent Systems (HIS)."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Tripp Omer","year":"2014","unstructured":"Omer Tripp and Julia Rubin . 2014 . A Bayesian Approach to Privacy Enforcement in Smartphones . In Proceedings of the USENIX Security Symposium. Omer Tripp and Julia Rubin. 2014. A Bayesian Approach to Privacy Enforcement in Smartphones. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516676"}],"event":{"name":"WiSec '17: 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"Boston Massachusetts","acronym":"WiSec '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","NSF National Science Foundation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098247","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:03Z","timestamp":1750217403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098247"}},"subtitle":["analysis of sensitive user inputs in Android applications"],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":34,"alternative-id":["10.1145\/3098243.3098247","10.1145\/3098243"],"URL":"https:\/\/doi.org\/10.1145\/3098243.3098247","relation":{},"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"2017-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}