{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:30:18Z","timestamp":1772044218063,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3437511","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"578-592","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps"],"prefix":"10.1145","author":[{"given":"Trung Tin","family":"Nguyen","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Duc Cuong","family":"Nguyen","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Michael","family":"Schilling","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Michael","family":"Backes","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"KWY Au YF Zhou Z Huang and D Lie. 2012. PScout: Analyzing the Android Permission Specification. In CCS.  KWY Au YF Zhou Z Huang and D Lie. 2012. PScout: Analyzing the Android Permission Specification. In CCS.","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"V Avdiienko K Kuznetsov I Rommelfanger A Rau A Gorla and A Zeller. 2017. Detecting Behavior Anomalies in Graphical User Interfaces. In ICSE-C.  V Avdiienko K Kuznetsov I Rommelfanger A Rau A Gorla and A Zeller. 2017. Detecting Behavior Anomalies in Graphical User Interfaces. In ICSE-C.","DOI":"10.1109\/ICSE-C.2017.130"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"M Backes S Bugiel and E Derr. 2016a. Reliable Third-Party Library Detection in Android and Its Security Applications. In CCS.  M Backes S Bugiel and E Derr. 2016a. Reliable Third-Party Library Detection in Android and Its Security Applications. In CCS.","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_2_4_1","unstructured":"M Backes S Bugiel E Derr P McDaniel D Octeau and S Weisgerber. 2016b. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In USENIX Security.  M Backes S Bugiel E Derr P McDaniel D Octeau and S Weisgerber. 2016b. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In USENIX Security."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"R Balebako J Jung W Lu LF Cranor and C Nguyen. 2013. \"Little Brothers Watching You\": Raising Awareness of Data Leaks on Smartphones. In SOUPS.  R Balebako J Jung W Lu LF Cranor and C Nguyen. 2013. \"Little Brothers Watching You\": Raising Awareness of Data Leaks on Smartphones. In SOUPS.","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"L Bao TD B Le and D Lo. 2018. Mining sandboxes: Are we there yet?. In SANER.  L Bao TD B Le and D Lo. 2018. Mining sandboxes: Are we there yet?. In SANER.","DOI":"10.1109\/SANER.2018.8330231"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"P Barros R Just S Millstein P Vines W Dietl M d'Amorim and MD Ernst. 2015. Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (T). In ASE.  P Barros R Just S Millstein P Vines W Dietl M d'Amorim and MD Ernst. 2015. Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (T). In ASE.","DOI":"10.1109\/ASE.2015.69"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"B Bichsel V Raychev P Tsankov and M Vechev. 2016. Statistical deobfuscation of android applications. In CCS.  B Bichsel V Raychev P Tsankov and M Vechev. 2016. Statistical deobfuscation of android applications. In CCS.","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_2_9_1","unstructured":"R Bonett K Kafle K Moran A Nadkarni and D Poshyvanyk. 2018. Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. In USENIX Security.  R Bonett K Kafle K Moran A Nadkarni and D Poshyvanyk. 2018. Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. In USENIX Security."},{"key":"e_1_3_2_2_10_1","unstructured":"B Bonn\u00e9 ST Peddinti I Bilogrevic and N Taft. 2017. Exploring decision making with Androidtextquoterights runtime permission dialogs using in-context surveys. In SOUPS.  B Bonn\u00e9 ST Peddinti I Bilogrevic and N Taft. 2017. Exploring decision making with Androidtextquoterights runtime permission dialogs using in-context surveys. In SOUPS."},{"key":"e_1_3_2_2_11_1","unstructured":"T Book A Pridgen and DS Wallach. 2013. Longitudinal Analysis of Android Ad Library Permissions. In MOST.  T Book A Pridgen and DS Wallach. 2013. Longitudinal Analysis of Android Ad Library Permissions. In MOST."},{"key":"e_1_3_2_2_12_1","unstructured":"NV Chawla. 2005. Data Mining for Imbalanced Datasets: An Overview.  NV Chawla. 2005. Data Mining for Imbalanced Datasets: An Overview."},{"key":"e_1_3_2_2_13_1","volume-title":"Iconic hyperlinks on e-commerce websites. Applied Ergonomics","author":"Cheng HI","year":"2007","unstructured":"HI Cheng and PE Patterson . 2007. Iconic hyperlinks on e-commerce websites. Applied Ergonomics ( 2007 ). HI Cheng and PE Patterson. 2007. Iconic hyperlinks on e-commerce websites. Applied Ergonomics (2007)."},{"key":"e_1_3_2_2_14_1","volume-title":"Retrieved December","volume":"13","author":"Chollet F","year":"2016","unstructured":"F Chollet . 2016 . Building powerful image classification models using very little data . Retrieved December , Vol. 13 (2016). F Chollet. 2016. Building powerful image classification models using very little data. Retrieved December, Vol. 13 (2016)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"SR Choudhary A Gorla and A Orso. 2015. Automated Test Input Generation for Android: Are We There Yet?. In ASE.  SR Choudhary A Gorla and A Orso. 2015. Automated Test Input Generation for Android: Are We There Yet?. In ASE.","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_2_16_1","unstructured":"AP Felt S Egelman M Finifter D Akhawe DA Wagner etal 2012a. How to Ask for Permission. HotSec (2012).  AP Felt S Egelman M Finifter D Akhawe DA Wagner et al. 2012a. How to Ask for Permission. HotSec (2012)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_2_18_1","unstructured":"Flaticon. 2020\/04\/30. Material. https:\/\/www.flaticon.com\/packs\/material-design.  Flaticon. 2020\/04\/30. Material. https:\/\/www.flaticon.com\/packs\/material-design."},{"key":"e_1_3_2_2_19_1","unstructured":"GATOR. 2018\/08. GATOR. http:\/\/web.cse.ohio-state.edu\/presto\/software\/gator\/.  GATOR. 2018\/08. GATOR. http:\/\/web.cse.ohio-state.edu\/presto\/software\/gator\/."},{"key":"e_1_3_2_2_20_1","unstructured":"C Gatsou A Politis and D Zevgolis. 2011. From icons perception to mobile interaction. In FedCSIS.  C Gatsou A Politis and D Zevgolis. 2011. From icons perception to mobile interaction. In FedCSIS."},{"key":"e_1_3_2_2_21_1","unstructured":"GDPR. 2020\/11\/02. The EU General Data Protection Regulation. https:\/\/gdpr.eu\/.  GDPR. 2020\/11\/02. The EU General Data Protection Regulation. https:\/\/gdpr.eu\/."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"A Gorla I Tavecchia F Gross and A Zeller. 2014. Checking App Behavior Against App Descriptions. In ICSE.  A Gorla I Tavecchia F Gross and A Zeller. 2014. Checking App Behavior Against App Descriptions. In ICSE.","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_2_23_1","volume-title":"The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology","author":"Hanley JA","year":"1982","unstructured":"JA Hanley and BJ McNeil . 1982. The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology ( 1982 ). JA Hanley and BJ McNeil. 1982. The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology (1982)."},{"key":"e_1_3_2_2_24_1","volume-title":"Using simple architectures to outperform deeper and more complex architectures. CoRR","author":"HasanPour SH","year":"2016","unstructured":"SH HasanPour , M Rouhani , M Fayyaz , and M Sabokrou . 2016. Lets keep it simple , Using simple architectures to outperform deeper and more complex architectures. CoRR ( 2016 ). SH HasanPour, M Rouhani, M Fayyaz, and M Sabokrou. 2016. Lets keep it simple, Using simple architectures to outperform deeper and more complex architectures. CoRR (2016)."},{"key":"e_1_3_2_2_25_1","volume-title":"Learning from Imbalanced Data. TKDE","author":"He H","year":"2009","unstructured":"H He and EA Garcia . 2009. Learning from Imbalanced Data. TKDE ( 2009 ). H He and EA Garcia. 2009. Learning from Imbalanced Data. TKDE (2009)."},{"key":"e_1_3_2_2_26_1","unstructured":"A Hotho S Staab and G Stumme. 2003. Ontologies improve text document clustering. In ICDM.  A Hotho S Staab and G Stumme. 2003. Ontologies improve text document clustering. In ICDM."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"JJ Hox M Moerbeek and R Van de Schoot. 2017. Multilevel analysis: Techniques and applications.  JJ Hox M Moerbeek and R Van de Schoot. 2017. Multilevel analysis: Techniques and applications.","DOI":"10.4324\/9781315650982"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"J Huang X Zhang L Tan P Wang and B Liang. 2014. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction. In ICSE.  J Huang X Zhang L Tan P Wang and B Liang. 2014. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction. In ICSE.","DOI":"10.1145\/2568225.2568301"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"S Isherwood. 2009. Graphics and semantics: The relationship between what is seen and what is meant in icon design. In EPCE.  S Isherwood. 2009. Graphics and semantics: The relationship between what is seen and what is meant in icon design. In EPCE.","DOI":"10.1007\/978-3-642-02728-4_21"},{"key":"e_1_3_2_2_30_1","unstructured":"International Standards Organization (ISO). 1984. International standard for safety colours and safety signs: ISO 3864.  International Standards Organization (ISO). 1984. International standard for safety colours and safety signs: ISO 3864."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381944"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"PG Kelley S Consolvo LF Cranor J Jung N Sadeh and D Wetherall. 2012. ?A Conundrum of Permissions: Installing Applications on an Android Smartphone. In FC.  PG Kelley S Consolvo LF Cranor J Jung N Sadeh and D Wetherall. 2012. ?A Conundrum of Permissions: Installing Applications on an Android Smartphone. In FC.","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_2_33_1","unstructured":"R Kohavi. 1995. A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection. In IJCAI.  R Kohavi. 1995. A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection. In IJCAI."},{"key":"e_1_3_2_2_34_1","unstructured":"A Krizhevsky I Sutskever and GE Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NIPS.  A Krizhevsky I Sutskever and GE Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NIPS."},{"key":"e_1_3_2_2_35_1","volume-title":"Static analysis of android apps: A systematic literature review. IST","author":"Li L","year":"2017","unstructured":"L Li , TF Bissyand , M Papadakis , S Rasthofer , A Bartel , D Octeau , JK, and L Traon . 2017a. Static analysis of android apps: A systematic literature review. IST ( 2017 ). L Li, TF Bissyand, M Papadakis, S Rasthofer, A Bartel, D Octeau, JK, and L Traon. 2017a. Static analysis of android apps: A systematic literature review. IST (2017)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"L Li TF Bissyand\u00e9 J Klein and Y Le Traon. 2015. An Investigation into the Use of Common Libraries in Android Apps. In Technique Report.  L Li TF Bissyand\u00e9 J Klein and Y Le Traon. 2015. An Investigation into the Use of Common Libraries in Android Apps. In Technique Report.","DOI":"10.1109\/SANER.2016.52"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971693"},{"key":"e_1_3_2_2_38_1","unstructured":"Y Li Z Yang Y Guo and X Chen. 2017b. DroidBot: A Lightweight UI-guided Test Input Generator for Android. In ICSE-C.  Y Li Z Yang Y Guo and X Chen. 2017b. DroidBot: A Lightweight UI-guided Test Input Generator for Android. In ICSE-C."},{"key":"e_1_3_2_2_39_1","volume":"201","author":"Lin J","unstructured":"J Lin , S Amini , J I Hong , N Sadeh , J Lindqvist , and J Zhang. 201 2. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Ubicomp. J Lin, S Amini, J I Hong, N Sadeh, J Lindqvist, and J Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Ubicomp.","journal-title":"J Zhang."},{"key":"e_1_3_2_2_40_1","unstructured":"RTW Lo B He and I Ounis. 2005. Automatically building a stopword list for an information retrieval system. In DIR.  RTW Lo B He and I Ounis. 2005. Automatically building a stopword list for an information retrieval system. In DIR."},{"key":"e_1_3_2_2_41_1","volume-title":"Sapienz: Multi-objective Automated Testing for Android Applications. In ISSTA.","author":"Mao K","year":"2016","unstructured":"K Mao , M Harman , and Y Jia . 2016 . Sapienz: Multi-objective Automated Testing for Android Applications. In ISSTA. K Mao, M Harman, and Y Jia. 2016. Sapienz: Multi-objective Automated Testing for Android Applications. In ISSTA."},{"key":"e_1_3_2_2_42_1","volume-title":"Regression models for ordinal data. Journal of the Royal Statistical Society: Series B (Methodological)","author":"McCullagh P","year":"1980","unstructured":"P McCullagh . 1980. Regression models for ordinal data. Journal of the Royal Statistical Society: Series B (Methodological) ( 1980 ). P McCullagh. 1980. Regression models for ordinal data. Journal of the Royal Statistical Society: Series B (Methodological) (1980)."},{"key":"e_1_3_2_2_43_1","volume-title":"What's in a name? The role of graphics, functions, and their interrelationships in icon identification. Behavior research methods","author":"McDougall S","year":"2009","unstructured":"S McDougall and S Isherwood . 2009. What's in a name? The role of graphics, functions, and their interrelationships in icon identification. Behavior research methods ( 2009 ). S McDougall and S Isherwood. 2009. What's in a name? The role of graphics, functions, and their interrelationships in icon identification. Behavior research methods (2009)."},{"key":"e_1_3_2_2_44_1","volume-title":"Identifying careless responses in survey data. Psychological methods","author":"Meade AW","year":"2012","unstructured":"AW Meade and SB Craig . 2012. Identifying careless responses in survey data. Psychological methods ( 2012 ). AW Meade and SB Craig. 2012. Identifying careless responses in survey data. Psychological methods (2012)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"K Micinski D Votipka R Stevens N Kofinas ML Mazurek and JS Foster. 2017. User Interactions and Permission Use on Android. In CHI.  K Micinski D Votipka R Stevens N Kofinas ML Mazurek and JS Foster. 2017. User Interactions and Permission Use on Android. In CHI.","DOI":"10.1145\/3025453.3025706"},{"key":"e_1_3_2_2_46_1","volume-title":"WordNet: a lexical database for English. COMMUN ACM","author":"Miller GA","year":"1995","unstructured":"GA Miller . 1995. WordNet: a lexical database for English. COMMUN ACM ( 1995 ). GA Miller. 1995. WordNet: a lexical database for English. COMMUN ACM (1995)."},{"key":"e_1_3_2_2_47_1","volume-title":"Did App Privacy Improve After the GDPR? IEEE Secur Priv","author":"Momen N","year":"2019","unstructured":"N Momen , M Hatamian , and L Fritsch . 2019. Did App Privacy Improve After the GDPR? IEEE Secur Priv ( 2019 ). N Momen, M Hatamian, and L Fritsch. 2019. Did App Privacy Improve After the GDPR? IEEE Secur Priv (2019)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"K Moran M Tufano C Bernal-C\u00e1rdenas M Linares-V\u00e1squez G Bavota C Vendome M Di Penta and D Poshyvanyk. 2018. MDroid+: A Mutation Testing Framework for Android. In ICSE.  K Moran M Tufano C Bernal-C\u00e1rdenas M Linares-V\u00e1squez G Bavota C Vendome M Di Penta and D Poshyvanyk. 2018. MDroid+: A Mutation Testing Framework for Android. In ICSE.","DOI":"10.1145\/3183440.3183492"},{"key":"e_1_3_2_2_49_1","volume-title":"Short Text","author":"Nguyen DC","unstructured":"DC Nguyen , E Derr , M Backes , and S Bugiel . 2019. Short Text , Large Effect : Measuring the Impact of User Reviews on Android App Security & Privacy. In SP. DC Nguyen, E Derr, M Backes, and S Bugiel. 2019. Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. In SP."},{"key":"e_1_3_2_2_50_1","volume-title":"SunWeb: User interface design for Sun Microsystem's internal web. Computer Networks and ISDN Systems","author":"Nielsen J","year":"1995","unstructured":"J Nielsen and D Sano . 1995. SunWeb: User interface design for Sun Microsystem's internal web. Computer Networks and ISDN Systems ( 1995 ). J Nielsen and D Sano. 1995. SunWeb: User interface design for Sun Microsystem's internal web. Computer Networks and ISDN Systems (1995)."},{"key":"e_1_3_2_2_51_1","unstructured":"D Norman. 2014. Things that make us smart: Defending human attributes in the age of the machine.  D Norman. 2014. Things that make us smart: Defending human attributes in the age of the machine."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"D Octeau D Luchaup M Dering S Jha and P McDaniel. 2015. Composite constant propagation: Application to android inter-component communication analysis. In ICSE.  D Octeau D Luchaup M Dering S Jha and P McDaniel. 2015. Composite constant propagation: Application to android inter-component communication analysis. In ICSE.","DOI":"10.1109\/ICSE.2015.30"},{"key":"e_1_3_2_2_53_1","unstructured":"D Octeau P McDaniel S Jha A Bartel E Bodden J Klein and Y Le Traon. 2013. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In USENIX Security.  D Octeau P McDaniel S Jha A Bartel E Bodden J Klein and Y Le Traon. 2013. Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In USENIX Security."},{"key":"e_1_3_2_2_54_1","volume-title":"PrivOnto: A semantic framework for the analysis of privacy policies. Semantic Web","author":"Oltramari A","year":"2017","unstructured":"A Oltramari , D Piraviperumal , F Schaub , S Wilson , S Cherivirala , TB Norton , NC Russell , P Story , J Reidenberg , and N Sadeh . 2017. PrivOnto: A semantic framework for the analysis of privacy policies. Semantic Web ( 2017 ). A Oltramari, D Piraviperumal, F Schaub, S Wilson, S Cherivirala, TB Norton, NC Russell, P Story, J Reidenberg, and N Sadeh. 2017. PrivOnto: A semantic framework for the analysis of privacy policies. Semantic Web (2017)."},{"key":"e_1_3_2_2_55_1","unstructured":"X Pan Y Cao X Du B He G Fang R Shao and Y Chen. 2018. FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. In USENIX Security.  X Pan Y Cao X Du B He G Fang R Shao and Y Chen. 2018. FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. In USENIX Security."},{"key":"e_1_3_2_2_56_1","volume-title":"WHYPER: Towards Automating Risk Assessment of Mobile Applications. In SEC.","author":"Pandita R","year":"2013","unstructured":"R Pandita , X Xiao , W Yang , W Enck , and T Xie . 2013 . WHYPER: Towards Automating Risk Assessment of Mobile Applications. In SEC. R Pandita, X Xiao, W Yang, W Enck, and T Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In SEC."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"RC. Prati GEAPA Batista and MC Monard. 2004. Class Imbalances versus Class Overlapping: An Analysis of a Learning System Behavior. In MICAI.  RC. Prati GEAPA Batista and MC Monard. 2004. Class Imbalances versus Class Overlapping: An Analysis of a Learning System Behavior. In MICAI.","DOI":"10.1007\/978-3-540-24694-7_32"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"F Roesner T Kohno A Moshchuk B Parno HJ Wang and C Cowan. 2012. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In SP.  F Roesner T Kohno A Moshchuk B Parno HJ Wang and C Cowan. 2012. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In SP.","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"A Rountev and D Yan. 2014. Static Reference Analysis for GUI Objects in Android Software. In CGO.  A Rountev and D Yan. 2014. Static Reference Analysis for GUI Objects in Android Software. In CGO.","DOI":"10.1145\/2544137.2544159"},{"key":"e_1_3_2_2_61_1","unstructured":"T Salimans I Goodfellow W Zaremba V Cheung A Radford and X Chen. 2016. Improved techniques for training gans. In NIPS.  T Salimans I Goodfellow W Zaremba V Cheung A Radford and X Chen. 2016. Improved techniques for training gans. In NIPS."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1965.1053799"},{"key":"e_1_3_2_2_63_1","volume-title":"Using virtual presence and survey instructions to minimize careless responding on Internet-based surveys. Computers in Human Behavior","author":"Ward MK","year":"2015","unstructured":"MK Ward and SB Pond III. 2015. Using virtual presence and survey instructions to minimize careless responding on Internet-based surveys. Computers in Human Behavior ( 2015 ). MK Ward and SB Pond III. 2015. Using virtual presence and survey instructions to minimize careless responding on Internet-based surveys. Computers in Human Behavior (2015)."},{"key":"e_1_3_2_2_64_1","volume-title":"Hierarchical grouping to optimize an objective function. Journal of the American statistical association","author":"Ward H","year":"1963","unstructured":"Joe H Ward Jr . 1963. Hierarchical grouping to optimize an objective function. Journal of the American statistical association ( 1963 ). Joe H Ward Jr. 1963. Hierarchical grouping to optimize an objective function. Journal of the American statistical association (1963)."},{"key":"e_1_3_2_2_65_1","unstructured":"T Watanabe M Akiyama T Sakai and T Mori. 2015. Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. In SOUPS.  T Watanabe M Akiyama T Sakai and T Mori. 2015. Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. In SOUPS."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"D Wermke N Huaman Y Acar B Reaves P Traynor and S Fahl. 2018. A Large Scale Investigation of Obfuscation Use in Google Play. In ACSAC.  D Wermke N Huaman Y Acar B Reaves P Traynor and S Fahl. 2018. A Large Scale Investigation of Obfuscation Use in Google Play. In ACSAC.","DOI":"10.1145\/3274694.3274726"},{"key":"e_1_3_2_2_67_1","volume-title":"The use of icons and labels in an end user application program: an empirical study of learning and retention. Behaviour & Information Technology","author":"Wiedenbeck S","year":"1999","unstructured":"S Wiedenbeck . 1999. The use of icons and labels in an end user application program: an empirical study of learning and retention. Behaviour & Information Technology ( 1999 ). S Wiedenbeck. 1999. The use of icons and labels in an end user application program: an empirical study of learning and retention. Behaviour & Information Technology (1999)."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"S Xi S Yang X Xiao Y Yao Y Xiong F Xu H Wang P Gao Z Liu F Xu etal 2019. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. In CCS.  S Xi S Yang X Xiao Y Yao Y Xiong F Xu H Wang P Gao Z Liu F Xu et al. 2019. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. In CCS.","DOI":"10.1145\/3319535.3363193"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"X Xiao X Wang Z Cao H Wang and P Gao. 2019. IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. In ICSE.  X Xiao X Wang Z Cao H Wang and P Gao. 2019. IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. In ICSE.","DOI":"10.1109\/ICSE.2019.00041"},{"key":"e_1_3_2_2_70_1","volume-title":"Self-training with Noisy Student improves ImageNet classification. arXiv preprint arXiv:1911.04252","author":"Xie Q","year":"2019","unstructured":"Q Xie , E Hovy , MT Luong , and QV Le . 2019. Self-training with Noisy Student improves ImageNet classification. arXiv preprint arXiv:1911.04252 ( 2019 ). Q Xie, E Hovy, MT Luong, and QV Le. 2019. Self-training with Noisy Student improves ImageNet classification. arXiv preprint arXiv:1911.04252 (2019)."},{"key":"e_1_3_2_2_71_1","volume-title":"PackerGrind: An Adaptive Unpacking System for Android Apps","author":"Xue L","year":"2020","unstructured":"L Xue , H Zhou , X Luo , L Yu , D Wu , Y Zhou , and X Ma . 2020. PackerGrind: An Adaptive Unpacking System for Android Apps . IEEE Trans. Softw. Eng . ( 2020 ). L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, and X Ma. 2020. PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Softw. Eng. (2020)."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"S Yang D Yan H Wu Y Wang and A Rountev. 2015. Static Control-flow Analysis of User-driven Callbacks in Android Applications. In ICSE.  S Yang D Yan H Wu Y Wang and A Rountev. 2015. Static Control-flow Analysis of User-driven Callbacks in Android Applications. In ICSE.","DOI":"10.1109\/ICSE.2015.31"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"crossref","unstructured":"L Yu X Luo C Qian and S Wang. 2016. Revisiting the Description-to-Behavior Fidelity in Android Applications. In SANER.  L Yu X Luo C Qian and S Wang. 2016. Revisiting the Description-to-Behavior Fidelity in Android Applications. In SANER.","DOI":"10.1109\/SANER.2016.67"},{"key":"e_1_3_2_2_74_1","unstructured":"C Zauner. 2010. Implementation and benchmarking of perceptual image hash functions. (2010).  C Zauner. 2010. Implementation and benchmarking of perceptual image hash functions. (2010)."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"crossref","unstructured":"H Zhou T Chen H Wang L Yu X Luo T Wang and W Zhang. 2020. UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. In ASE.  H Zhou T Chen H Wang L Yu X Luo T Wang and W Zhang. 2020. UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. In ASE.","DOI":"10.1145\/3324884.3416642"},{"key":"e_1_3_2_2_76_1","volume":"201","author":"Zimmeck S","unstructured":"S Zimmeck , Z Wang , L Zou , R Iyengar , B Liu , F Schaub , S Wilson , N Sadeh , S Bellovin , and J Reidenberg. 201 7. Automated analysis of privacy requirements for mobile apps. In NDSS. S Zimmeck, Z Wang, L Zou, R Iyengar, B Liu, F Schaub, S Wilson, N Sadeh, S Bellovin, and J Reidenberg. 2017. Automated analysis of privacy requirements for mobile apps. In NDSS.","journal-title":"J Reidenberg."}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437511","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":76,"alternative-id":["10.1145\/3433210.3437511","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3437511","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}