{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:03:23Z","timestamp":1776107003664,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528543","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"104-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["PAcT: Detecting and Classifying Privacy Behavior of Android Applications"],"prefix":"10.1145","author":[{"given":"Vijayanta","family":"Jain","sequence":"first","affiliation":[{"name":"University of Maine, Orono, ME, USA"}]},{"given":"Sanonda Datta","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of Maine, Orono, ME, USA"}]},{"given":"Sepideh","family":"Ghanavati","sequence":"additional","affiliation":[{"name":"University of Maine, Orono, ME, USA"}]},{"given":"Sai Teja","family":"Peddinti","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Collin","family":"McMillan","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Machine Learning. 2091--2100","author":"Allamanis Miltiadis","year":"2016","unstructured":"Miltiadis Allamanis , Hao Peng , and Charles Sutton . 2016 . A convolutional attention network for extreme summarization of source code . In International Conference on Machine Learning. 2091--2100 . Miltiadis Allamanis, Hao Peng, and Charles Sutton. 2016. A convolutional attention network for extreme summarization of source code. In International Conference on Machine Learning. 2091--2100."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Learning Representations","author":"Alon Uri","year":"2019","unstructured":"Uri Alon , Shaked Brody , Omer Levy , and Eran Yahav . 2019 . code2seq: Generating sequences from structured representations of code . International Conference on Learning Representations (2019). Uri Alon, Shaked Brody, Omer Levy, and Eran Yahav. 2019. code2seq: Generating sequences from structured representations of code. International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098247"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"European Union. 2021 (accessed Oct 1st 2021). The EU General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/. European Union. 2021 (accessed Oct 1st 2021). The EU General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/.","DOI":"10.1093\/oso\/9780198826491.003.0001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_8_1","unstructured":"Government of California. 2021 (accessed Oct 1st 2021). California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa . Government of California. 2021 (accessed Oct 1st 2021). California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106608"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence .","author":"Hosseini Mitra Bokaei","year":"2018","unstructured":"Mitra Bokaei Hosseini , Xue Qin , Xiaoyin Wang , and Jianwei Niu . 2018 . Extracting information types from android layout code using sequence to sequence learning . In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence . Mitra Bokaei Hosseini, Xue Qin, Xiaoyin Wang, and Jianwei Niu. 2018. Extracting information types from android layout code using sequence to sequence learning. In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence ."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_2_1_13_1","volume-title":"24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 977--992.","author":"Huang Jianjun","unstructured":"Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , and Guofei Jiang . 2015. $$SUPOR$$ : Precise and scalable sensitive user input detection for android apps . In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 977--992. Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. $$SUPOR$$: Precise and scalable sensitive user input detection for android apps. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 977--992."},{"key":"e_1_3_2_1_14_1","volume-title":"Sepideh Ghanavati, and Sai Teja Peddinti.","author":"Jain Vijayanta","year":"2021","unstructured":"Vijayanta Jain , Sanonda Datta Gupta , Sepideh Ghanavati, and Sai Teja Peddinti. 2021 . PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions . (2021). Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, and Sai Teja Peddinti. 2021. PriGen: Towards Automated Translation of Android Applications' Code to Privacy Captions. (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155583"},{"key":"e_1_3_2_1_16_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_17_1","unstructured":"Jan-Christoph Klie. 2018. INCEpTION: Interactive machine-assisted annotation.. In DESIRES. 105. Jan-Christoph Klie. 2018. INCEpTION: Interactive machine-assisted annotation.. In DESIRES. 105."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00056"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389268"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449209"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00024"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2045"},{"key":"e_1_3_2_1_25_1","volume-title":"Privacy Consistency Analyzer for Android Applications. In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE) . IEEE, 28--33","author":"Maitra Sayan","year":"2018","unstructured":"Sayan Maitra , Bohyun Suh , and Sepideh Ghanavati . 2018 . Privacy Consistency Analyzer for Android Applications. In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE) . IEEE, 28--33 . Sayan Maitra, Bohyun Suh, and Sepideh Ghanavati. 2018. Privacy Consistency Analyzer for Android Applications. In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE) . IEEE, 28--33."},{"key":"e_1_3_2_1_26_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$","author":"Mhaidli Abraham H","year":"2019","unstructured":"Abraham H Mhaidli , Yixin Zou , and Florian Schaub . 2019 . \" We can't live without them!\" app developers' adoption of ad networks and their considerations of consumer risks . In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019). 225--244. Abraham H Mhaidli, Yixin Zou, and Florian Schaub. 2019. \" We can't live without them!\" app developers' adoption of ad networks and their considerations of consumer risks. In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019). 225--244."},{"key":"e_1_3_2_1_27_1","volume-title":"2016 AAAI Fall Symposium Series (AAAI '16)","author":"Bokaei Hosseini Mitra","year":"2016","unstructured":"Hosseini Mitra Bokaei , SudarshanzWadkar, Breaux Travis D, and Jianwei Niu . 2016 . Lexical similarity of information type hypernyms, meronyms and synonyms in privacy policies . In 2016 AAAI Fall Symposium Series (AAAI '16) . Hosseini Mitra Bokaei, SudarshanzWadkar, Breaux Travis D, and Jianwei Niu. 2016. Lexical similarity of information type hypernyms, meronyms and synonyms in privacy policies. In 2016 AAAI Fall Symposium Series (AAAI '16)."},{"key":"e_1_3_2_1_28_1","volume-title":"Uipicker: User-input privacy identification in mobile applications. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 993--1008.","author":"Nan Yuhong","year":"2015","unstructured":"Yuhong Nan , Min Yang , Zhemin Yang , Shunfan Zhou , Guofei Gu , and XiaoFeng Wang . 2015 . Uipicker: User-input privacy identification in mobile applications. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 993--1008. Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and XiaoFeng Wang. 2015. Uipicker: User-input privacy identification in mobile applications. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15) . 993--1008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.26"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743384.1743478"},{"key":"e_1_3_2_1_31_1","volume-title":"Narseo Vallina-Rodriguez, Irwin Reyes, \u00c1lvaro Feal, and Serge Egelman.","author":"Okoyomon Ehimare","year":"2019","unstructured":"Ehimare Okoyomon , Nikita Samarin , Primal Wijesekera , Amit Elazari Bar On , Narseo Vallina-Rodriguez, Irwin Reyes, \u00c1lvaro Feal, and Serge Egelman. 2019 . On the ridiculousness of notice and consent: Contradictions in app privacy policies. (2019). Ehimare Okoyomon, Nikita Samarin, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Irwin Reyes, \u00c1lvaro Feal, and Serge Egelman. 2019. On the ridiculousness of notice and consent: Contradictions in app privacy policies. (2019)."},{"key":"e_1_3_2_1_32_1","volume-title":"Presented as part of the 22nd $$USENIX$$ Security Symposium ($$USENIX$$ Security 13) . 527--542.","author":"Pandita Rahul","unstructured":"Rahul Pandita , Xusheng Xiao , Wei Yang , William Enck , and Tao Xie . 2013. $$WHYPER$$ : Towards Automating Risk Assessment of Mobile Applications . In Presented as part of the 22nd $$USENIX$$ Security Symposium ($$USENIX$$ Security 13) . 527--542. Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. $$WHYPER$$: Towards Automating Risk Assessment of Mobile Applications. In Presented as part of the 22nd $$USENIX$$ Security Symposium ($$USENIX$$ Security 13) . 527--542."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355584"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435380"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688130.2688134"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897720"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the Demonstrations Session at EACL","author":"Stenetorp Pontus","year":"2012","unstructured":"Pontus Stenetorp , Sampo Pyysalo , Goran Topi\u00e7 , Tomoko Ohta , Sophia Ananiadou , and Jun'ichi Tsujii . 2012 . brat: a Web-based Tool for NLP-Assisted Text Annotation . In Proceedings of the Demonstrations Session at EACL 2012. Association for Computational Linguistics, Avignon, France. Pontus Stenetorp, Sampo Pyysalo, Goran Topi\u00e7, Tomoko Ohta, Sophia Ananiadou, and Jun'ichi Tsujii. 2012. brat: a Web-based Tool for NLP-Assisted Text Annotation. In Proceedings of the Demonstrations Session at EACL 2012. Association for Computational Linguistics, Avignon, France."},{"key":"e_1_3_2_1_41_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112. Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104--3112."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639339"},{"key":"e_1_3_2_1_45_1","volume-title":"Android Application Security","author":"Zhang Mu","unstructured":"Mu Zhang and Heng Yin . 2016. Automatic Generation of Security-Centric Descriptions for Android Apps . In Android Application Security . Springer , 77--98. Mu Zhang and Heng Yin. 2016. Automatic Generation of Security-Centric Descriptions for Android Apps. In Android Application Security . Springer, 77--98."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Sebastian Zimmeck Rafael Goldstein and David Baraka. 2021 a. PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. (2021). Sebastian Zimmeck Rafael Goldstein and David Baraka. 2021 a. PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. (2021).","DOI":"10.14722\/ndss.2021.24100"},{"key":"e_1_3_2_1_47_1","volume-title":"PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. In 28th Network & Distributed System Security Symposium (NDSS 2021)","author":"Zimmeck Sebastian","year":"2021","unstructured":"Sebastian Zimmeck , Rafael Goldstein , and David Baraka . 2021 b . PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. In 28th Network & Distributed System Security Symposium (NDSS 2021) (NDSS 2021). Internet Society, Online. Sebastian Zimmeck, Rafael Goldstein, and David Baraka. 2021 b. PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. In 28th Network & Distributed System Security Symposium (NDSS 2021) (NDSS 2021). Internet Society, Online."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":48,"alternative-id":["10.1145\/3507657.3528543","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528543","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}