{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:36:00Z","timestamp":1762508160982},"reference-count":28,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transfun.2019eap1128","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:10:56Z","timestamp":1593555056000},"page":"906-916","source":"Crossref","is-referenced-by-count":1,"title":["Contextual Integrity Based Android Privacy Data Protection System"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Fan","family":"WU","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"He","family":"LI","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Wenhao","family":"FAN","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Bihua","family":"TANG","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Yuanan","family":"LIU","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] A. Hols, \u201cShare of android os of global smartphone shipments from 1st quarter 2011 to 2nd quarter 2018,\u201d 2019. https:\/\/www.statista.com\/statistics\/236027"},{"key":"2","unstructured":"[2] \u201c2018 china mobile phone security status report,\u201d 2018. http:\/\/zt.360.cn\/1101061855.php?dtid=1101061451&amp;did=491398428"},{"key":"3","unstructured":"[3] H. Nissenbaum, \u201cPrivacy as contextual integrity,\u201d Washington Law Review, vol.79, no.1, pp.119-157, 2004."},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] G. Canfora, E. Medvet, F. Mercaldo, and C.A. Visaggio, \u201cDetecting android malware using sequences of system calls,\u201d Proc. 3rd International Workshop on Software Development Lifecycle for Mobile, pp.13-20, ACM, 2015. 10.1145\/2804345.2804349","DOI":"10.1145\/2804345.2804349"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] S.K. Dash, G. Suarez-Tangil, S. Khan, K. Tam, M. Ahmadi, J. Kinder, and L. Cavallaro, \u201cDroidscribe: Classifying android malware based on runtime behavior,\u201d 2016 IEEE Security and Privacy Workshops (SPW), pp.252-261, IEEE, 2016. 10.1109\/spw.2016.25","DOI":"10.1109\/SPW.2016.25"},{"key":"6","unstructured":"[6] Z. Aung and W. Zaw, \u201cPermission-based android malware detection,\u201d International Journal of Scientific &amp; Technology Research, vol.2, no.3, pp.228-234, 2013."},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye, \u201cSignificant permission identification for machine-learning-based android malware detection,\u201d IEEE Trans. Ind. Informat., vol.14, no.7, pp.3216-3225, 2018. 10.1109\/tii.2017.2789219","DOI":"10.1109\/TII.2017.2789219"},{"key":"8","unstructured":"[8] J. Lin, B. Liu, N. Sadeh, and J.I. Hong, \u201cModeling users&apos; mobile app privacy preferences: Restoring usability in a sea of permission settings,\u201d 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp.199-212, 2014."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] P. Wijesekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman, D. Wagner, and K. Beznosov, \u201cThe feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences,\u201d 2017 IEEE Symposium on Security and Privacy (SP), pp.1077-1093, IEEE, 2017. 10.1109\/sp.2017.51","DOI":"10.1109\/SP.2017.51"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S. Calo, D. Verma, S. Chakraborty, E. Bertino, E. Lupu, and G. Cirincione, \u201cSelf-generation of access control policies,\u201d Proc. 23nd ACM on Symposium on Access Control Models and Technologies, pp.39-47, ACM, 2018. 10.1145\/3205977.3205995","DOI":"10.1145\/3205977.3205995"},{"key":"11","unstructured":"[11] Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang, \u201cUipicker: User-input privacy identification in mobile applications,\u201d 24th USENIX Security Symposium (USENIX Security 15), pp.993-1008, 2015."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] A. Barth, A. Datta, J.C. Mitchell, and H. Nissenbaum, \u201cPrivacy and contextual integrity: Framework and applications,\u201d 2006 IEEE Symposium on Security and Privacy (S&amp;P&apos;06), pp.15-pp, IEEE, 2006. 10.1109\/sp.2006.32","DOI":"10.1109\/SP.2006.32"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] Y. Krupa and L. Vercouter, \u201cHandling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework,\u201d Web Intelligence and Agent Systems: An International Journal, vol.10, no.1, pp.105-116, 2012. 10.3233\/wia-2012-0235","DOI":"10.3233\/WIA-2012-0235"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] N. Criado and J.M. Such, \u201cImplicit contextual integrity in online social networks,\u201d Information Sciences, vol.325, pp.48-69, 2015. 10.1016\/j.ins.2015.07.013","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] H. Nissenbaum, \u201cA contextual approach to privacy online,\u201d Daedalus, vol.140, no.4, pp.32-48, 2011. 10.1162\/daed_a_00113","DOI":"10.1162\/DAED_a_00113"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] G. Hull, H.R. Lipford, and C. Latulipe, \u201cContextual gaps: Privacy issues on facebook,\u201d Ethics and Information Technology, vol.13, no.4, pp.289-302, 2011. 10.1007\/s10676-010-9224-8","DOI":"10.1007\/s10676-010-9224-8"},{"key":"17","unstructured":"[17] X. Pan, Y. Cao, X. Du, B. He, G. Fang, R. Shao, and Y. Chen, \u201cFlowcog: Context-aware semantics extraction and analysis of information flow leaks in android apps,\u201d 27th USENIX Security Symposium (USENIX Security 18), pp.1669-1685, 2018."},{"key":"18","unstructured":"[18] P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, \u201cAndroid permissions remystified: A field study on contextual integrity,\u201d 24th USENIX Security Symposium (USENIX Security 15), pp.499-514, 2015."},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] K. Olejnik, I. Dacosta, J.S. Machado, K. Huguenin, M.E. Khan, and J.P. Hubaux, \u201cSmarPer: Context-aware and automatic runtime-permissions for mobile devices,\u201d 2017 IEEE Symposium on Security and Privacy (SP), pp.1058-1076, IEEE, 2017. 10.1109\/sp.2017.25","DOI":"10.1109\/SP.2017.25"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] B. Rashidi, C. Fung, A. Nguyen, T. Vu, and E. Bertino, \u201cAndroid user privacy preserving through crowdsourcing,\u201d IEEE Trans. Inf. Forensics Security, vol.13, no.3, pp.773-787, 2018. 10.1109\/tifs.2017.2767019","DOI":"10.1109\/TIFS.2017.2767019"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Nauman, S. Khan, and X. Zhang, \u201cApex: Extending android permission model and enforcement with user-defined runtime constraints,\u201d Proc. 5th ACM Symposium on Information, Computer and Communications Security, pp.328-332, 2010. 10.1145\/1755688.1755732","DOI":"10.1145\/1755688.1755732"},{"key":"22","unstructured":"[22] \u201cAndroid permissions overview,\u201d 2019. https:\/\/developer.android.google.cn\/guide\/topics\/permissions\/overview"},{"key":"23","unstructured":"[23] D.X.D. A, \u201cXposed framework hub.\u201d"},{"key":"24","unstructured":"[24] K.W.Y. Au, Y.F. Zhou, Z. Huang, and D. Lie, \u201cPScout: Analyzing the android permission specification,\u201d Proc. 2012 ACM conference on Computer and communications security, pp.217-228, ACM, 2012. 10.1145\/2382196.2382222"},{"key":"25","unstructured":"[25] A. Developers, \u201cUi\/application exerciser monkey.\u201d"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] S.H. Kim, H.G. Ko, I.Y. Ko, and D. Choi, \u201cEffects of contextual properties on users&apos; privacy preferences in mobile computing environments,\u201d 2015 IEEE Trustcom\/BigDataSE\/ISPA, pp.507-514, IEEE, 2015. 10.1109\/trustcom.2015.413","DOI":"10.1109\/Trustcom.2015.413"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, and C. Siemens, \u201cDrebin: Effective and explainable detection of android malware in your pocket,\u201d Ndss, pp.23-26, 2014. 10.14722\/ndss.2014.23247","DOI":"10.14722\/ndss.2014.23247"},{"key":"28","unstructured":"[28] N. Developers, \u201cEmmagee-a practical, handy performance test tool for specified android app.\u201d"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/7\/E103.A_2019EAP1128\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T03:36:27Z","timestamp":1593833787000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/7\/E103.A_2019EAP1128\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":28,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019eap1128","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}