Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105577
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorYang, Y-
dc.creatorLuo, W-
dc.creatorPei, Y-
dc.creatorPan, M-
dc.creatorZhang, T-
dc.date.accessioned2024-04-15T07:35:09Z-
dc.date.available2024-04-15T07:35:09Z-
dc.identifier.isbn978-1-7281-2607-4-
dc.identifier.urihttp://hdl.handle.net/10397/105577-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights©2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication Y. Yang, W. Luo, Y. Pei, M. Pan and T. Zhang, "Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class Loading," 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, 2019, pp. 149-158 is available at https://doi.org/10.1109/COMPSAC.2019.00029.en_US
dc.subjectConstraint Solvingen_US
dc.subjectDynamic Class Loadingen_US
dc.subjectPrivacy Leakage Detectionen_US
dc.subjectTaint Analysisen_US
dc.titleExecution enhanced static detection of Android privacy leakage hidden by dynamic class loadingen_US
dc.typeConference Paperen_US
dc.identifier.spage149-
dc.identifier.epage158-
dc.identifier.volume1-
dc.identifier.doi10.1109/COMPSAC.2019.00029-
dcterms.abstractMobile apps often need to collect and/or access sensitive user information to fulfill their purposes, but they may also leak such information either intentionally or accidentally, causing financial and/or emotional damages to users. In the past few years, researchers have developed various techniques to detect privacy leakage in mobile apps, however, such detection remains a challenging task when privacy leakage is implemented via dynamic class loading (DCL). In this work, we propose the DL 2 technique that enhances static analysis with dynamic app execution to effectively detect privacy leakage implemented via DCL in Android apps. To evaluate DL2, we construct a benchmark of 88 subject apps with 2578 injected privacy leaks and apply DL 2 to the apps. DL 2 was able to detect 1073, or 42%, of the leaks, significantly outperforming existing state-of-the-art privacy leakage detection tools.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitation2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 15-19 July 2019, Milwaukee, Wisconsin, v. 1, p. 149-158-
dcterms.issued2019-
dc.identifier.scopus2-s2.0-85072711203-
dc.relation.conferenceIEEE Annual International Computer Software and Applications Conference [COMPSAC]-
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-0570en_US
dc.description.fundingSourceRGCen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextNational Natural Science Foundation of China; The Hong Kong Polytechnic University internal funden_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS23462497en_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Pei_Execution_Enhanced_Static.pdfPre-Published version1.09 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

82
Last Week
8
Last month
Citations as of Nov 30, 2025

Downloads

108
Citations as of Nov 30, 2025

SCOPUSTM   
Citations

13
Citations as of Dec 19, 2025

WEB OF SCIENCETM
Citations

12
Citations as of Dec 18, 2025

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.