TY - STD TI - Amazon shopping application. https://goo.gl/aHNvpy. UR - https://goo.gl/aHNvpy ID - ref1 ER - TY - STD TI - Avdiienko, V, Kuznetsov K, Rommelfanger I, Rau A, Gorla A, Zeller A (2017) Detecting behavior anomalies in graphical user interfaces In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), 201–203, Buenos Aires. https://doi.org/10.1109/ICSE-C.2017.130. ID - ref2 ER - TY - STD TI - Baccianella, S, Esuli A, Sebastiani F (2010) Sentiwordnet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining. In: Chair NCC, Choukri K, Maegaard B, Mariani J, Odijk J, Piperidis S, Rosner M, Tapias D (eds)Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC’10).. European Language Resources Association (ELRA). ID - ref3 ER - TY - CHAP AU - Budianto, E. AU - Jia, Y. AU - Dong, X. AU - Saxena, P. AU - Liang, Z. ED - Stavrou, A. ED - Bos, H. ED - Portokalidis, G. PY - 2014 DA - 2014// TI - You can’t be me: Enabling trusted paths and user sub-origins in web browsers BT - Research in Attacks, Intrusions and Defenses PB - Springer International Publishing CY - Cham ID - Budianto2014 ER - TY - CHAP AU - Bursztein, E. AU - Soman, C. AU - Boneh, D. AU - Mitchell, J. C. PY - 2012 DA - 2012// TI - Sessionjuggler: Secure web login from an untrusted terminal using session hijacking BT - Proceedings of the 21st International Conference on World Wide Web PB - WWW ’12, ACM CY - New York UR - https://doi.org/10.1145/2187836.2187880 DO - 10.1145/2187836.2187880 ID - Bursztein2012 ER - TY - JOUR AU - Cunningham, P. AU - Delany, S. J. PY - 2007 DA - 2007// TI - K-nearest neighbour classifiers JO - Mult Classifier Syst VL - 34 ID - Cunningham2007 ER - TY - CHAP AU - Enck, W. AU - Gilbert, P. AU - Chun, B. G. AU - Cox, L. P. AU - Jung, J. AU - McDaniel, P. AU - Sheth, A. N. PY - 2010 DA - 2010// TI - Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones BT - Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation PB - OSDI’10, USENIX Association CY - Berkeley ID - Enck2010 ER - TY - STD TI - Finkel, JR, Grenager T, Manning C (2005) Incorporating non-local information into information extraction systems by gibbs sampling In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, 363–370.. ACL ’05, Association for Computational Linguistics. https://doi.org/10.3115/1219840.1219885. ID - ref8 ER - TY - STD TI - Gabrilovich, E, Markovitch S (2007) Computing semantic relatedness using wikipedia-based explicit semantic analysis In: Proceedings of the 20th International Joint Conference on Artifical Intelligence, 1606–1611.. IJCAI’07, Morgan Kaufmann Publishers Inc. https://dl.acm.org/citation.cfm?id=1625275.1625535. UR - https://dl.acm.org/citation.cfm?id=1625275.1625535 ID - ref9 ER - TY - STD TI - Huang, J, Li Z, Xiao X, Wu Z, Lu K, Zhang X, Jiang G (2015) SUPOR: Precise and scalable sensitive user input detection for android apps In: 24th USENIX Security Symposium (USENIX Security 15), 977–992.. USENIX Association. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang. UR - https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang ID - ref10 ER - TY - STD TI - Jurafsky, D, Martin JH (2000) Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. (1st ed.). Prentice Hall PTR. ID - ref11 ER - TY - CHAP AU - Klein, D. AU - Manning, C. D. PY - 2002 DA - 2002// TI - Fast exact inference with a factored model for natural language parsing BT - Proceedings of the 15th International Conference on Neural Information Processing Systems PB - NIPS’02, MIT Press CY - Cambridge ID - Klein2002 ER - TY - CHAP AU - Kong, D. AU - Cen, L. AU - Jin, H. PY - 2015 DA - 2015// TI - Autoreb: Automatically understanding the review-to-behavior fidelity in android applications BT - Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security PB - CCS ’15, ACM CY - New York ID - Kong2015 ER - TY - STD TI - LDC: English gigaword fifth edition. https://catalog.ldc.upenn.edu/LDC2011T07. UR - https://catalog.ldc.upenn.edu/LDC2011T07 ID - ref14 ER - TY - STD TI - Li, X, Hu H, Bai G, Jia Y, Liang Z, Saxena P (2014) Droidvault: A trusted data vault for android devices In: 2014 19th International Conference on Engineering of Complex Computer Systems, 29–38. https://doi.org/10.1109/ICECCS.2014.13. ID - ref15 ER - TY - CHAP AU - Liao, X. AU - Yuan, K. AU - Wang, X. AU - Li, Z. AU - Xing, L. AU - Beyah, R. PY - 2016 DA - 2016// TI - Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence BT - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security PB - CCS ’16, ACM CY - New York ID - Liao2016 ER - TY - STD TI - Lu, K, Li Z, Kemerlis VP, Wu Z, Lu L, Zheng C, Qian Z, Lee W, Jiang G (2015) Checking more and alerting less: Detecting privacy leakages via enhanced data-flow analysis and peer voting In: Proceedings of the Network and Distributed System Security Symposium (NDSS). ID - ref17 ER - TY - STD TI - Mannan, M, van Oorschot PC (2007) Using a personal device to strengthen password authentication from an untrusted computer In: Financial Cryptography and Data Security, 88–103.. Springer. ID - ref18 ER - TY - STD TI - Manning, C, Surdeanu M, Bauer J, Finkel J, Bethard S, McClosky D (2014) The stanford corenlp natural language processing toolkit In: Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, 55–60.. Association for Computational Linguistics. https://doi.org/10.3115/v1/P14-5010, http://www.aclweb.org/anthology/P14-5010. UR - http://www.aclweb.org/anthology/P14-5010 ID - ref19 ER - TY - STD TI - Mikolov, T, Sutskever I, Chen K, Corrado G, Dean J (2013) Distributed representations of words and phrases and their compositionality In: Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2, 3111–3119.. NIPS’13, Curran Associates Inc. http://dl.acm.org/citation.cfm?id=2999792.2999959. UR - http://dl.acm.org/citation.cfm?id=2999792.2999959 ID - ref20 ER - TY - STD TI - Nan, Y, Yang M, Yang Z, Zhou S, Gu G, Wang X (2015) Uipicker: User-input privacy identification in mobile applications In: 24th USENIX Security Symposium (USENIX Security 15), 993–1008.. USENIX Association. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan. UR - https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan ID - ref21 ER - TY - STD TI - Olson, DL, Delen D (2008) Advanced data mining techniques. Springer Science & Business Media. ID - ref22 ER - TY - STD TI - Oprea, A, Balfanz D, Durfee G, Smetters DK (2004) Securing a remote terminal application with a mobile trusted device In: 20th Annual Computer Security Applications Conference, 438–447. https://doi.org/10.1109/CSAC.2004.33. ID - ref23 ER - TY - STD TI - Pandita, R, Xiao X, Yang W, Enck W, Xie T (2013) WHYPER: Towards automating risk assessment of mobile applications In: Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), 527–542.. USENIX. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/pandita. UR - https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/pandita ID - ref24 ER - TY - STD TI - Pennington, J, Socher R, Manning C (2014) Glove: Global vectors for word representation In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 1532–1543.. Association for Computational Linguistics. https://doi.org/10.3115/v1/D14-1162, http://www.aclweb.org/anthology/D14-1162. UR - http://www.aclweb.org/anthology/D14-1162 ID - ref25 ER - TY - CHAP AU - Qu, Z. AU - Rastogi, V. AU - Zhang, X. AU - Chen, Y. AU - Zhu, T. AU - Chen, Z. PY - 2014 DA - 2014// TI - Autocog: Measuring the description-to-permission fidelity in android applications BT - Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security PB - CCS ’14, ACM CY - New York ID - Qu2014 ER - TY - CHAP AU - Rastogi, V. AU - Chen, Y. AU - Enck, W. PY - 2013 DA - 2013// TI - Appsplayground: Automatic security analysis of smartphone applications BT - Proceedings of the Third ACM Conference on Data and Application Security and Privacy PB - CODASPY ’13, ACM CY - New York ID - Rastogi2013 ER - TY - STD TI - Roalter, L, Kranz M, Diewald S, Möller A, Synnes K (2013) The smartphone as mobile authorization proxy In: Proceedings of the 14th International Conference on Computer Aided Systems Theory (EUROCAST), 306–307.. Springer. ID - ref28 ER - TY - CHAP AU - Sharp, R. AU - Madhavapeddy, A. AU - Want, R. AU - Pering, T. PY - 2008 DA - 2008// TI - Enhancing web browsing security on public terminals using mobile composition BT - Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services PB - MobiSys ’08, ACM CY - New York ID - Sharp2008 ER - TY - STD TI - Socher, R, Perelygin A, Wu J, Chuang J, Manning CD, Ng A, Potts C (2013) Recursive deep models for semantic compositionality over a sentiment treebank In: Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, 1631–1642.. Association for Computational Linguistics. http://www.aclweb.org/anthology/D13-1170. UR - http://www.aclweb.org/anthology/D13-1170 ID - ref30 ER - TY - CHAP AU - Steinbach, M. AU - Karypis, G. AU - Kumar, V. PY - 2000 DA - 2000// TI - A comparison of document clustering techniques BT - KDD Workshop on Text Mining PB - ACM CY - Boston ID - Steinbach2000 ER - TY - STD TI - Toutanova, K, Klein D, Manning CD, Singer Y (2003) Feature-rich part-of-speech tagging with a cyclic dependency network In: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology - Volume 1, 173–180.. 0NAACL ’03, Association for Computational Linguistics. https://doi.org/10.3115/1073445.1073478. ID - ref32 ER - TY - STD TI - USA Today: Driver’s license, creditcardnumbers:Theequifaxhackiswayworsethanconsumersknew. https://www.usatoday.com/story/tech/2018/02/10/equifax-hack-put-more-info-risk-than-consumers-knew/326260002/. UR - https://www.usatoday.com/story/tech/2018/02/10/equifax-hack-put-more-info-risk-than-consumers-knew/326260002/ ID - ref33 ER - TY - STD TI - Wikipedia. https://wikipedia.org. UR - https://wikipedia.org ID - ref34 ER - TY - CHAP AU - Xu, J. AU - Croft, W. B. PY - 1996 DA - 1996// TI - Query expansion using local and global document analysis BT - Proceedings of the 19th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval PB - SIGIR ’96, ACM CY - New York ID - Xu1996 ER - TY - STD TI - Yahoo! data breaches. https://en.wikipedia.org/wiki/Yahoo!_data_breaches. UR - https://en.wikipedia.org/wiki/Yahoo!_data_breaches ID - ref36 ER - TY - STD TI - Yu, L, Luo X, Qian C, Wang S (2016) Revisiting the description-to-behavior fidelity in android applications In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 415–426. https://doi.org/10.1109/SANER.2016.67. ID - ref37 ER - TY - STD TI - Zhou, Y, Jiang X (2013) Detecting passive content leaks and pollution in android applications In: Proceedings of the 20th Network and Distributed System Security Symposium (NDSS). ID - ref38 ER - TY - STD TI - Zhou, Y, Evans D (2011) Protecting private web content from embedded scripts. In: Atluri V Diaz C (eds)Computer Security – ESORICS 2011, 60–79.. Springer. ID - ref39 ER -