{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2014:73YCT5N3RYDYY3UJLNTODZDWIN","short_pith_number":"pith:73YCT5N3","schema_version":"1.0","canonical_sha256":"fef029f5bb8e078c6e895b66e1e4764357c639e757dd001400920ca485914737","source":{"kind":"arxiv","id":"1404.7431","version":1},"attestation_state":"computed","paper":{"title":"I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis","license":"http://creativecommons.org/licenses/by/3.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.SE","authors_text":"Alexandre Bartel, Damien Octeau, Eric Bodden, Jacques Klein, Li Li, Patrick McDaniel, Siegfried Rasthofer, Steven Arzt, Yves Le Traon","submitted_at":"2014-04-29T17:01:24Z","abstract_excerpt":"Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1404.7431","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/3.0/","primary_cat":"cs.SE","submitted_at":"2014-04-29T17:01:24Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"dcd4c2557f3dc16d17076caa12f03b64c8f34a259effaed2886cf1b4085b38af","abstract_canon_sha256":"ca6ec2e601594c55065c8e6229e9098b53a114fdd59513a81afdf252e45a2f70"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:52:56.582338Z","signature_b64":"WsrPlY9ucKtzRKhrRcLSP7kjAt/Tuh1HjDtYtZY+wBmQkl7IO9jnCdjtF5mTchq/xmrzg29wofiuf/seFB4PDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fef029f5bb8e078c6e895b66e1e4764357c639e757dd001400920ca485914737","last_reissued_at":"2026-05-18T02:52:56.581793Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:52:56.581793Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis","license":"http://creativecommons.org/licenses/by/3.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.SE","authors_text":"Alexandre Bartel, Damien Octeau, Eric Bodden, Jacques Klein, Li Li, Patrick McDaniel, Siegfried Rasthofer, Steven Arzt, Yves Le Traon","submitted_at":"2014-04-29T17:01:24Z","abstract_excerpt":"Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1404.7431","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1404.7431","created_at":"2026-05-18T02:52:56.581883+00:00"},{"alias_kind":"arxiv_version","alias_value":"1404.7431v1","created_at":"2026-05-18T02:52:56.581883+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1404.7431","created_at":"2026-05-18T02:52:56.581883+00:00"},{"alias_kind":"pith_short_12","alias_value":"73YCT5N3RYDY","created_at":"2026-05-18T12:28:16.859392+00:00"},{"alias_kind":"pith_short_16","alias_value":"73YCT5N3RYDYY3UJ","created_at":"2026-05-18T12:28:16.859392+00:00"},{"alias_kind":"pith_short_8","alias_value":"73YCT5N3","created_at":"2026-05-18T12:28:16.859392+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN","json":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN.json","graph_json":"https://pith.science/api/pith-number/73YCT5N3RYDYY3UJLNTODZDWIN/graph.json","events_json":"https://pith.science/api/pith-number/73YCT5N3RYDYY3UJLNTODZDWIN/events.json","paper":"https://pith.science/paper/73YCT5N3"},"agent_actions":{"view_html":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN","download_json":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN.json","view_paper":"https://pith.science/paper/73YCT5N3","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1404.7431&json=true","fetch_graph":"https://pith.science/api/pith-number/73YCT5N3RYDYY3UJLNTODZDWIN/graph.json","fetch_events":"https://pith.science/api/pith-number/73YCT5N3RYDYY3UJLNTODZDWIN/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN/action/timestamp_anchor","attest_storage":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN/action/storage_attestation","attest_author":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN/action/author_attestation","sign_citation":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN/action/citation_signature","submit_replication":"https://pith.science/pith/73YCT5N3RYDYY3UJLNTODZDWIN/action/replication_record"}},"created_at":"2026-05-18T02:52:56.581883+00:00","updated_at":"2026-05-18T02:52:56.581883+00:00"}