Uncovering user-triggered privacy leaks in mobile applications and their utility in privacy protection