A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

Toward engineering a secure android ecosystem: A survey of existing techniques

M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng… - ACM Computing …, 2016 - dl.acm.org
The openness and extensibility of Android have made it a popular platform for mobile
devices and a strong candidate to drive the Internet-of-Things. Unfortunately, these …

Maps: Scaling privacy compliance analysis to a million apps

S Zimmeck, P Story, D Smullen… - Proceedings on …, 2019 - petsymposium.org
The app economy is largely reliant on data collection as its primary revenue model. To
comply with legal requirements, app developers are often obligated to notify users of their …

[PDF][PDF] Automated analysis of privacy requirements for mobile apps

S Zimmeck, Z Wang, L Zou, R Iyengar, B Liu… - 2016 AAAI Fall …, 2016 - cdn.aaai.org
Mobile apps have to satisfy various privacy requirements. App publishers are often obligated
to provide a privacy policy and notify users of their apps' privacy practices. But how can we …

Freely given consent? studying consent notice of third-party tracking and its violations of gdpr in android apps

TT Nguyen, M Backes, B Stock - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR)
requires the consent for processing users' personal data to be freely given, specific …

[PDF][PDF] PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps.

S Zimmeck, R Goldstein, D Baraka - NDSS, 2021 - sebastianzimmeck.de
Various privacy laws require mobile apps to have privacy policies. Questionnaire-based
policy generators are intended to help developers with the task of policy creation. However …

[HTML][HTML] Stealing PINs via mobile sensors: actual risk versus user perception

M Mehrnezhad, E Toreini, SF Shahandashti… - International Journal of …, 2018 - Springer
In this paper, we present the actual risks of stealing user PINs by using mobile sensors
versus the perceived risks by users. First, we propose PINlogger. js which is a JavaScript …

Enhancing the description-to-behavior fidelity in android apps with privacy policy

L Yu, X Luo, C Qian, S Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Since more than 96 percent of mobile malware targets the Android platform, various
techniques based on static code analysis or dynamic behavior analysis have been …

Understanding the purpose of permission use in mobile apps

H Wang, Y Li, Y Guo, Y Agarwal, JI Hong - ACM Transactions on …, 2017 - dl.acm.org
Mobile apps frequently request access to sensitive data, such as location and contacts.
Understanding the purpose of why sensitive data is accessed could help improve privacy as …

Are they toeing the line? diagnosing privacy compliance violations among browser extensions

Y Ling, K Wang, G Bai, H Wang, JS Dong - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Browser extensions have emerged as integrated characteristics in modern browsers, with
the aim to boost the online browsing experience. Their advantageous position between a …