Research on third-party libraries in android apps: A taxonomy and systematic literature review
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
An effective approach for the protection of user commodity viewing privacy in e-commerce website
Z Wu, S Shen, H Zhou, H Li, C Lu, D Zou - Knowledge-Based Systems, 2021 - Elsevier
Along with the rapid development of network technologies, the server-side of an e-
commerce website is becoming more and more untrustworthy. Thus, how to prevent the …
commerce website is becoming more and more untrustworthy. Thus, how to prevent the …
Mobile app privacy in software engineering research: A systematic map** study
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …
access to privacy-sensitive information in exchange for more personalized user …
Structural attack against graph based android malware detection
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …
of malware. Among existing detection techniques, function call graph (FCG) based methods …
A design theory for transparency of information privacy practices
The rising diffusion of information systems (IS) throughout society poses an increasingly
serious threat to privacy as a social value. One approach to alleviating this threat is to …
serious threat to privacy as a social value. One approach to alleviating this threat is to …
Impact of privacy policy content on perceived effectiveness of privacy policy: the role of vulnerability, benevolence and privacy concern
Y Guo, X Wang, C Wang - Journal of Enterprise Information …, 2022 - emerald.com
Purpose This study examines how the different dimensions of a privacy policy separately
influence perceived effectiveness of privacy policy, as well as the mediating mechanisms …
influence perceived effectiveness of privacy policy, as well as the mediating mechanisms …
Guileak: Tracing privacy policy claims on user input data for android applications
The Android mobile platform supports billions of devices across more than 190 countries
around the world. This popularity coupled with user data collection by Android apps has …
around the world. This popularity coupled with user data collection by Android apps has …
Rmvdroid: towards a reliable android malware dataset with app metadata
A large number of research studies have been focused on detecting Android malware in
recent years. As a result, a reliable and large-scale malware dataset is essential to build …
recent years. As a result, a reliable and large-scale malware dataset is essential to build …
Dynamic privacy leakage analysis of Android third-party libraries
The third-party libraries are reusable resources that are widely employed in Android Apps.
While the third-party libraries provide a variety of functions, they bring serious security and …
While the third-party libraries provide a variety of functions, they bring serious security and …
PTPDroid: Detecting violated user privacy disclosures to third-parties of android apps
Z Tan, W Song - 2023 IEEE/ACM 45th International Conference …, 2023 - ieeexplore.ieee.org
Android apps frequently access personal information to provide customized services. Since
such information is sensitive in general, regulators require Android app vendors to publish …
such information is sensitive in general, regulators require Android app vendors to publish …