Research on third-party libraries in android apps: A taxonomy and systematic literature review

X Zhan, T Liu, L Fan, L Li, S Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …

An effective approach for the protection of user commodity viewing privacy in e-commerce website

Z Wu, S Shen, H Zhou, H Li, C Lu, D Zou - Knowledge-Based Systems, 2021 - Elsevier
Along with the rapid development of network technologies, the server-side of an e-
commerce website is becoming more and more untrustworthy. Thus, how to prevent the …

Mobile app privacy in software engineering research: A systematic map** study

F Ebrahimi, M Tushev, A Mahmoud - Information and Software Technology, 2021 - Elsevier
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …

Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

A design theory for transparency of information privacy practices

T Dehling, A Sunyaev - Information Systems Research, 2024 - pubsonline.informs.org
The rising diffusion of information systems (IS) throughout society poses an increasingly
serious threat to privacy as a social value. One approach to alleviating this threat is to …

Impact of privacy policy content on perceived effectiveness of privacy policy: the role of vulnerability, benevolence and privacy concern

Y Guo, X Wang, C Wang - Journal of Enterprise Information …, 2022 - emerald.com
Purpose This study examines how the different dimensions of a privacy policy separately
influence perceived effectiveness of privacy policy, as well as the mediating mechanisms …

Guileak: Tracing privacy policy claims on user input data for android applications

X Wang, X Qin, MB Hosseini, R Slavin… - Proceedings of the 40th …, 2018 - dl.acm.org
The Android mobile platform supports billions of devices across more than 190 countries
around the world. This popularity coupled with user data collection by Android apps has …

Rmvdroid: towards a reliable android malware dataset with app metadata

H Wang, J Si, H Li, Y Guo - 2019 IEEE/ACM 16th international …, 2019 - ieeexplore.ieee.org
A large number of research studies have been focused on detecting Android malware in
recent years. As a result, a reliable and large-scale malware dataset is essential to build …

Dynamic privacy leakage analysis of Android third-party libraries

Y He, X Yang, B Hu, W Wang - Journal of Information Security and …, 2019 - Elsevier
The third-party libraries are reusable resources that are widely employed in Android Apps.
While the third-party libraries provide a variety of functions, they bring serious security and …

PTPDroid: Detecting violated user privacy disclosures to third-parties of android apps

Z Tan, W Song - 2023 IEEE/ACM 45th International Conference …, 2023 - ieeexplore.ieee.org
Android apps frequently access personal information to provide customized services. Since
such information is sensitive in general, regulators require Android app vendors to publish …