Dynamic security analysis on android: A systematic literature review

T Sutter, T Kehrer, M Rennhard, B Tellenbach… - IEEE …, 2024 - ieeexplore.ieee.org
Dynamic analysis is a technique that is used to fully understand the internals of a system at
runtime. On Android, dynamic security analysis involves real-time assessment and active …

[HTML][HTML] Threaten me softly: A review of potential dating app risks

A Phan, K Seigfried-Spellar, KKR Choo - Computers in human behavior …, 2021 - Elsevier
The potential abuse of dating applications (apps), including during the current lockdowns
due to COVID-19, has resulted in a growing community of research to learn to what extent …

Predicting personality from patterns of behavior collected with smartphones

C Stachl, Q Au, R Schoedel, SD Gosling… - Proceedings of the …, 2020 - pnas.org
Smartphones enjoy high adoption rates around the globe. Rarely more than an arm's length
away, these sensor-rich devices can easily be repurposed to collect rich and extensive …

Are iphones really better for privacy? comparative study of ios and android apps

K Kollnig, A Shuba, R Binns, M Van Kleek… - arxiv preprint arxiv …, 2021 - arxiv.org
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …

Actions speak louder than words:{Entity-Sensitive} privacy policy and data flow analysis with {PoliCheck}

B Andow, SY Mahmud, J Whitaker, W Enck… - 29th USENIX Security …, 2020 - usenix.org
Identifying privacy-sensitive data leaks by mobile applications has been a topic of great
research interest for the past decade. Technically, such data flows are not “leaks” if they are …

The android platform security model

R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …

Share first, ask later (or never?) studying violations of {GDPR's} explicit consent in android apps

TT Nguyen, M Backes, N Marnau, B Stock - 30th USENIX Security …, 2021 - usenix.org
Since the General Data Protection Regulation (GDPR) went into effect in May 2018, online
services are required to obtain users' explicit consent before sharing users' personal data …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

From parental control to joint family oversight: Can parents and teens manage mobile online safety and privacy as equals?

M Akter, AJ Godfrey, J Kropczynski, HR Lipford… - Proceedings of the …, 2022 - dl.acm.org
Our research aims to highlight and alleviate the complex tensions around online safety,
privacy, and smartphone usage in families so that parents and teens can work together to …

Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications

M Tahaei, R Abu-Salma, A Rashid - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …