Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps

Y Nan, X Wang, L **ng, X Liao, R Wu, J Wu… - 32nd USENIX Security …, 2023 - usenix.org
Recent research has highlighted privacy as a primary concern for IoT device users.
However, due to the challenges in conducting a large-scale study to analyze thousands of …

Lalaine: Measuring and characterizing {Non-Compliance} of apple privacy labels

Y **ao, Z Li, Y Qin, X Bai, J Guan, X Liao… - 32nd USENIX Security …, 2023 - usenix.org
As a key supplement to privacy policies that are known to be lengthy and difficult to read,
Apple has launched app privacy labels, which purportedly help users more easily …

MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps

W Li, B Yang, H Ye, L **ang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Running on host mobile applications, mini apps have gained increasing popularity these
days for its convenience in installation and usage. However, being easy to use allows mini …

Demystifying privacy policy of third-party libraries in mobile apps

K Zhao, X Zhan, L Yu, S Zhou, H Zhou… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
The privacy of personal information has received significant attention in mobile software.
Although researchers have designed methods to identify the conflict between app behavior …

Lalaine: Measuring and characterizing non-compliance of apple privacy labels at scale

Y **ao, Z Li, Y Qin, X Bai, J Guan, X Liao… - arxiv preprint arxiv …, 2022 - arxiv.org
As a key supplement to privacy policies that are known to be lengthy and difficult to read,
Apple has launched the app privacy labels, which purportedly help users more easily …

[PDF][PDF] Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.

MH Meng, Q Zhang, G **a, Y Zheng, Y Zhang, G Bai… - NDSS, 2023 - baigd.github.io
Ever since its genesis, Android has enabled apps to access data and services on mobile
devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …

Tabbed Out: Subverting the Android Custom Tab Security Model

P Beer, M Squarcina, L Veronese… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Mobile operating systems provide developers with various mobile-to-Web bridges to display
Web pages inside native applications. A recently introduced component called Custom Tab …

Towards {Privacy-Preserving}{Social-Media}{SDKs} on Android

H Lu, Y Liu, X Liao, L **ng - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Integration of third-party SDKs are essential in the development of mobile apps. However,
the rise of in-app privacy threat against mobile SDKs—called cross-library data harvesting …

Iafdroid: Demystifying collusion attacks in android ecosystem via precise inter-app analysis

B Wang, C Yang, J Ma - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Inter-app communication mechanism allows app developers to improve Android apps'
usability and provide users with rich functions via interacting with exposed components or …