A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Maps: Scaling privacy compliance analysis to a million apps

S Zimmeck, P Story, D Smullen… - Proceedings on …, 2019 - petsymposium.org
The app economy is largely reliant on data collection as its primary revenue model. To
comply with legal requirements, app developers are often obligated to notify users of their …

Identity confusion in {WebView-based} mobile app-in-app ecosystems

L Zhang, Z Zhang, A Liu, Y Cao, X Zhang… - 31st USENIX Security …, 2022 - usenix.org
Mobile applications (apps) often delegate their own functions to other parties, which makes
them become a super ecosystem hosting these parties. Therefore, such mobile apps are …

Users' expectations about and use of smartphone privacy and security settings

A Frik, J Kim, JR Sanchez, J Ma - … of the 2022 CHI Conference on Human …, 2022 - dl.acm.org
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …

A stitch in time: Supporting android developers in writingsecure code

DC Nguyen, D Wermke, Y Acar, M Backes… - Proceedings of the …, 2017 - dl.acm.org
Despite security advice in the official documentation and an extensive body of security
research about vulnerabilities and exploits, many developers still fail to write secure Android …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Identifying open-source license violation and 1-day security risk at large scale

R Duan, A Bijlani, M Xu, T Kim, W Lee - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
With millions of apps available to users, the mobile app market is rapidly becoming very
crowded. Given the intense competition, the time to market is a critical factor for the success …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Sok: Lessons learned from android security research for appified software platforms

Y Acar, M Backes, S Bugiel, S Fahl… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Android security and privacy research has boomed in recent years, far outstrip**
investigations of other appified platforms. However, despite this attention, research efforts …