2019 International Symposium on Theoretical Aspects of Software Engineering (TASE) 2019
DOI: 10.1109/tase.2019.00-19
|View full text |Cite
|
Sign up to set email alerts
|

Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…In the previous work [39], it has been found that the extensions divulge the users' privacy. However, due to Baidu browser stopping service and the UC browser users are few, we continue to analyze the 360 browser which accounts for more users, and collect and sort out 16,547 extensions of three (QQ browser, 360 secure browser, and 360 speed browser) for six months, from May 2019 to October 2019.…”
Section: Data Collection and Analysismentioning
confidence: 98%
See 1 more Smart Citation
“…In the previous work [39], it has been found that the extensions divulge the users' privacy. However, due to Baidu browser stopping service and the UC browser users are few, we continue to analyze the 360 browser which accounts for more users, and collect and sort out 16,547 extensions of three (QQ browser, 360 secure browser, and 360 speed browser) for six months, from May 2019 to October 2019.…”
Section: Data Collection and Analysismentioning
confidence: 98%
“…China has a considerable browser market [6], [7], but there are only a few works for extension privacy leakage detection [39]. Although the kernel of Chinese mainstream browsers and that of Chrome are the same, the description of the extensions in the Chinese mainstream browsers and the classification of these extensions according to their functions are quite different due to the differences of languages(most English in Chrome, Chinese in China browser).…”
Section: Introductionmentioning
confidence: 99%
“…Wireless Communications and Mobile Computing the rationality of such behaviors. Those studies try to figure out whether the behavior is necessary for the app to provide its service [17,18]. In those studies, privacy leak indicates the functionality-irrelevant private data transmission.…”
Section: Privacy Leakmentioning
confidence: 99%
“…Recently, a few studies further assess the rationality of such behaviors. In other words, those studies try to figure out whether the behavior is necessary for the app to provide its service [16,17]. In those studies, privacy leak indicates the functionality-irrelevant private data transmission.…”
Section: Privacy Leakmentioning
confidence: 99%
“…The category "others" in Fig. 6 includes 11 types of number of users, i.e., 5,7,8,10,11,13,14,17,39,41,43. As Fig.…”
Section: Analysis On False Predictionmentioning
confidence: 99%