Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security 2021
DOI: 10.1145/3433210.3437511
|View full text |Cite
|
Sign up to set email alerts
|

Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Previous works have proposed various techniques to better analyze privacy leakage in the mobile ecosystem. For the Android platform, static analysis [55], [56], [42], dynamic analysis [66], [51], and their mixed approaches [68], [57] are extensively used for detecting privacy leakage in a more efficient way. For example, FlowDroid [31] is one of the widely used tools for detecting privacy leakage via static analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Previous works have proposed various techniques to better analyze privacy leakage in the mobile ecosystem. For the Android platform, static analysis [55], [56], [42], dynamic analysis [66], [51], and their mixed approaches [68], [57] are extensively used for detecting privacy leakage in a more efficient way. For example, FlowDroid [31] is one of the widely used tools for detecting privacy leakage via static analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The decision is mainly based on the privacy risks related to the information collected and shared with third parties and the benefits the users might get from the app. Moreover, in developing our tool, we acknowledge that users might have different perceptions of privacy risks implied by apps' data collection [9], or more in general of privacy, as well as, on possible benefits. To consider this subjective dimension, PriApp-Install leverages semi-supervised learning to build a classifier for predicting decisions about apps' installation based on users' feedback.…”
Section: Overall Architecturementioning
confidence: 99%
“…The algorithm, then, trains a new classifier using all the apps (i.e., both the original labeled, pseudo-labeled apps). 9 If shared data are not specified in the privacy policy, 3pt is set to not specif ied. 10 θ parameters aim at optimizing the label probability.…”
Section: Naive and Category-based Prediction Modelsmentioning
confidence: 99%
“…Furthermore, generating comments for bytecode has practical implications. For example, (1) In APP sensitive-resource-access detection (Nguyen et al 2021;Hăjmăsan et al 2019), some existing tools detect the API from bytecode to determine its specific behavior (e.g., accessing the phone's contact list). However, if an attacker deliberately names an API to hide its true functionality, we cannot analyze the API's behavior by its name.…”
Section: Introductionmentioning
confidence: 99%