Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300020
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Responsiveness of Mobile App Developers to Software Library Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 20 publications
1
15
0
Order By: Relevance
“…Disadvantages of m-library applications are that they require periodic preservation, including updates, fixing bugs and errors, and improving security and privacy (Aisyiyah, 2019;Mishra et al, 2017;H. Wang et al, 2019;Yasumatsu et al, 2019). Furthermore, sometimes users experience technical issues with any application that can disrupt their ease of use, such as an unstable internet connection.…”
Section: Discussionmentioning
confidence: 99%
“…Disadvantages of m-library applications are that they require periodic preservation, including updates, fixing bugs and errors, and improving security and privacy (Aisyiyah, 2019;Mishra et al, 2017;H. Wang et al, 2019;Yasumatsu et al, 2019). Furthermore, sometimes users experience technical issues with any application that can disrupt their ease of use, such as an unstable internet connection.…”
Section: Discussionmentioning
confidence: 99%
“…As far as we know, only Google provides a service named App Security Improvement (ASI) program that provides tips to help app developers of Google Play to improve the security of their apps. Previous research [6] reported that vulnerabilities fisted on ASI program could draw more attention from developers. However, the vulnerabilities reported by ASI program are limited due to the lack of a comprehensive vulnerability database and such a vulnerable TPL detection tool, like ATVHunter.…”
Section: Rq3: Obfuscation-resilient Capabilitymentioning
confidence: 99%
“…Vulnerable TPL/App Identification. Yasumatsu et al[6] and Java libraries. It extracts the fuzzy method signature as the library feature and function centroid[33] as the version feature to identify TPL-Vs.…”
mentioning
confidence: 99%
“…Next, we generate features and create a family tree with multiple versions of the benign application B, and we examine what information is reflected in the family tree. The benign applications used in this evaluation were obtained from the Google Play Store retroactively from the latest version, referring to the method proposed by Yasumatsu et al [22].…”
Section: Benign Appsmentioning
confidence: 99%