References
- L. A. Mutchler, J. P. Shim, and D. Ormond, "Exploratory study on users' behavior: smartphone usage," in Proceedings of Americas Conference on Information Systems, pp.418, 2011.
- G. Jeon, M. Choi, S. Lee, J. H. Yi, and H. Cho, "Automated multi-layered bytecode generation for preventing sensitive information leaks from android applications," IEEE Access, Vol.9, pp.119578-119590, 2021. https://doi.org/10.1109/ACCESS.2021.3107601
- S. Kim and J. Hur, "Mobile application privacy leak detection and security enhancement research," Journal of the Korea Institute of Information Security & Cryptology, Vol.29, No.1, pp.195-203, 2019. https://doi.org/10.13089/JKIISC.2019.29.1.195
- Google, User data policy [Internet], https://support.google.com/googleplay/android-developer/answer/10144311.
- European Union, General Data Protection Regulation [Internet], https://gdpr-info.eu/.
- State of California Department of Justice, California Consumer Privacy Act [Internet], https://oag.ca.gov/privacy/ccpa.
- U.S. Congress legislation, American Data Privacy and Protection Act[Internet], https://www.congress.gov/bill/117th-congress/house-bill/8152
- A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and communications security, pp.627-638, 2011.
- K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "Pscout: Analyzing the android permission specification," in Proceedings of the 2012 ACM conference on Computer and Communications Security, pp.217-228, 2012.
- D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, and C. Siemens, "Drebin: Effective and explainable detection of android malware in your pocket," in Proceeding of the Network and Distributed System Security Symposium, pp.23-26, 2014.
- I. M. Almomani and A. A. Khayer, "A comprehensive analysis of the android permissions system," IEEE Access, Vol.8, pp.216671-216688, 2020. https://doi.org/10.1109/ACCESS.2020.3041432
- Z. Wu and S. U.-J. Lee, "Forgotten permission usages: An empirical study on app description based android app analysis," Journal of the Korea Society of Computer and Information, Vol.26, No.6, pp.107-113, 2021. https://doi.org/10.9708/JKSCI.2021.26.06.107
- J. Gamba, M. Rashed, A. Razaghpanah, J. Tapiador, and N. Vallina-Rodriguez, "An analysis of pre-installed android software," in Proceeding of IEEE Symposium on Security and Privacy, pp.1039-1055, 2020.
- A. M. McDonald and L. F. Cranor, "The cost of reading privacy policies," Isjlp, Vol.4, pp.543, 2008.
- S. Wilson et al., "The creation and analysis of a website privacy policy corpus," in Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, pp.1330-1340, 2016.
- S. Zimmeck et al., "Maps: Scaling privacy compliance analysis to a million apps," in Proceedings on Privacy Enhancing Technologies, pp.66-86, 2019.
- F. Liu, S. Wilson, P. Story, S. Zimmeck, and N. Sadeh, "Towards automatic classification of privacy policy text," School of Computer Science Carnegie Mellon University, 2018.
- T. Libert, "An automated approach to auditing disclosure of third-party data collection in website privacy policies," in Proceedings of the 2018 World Wide Web Conference, pp.207-216,
- I. Paek, J. Oh, and K. Lee, "A study on the methods for ensuring the transparency of the privacy policies in android environment: based on General Data Protection Regulation," Journal of the Korea Institute of Information Security & Cryptology, Vol.29, No.6, pp.1477-1489, 2019. https://doi.org/10.13089/JKIISC.2019.29.6.1477
- Leontiadis. I, Efstratiou. C, Picone. M, and Mascolo. C, "Don't kill my ads! balancing privacy in an ad-supported mobile application market." in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, pp.1-6, 2012.
- M. Backes, S. Bugiel, and E. Derr, "Reliable third-party library detection in android and its security applications," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.356-367, 2016.
- M. I. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen, and M. Rinard, "Information-flow analysis of android applications in droidsafe," in Proceeding of the Network and Distributed System Security Symposium, pp.110, 2015
- F. Wei, S. Roy, and X. Ou, "Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps," ACM Transactions on Privacy and Security, Vol.21, No.3, pp.1-32,
- Y. Pan, X. Ge, C. Fang, and Y. Fan, "A systematic literature review of android malware detection using static analysis," IEEE Access, Vol.8, pp.116363-116379, 2020. https://doi.org/10.1109/access.2020.3002842
- W. Enck et al., "Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones," ACM Transactions on Computer Systems, Vol.32, No.2, pp.1-29, 2014. https://doi.org/10.1145/2619091
- A. Razaghpanah et al., "Haystack: A multi-purpose mobile vantage point in user space," arXiv preprint arXiv:1510.014 19, 2015.
- J. Ren, M. Lindorfer, D. J. Dubois, A. Rao, D. Choffnes, and N. Vallina-Rodriguez, "Bug fixes, improvements,... and privacy leaks: A longitudinal study of pii leaks across android app versions," in Proceeding of the Network and Distributed System Security Symposium, 2018.
- J. Ahn, H. Yoon, and S. Jung, "An enhancement scheme of dynamic analysis for evasive android malware," Journal of the Korea Institute of Information Security & Cryptology, Vol.29, No.3, pp.519-529, 2019. https://doi.org/10.13089/JKIISC.2019.29.3.519
- Android Privacy Analysis, Dataset of privacy policy and mobile app analysis [Internet], https://android-privacy.github.io/
- Mozilla, Readability.js [Internet], https://github.com/moz illa/readability.
- Anthony Desnos, Androguard documentation [Internet], https://androguard.readthedocs.io.
- Google, The Privacy Sandbox [Internet], https://privacysan dbox.com.
- Y. Jung, "Reliability analysis of privacy policies based on android static analysis," in Proceedings of the Annual Spring Conference of Korea Information Processing Society Conference (KIPS), Vol.29, pp.221-224, 2022.