Consumer privacy in smartphones: a systematic literature review

S Shome, A Shankar, SK Pani - Journal of Consumer Marketing, 2023 - emerald.com
Consumer privacy in smartphones: a systematic literature review | Emerald Insight Books and
journals Case studies Expert Briefings Open Access Publish with us Advanced search …

Have you been properly notified? automatic compliance analysis of privacy policy text with gdpr article 13

S Liu, B Zhao, R Guo, G Meng, F Zhang… - Proceedings of the Web …, 2021 - dl.acm.org
With the rapid development of web and mobile applications, as well as their wide adoption
in different domains, more and more personal data is provided, consciously or …

Guileak: Tracing privacy policy claims on user input data for android applications

X Wang, X Qin, MB Hosseini, R Slavin… - Proceedings of the 40th …, 2018 - dl.acm.org
The Android mobile platform supports billions of devices across more than 190 countries
around the world. This popularity coupled with user data collection by Android apps has …

Automatic policy generation for {Inter-Service} access control of microservices

X Li, Y Chen, Z Lin, X Wang, JH Chen - 30th USENIX Security …, 2021 - usenix.org
Cloud applications today are often composed of many microservices. To prevent a
microservice from being abused by other (compromised) microservices, inter-service access …

A comparative study on method comment and inline comment

Y Huang, H Guo, X Ding, J Shu, X Chen, X Luo… - ACM Transactions on …, 2023 - dl.acm.org
Code comments are one of the important documents to help developers review and
comprehend source code. In recent studies, researchers have proposed many deep …

Happer: Unpacking android apps via a hardware-assisted approach

L Xue, H Zhou, X Luo, Y Zhou, Y Shi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Malware authors are abusing packers (or runtime-based obfuscators) to protect malicious
apps from being analyzed. Although many unpacking tools have been proposed, they can …

Snippet comment generation based on code context expansion

H Guo, X Chen, Y Huang, Y Wang, X Ding… - ACM Transactions on …, 2023 - dl.acm.org
Code commenting plays an important role in program comprehension. Automatic comment
generation helps improve software maintenance efficiency. The code comments to annotate …

PTPDroid: Detecting violated user privacy disclosures to third-parties of android apps

Z Tan, W Song - 2023 IEEE/ACM 45th International Conference …, 2023 - ieeexplore.ieee.org
Android apps frequently access personal information to provide customized services. Since
such information is sensitive in general, regulators require Android app vendors to publish …

[HTML][HTML] A privacy-preserving mobile application recommender system based on trust evaluation

K Xu, W Zhang, Z Yan - Journal of computational science, 2018 - Elsevier
Too many mobile applications in App stores results in information overload in App market.
Mobile users are confused in choosing suitable and trustworthy mobile applications due to a …

Are they toeing the line? diagnosing privacy compliance violations among browser extensions

Y Ling, K Wang, G Bai, H Wang, JS Dong - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Browser extensions have emerged as integrated characteristics in modern browsers, with
the aim to boost the online browsing experience. Their advantageous position between a …