[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3196398.3196412acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Why are Android apps removed from Google Play?: a large-scale empirical study

Published: 28 May 2018 Publication History

Abstract

To ensure the quality and trustworthiness of the apps within its app market (i.e., Google Play), Google has released a series of policies to regulate app developers. As a result, policy-violating apps (e.g., malware, low-quality apps, etc.) have been removed by Google Play periodically. In reality, we have found that the number of removed apps are actually much more than what we have expected, as almost half of all the apps have been removed or replaced from Google Play during a two year period from 2015 to 2017. However, despite the significant number of removed apps, there are almost no study on the characterization of these removed apps. To this end, this paper takes the first step to understand why Android apps are removed from Google Play, aiming at observing promising insights for both market maintainers and app developers towards building a better app ecosystem. By leveraging two app sets crawled from Google Play in 2015 (over 1.5 million) and 2017 (over 2.1 million), we have identified a set of over 790K removed apps, which are then thoroughly investigated in various aspects. The experimental results have revealed various interesting findings, as well as insights for future research directions.

References

[1]
2012. Android Malware Genome Project. http://www.malgenomeproject.org/. (2012). Accessed: 2018-01-15.
[2]
2012. Google 'Bouncer' Now Scanning Android Market for Malware. https://www.pcmag.com/article2/0,2817,2399778,00.asp. (2012). Accessed: 2018-01-15.
[3]
2012. Mobile Apps for Kids: current privacy disclosures are disappointing. https://www.ftc.gov/sites/default/files/documents/reports/mobile-apps-kids-current-privacy-disclosures-are-disappointing/120216mobile_apps_kids.pdf. (2012). Accessed: 2018-01-15.
[4]
2012. Mobile Apps for Kids: Disclosures Still Not Making the Grade. https://www.ftc.gov/reports/mobile-apps-kids-disclosures-still-not-making-grade. (2012). Accessed: 2018-01-15.
[5]
2013. Adblock Plus for Android removed from Google Play store. https://adblockplus.org/blog/adblock-plus-for-android-removed-from-google-play-store. (2013). Accessed: 2018-01-15.
[6]
2013. Google Has Started Removing Ad Blockers from the Play Store. https://lifehacker.com/5990448/google-has-started-removing-ad-blockers-from-the-play-store. (2013). Accessed: 2018-01-15.
[7]
2015. KidsâĂŹ Apps Disclosures Revisited. https://www.ftc.gov/news-events/blogs/business-blog/2015/09/kids-apps-disclosures-revisited. (2015). Accessed: 2018-01-15.
[8]
2017. AppBrain. https://www.appbrain.com. (2017). Accessed: 2018-01-15.
[9]
2017. Children's Privacy. https://www.ftc.gov/tips-advice/business-center/privacy-and-security/children%27s-privacy. (2017). Accessed: 2018-01-15.
[10]
2017. COPPA - Children's Online Privacy Protection Act. http://coppa.org/.(2017). Accessed: 2018-01-15.
[11]
2017. COPPA Violation. https://play.google.com/intl/en-GB/about/families/.(2017). Accessed: 2018-01-15.
[12]
2017. Developer Policy Center". https://play.google.com/intl/en-GB/about/developer-content-policy/. (2017). Accessed: 2018-01-15.
[13]
2017. Google is using machine learning to sort good apps from bad on the Play Store. https://www.theverge.com/2017/7/12/15958372/google-machine-learning-ai-app-store-malware-security. (2017). Accessed: 2018-01-15.
[14]
2017. Google Play API. https://github.com/egirault/googleplay-api. (2017). Accessed: 2018-01-15.
[15]
2017. Google will soon delete apps with no privacy policies from play store. https://www.techrepublic.com/article/google-will-soon-delete-apps-with-no-privacy-policies-from-play-store/. (2017). Accessed: 2018-01-15.
[16]
2017. LibRadar. https://github.com/pkumza/LibRadar. (2017). Accessed: 2018-01-15.
[17]
2017. LibRadar 2.1.0: A tool for Android library detection. https://pypi.python. org/pypi/LibRadar. (2017). Accessed: 2018-01-15.
[18]
2017. Massive Android Malware Outbreak Invades Google Play Store. http://fortune.com/2017/09/14/google-play-android-malware/. (2017). Accessed: 2018-01-15.
[19]
2017. Multi-stage malware sneaks into Google Play. https://www.welivesecurity.com/2017/11/15/multi-stage-malware-sneaks-google-play/. (2017). Accessed: 2018-01-15.
[20]
2017. New Android Trojan malware discovered in Google Play. https://blog.malwarebytes.com/cybercrime/2017/11/new-trojan-malware-discovered-google-play/. (2017). Accessed: 2018-01-15.
[21]
2017. Over a million Android users fooled by fake WhatsApp app in official Google Play Store. https://www.theregister.co.uk/2017/11/03/fake_whatsapp_app/. (2017). Accessed: 2018-01-15.
[22]
2017. Privacy Grade result of app "air.com.elextech.happyfarm". http://privacygrade.org/apps/air.com.elextech.happyfarm.html. (2017). Accessed: 2018-01-15.
[23]
2017. Privacy Grade result of app "com.fingersoft.cartooncamera". http://privacygrade.org/apps/com.fngersoft.cartooncamera.html. (2017). Accessed: 2018-01-15.
[24]
2017. Privacy Grade result of app "com.fotolr.photoshake". http://privacygrade.org/apps/com.fotolr.photoshake.html. (2017). Accessed: 2018-01-15.
[25]
2017. Privacy Grade result of app "com.galapagossoft.trialdemo". http://privacygrade.org/apps/com.galapagossoft.trialdemo.html. (2017). Accessed: 2018-01-15.
[26]
2017. Privacy Grade result of app "com.myxer.android". http://privacygrade.org/apps/com.myxer.android.html. (2017). Accessed: 2018-01-15.
[27]
2017. Privacy Grade result of app "com.outfit7.tomsmessengerfree". http://privacygrade.org/apps/com.outft7.tomsmessengerfree.html. (2017). Accessed: 2018-01-15.
[28]
2017. Privacy Grade result of app "com.ScnStudios.PoliceCarDriver3D". http://privacygrade.org/apps/com.ScnStudios.PoliceCarDriver3D.html. (2017). Accessed: 2018-01-15.
[29]
2017. Privacy Grade result of app "com.sds.android.ttpod". http://privacygrade.org/apps/com.sds.android.ttpod.html. (2017). Accessed: 2018-01-15.
[30]
2017. Privacy Grade result of app "com.unityconceptapps.tcr.kiat". http://privacygrade.org/apps/com.unityconceptapps.tcr.kiat.html. (2017). Accessed: 2018-01-15.
[31]
2017. Privacy Grade result of app "com.zdworks.android.toolbox". http://privacygrade.org/apps/com.zdworks.android.toolbox.html. (2017). Accessed: 2018-01-15.
[32]
2017. Privacy Rating for Android Apps. https://github.com/CMUChimpsLab/privacyRating. (2017). Accessed: 2018-01-15.
[33]
2017. PrivacyGrade. http://privacygrade.org/. (2017). Accessed: 2018-01-15.
[34]
2017. PScout: Analyzing the Android Permission Specification. http://pscout.csl.toronto.edu/. (2017). Accessed: 2018-01-15.
[35]
2018. VirusTotal. https://www.virustotal.com/. (2018). Accessed: 2018-01-15.
[36]
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Ndss, Vol. 14. 23--26.
[37]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices 49, 6 (2014), 259--269.
[38]
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security. 217--228.
[39]
Bogdan Beleapril. 2013. 60,000 apps were removed from the Play Store in February alone. https://www.androidauthority.com/play-store-apps-removed-187094/. (2013). Accessed: 2018-01-15.
[40]
Paolo Calciati and Alessandra Gorla. 2017. How do apps evolve in their permission requests?: a preliminary study. In Proceedings of the 14th International Conference on Mining Software Repositories. IEEE Press, 37--41.
[41]
Bogdan Carbunar and Rahul Potharaju. 2015. A longitudinal study of the Google app market. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ACM, 242--249.
[42]
Kai Chen, Peng Liu, and Yingjun Zhang. 2014. Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In Proceedings of the 36th International Conference on Software Engineering. ACM, 175--186.
[43]
Cohen Coberly. 2017. Hundreds of Android apps might be removed from the Google Play Store for misusing accessibility features. https://www.techspot.com/news/71852-hundreds-android-apps-might-removed-google-play-store.html. (2017). Accessed: 2018-01-15.
[44]
Shane Curtis. 2017. Google removes 300 Android apps following DDoS attack. https://www.welivesecurity.com/2017/08/31/google-removes-malicious-apps/. (2017). Accessed: 2018-01-15.
[45]
Patrick Devaney. 2018. 60 infected apps removed from Google Play Store for displaying pornographic ads to children. https://en.softonic.com/articles/60-infected-apps-removed-from-google-play-store-for-displaying-pornographic-ads-to-children. (2018).
[46]
Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, and Shaodong Zhang. 2018. How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?. In Proceedings of the 19th International Workshop on Mobile Computing Systems and Applications (HotMobile).
[47]
Justin Duino. 2017. Google set to remove apps from Play Store that use Accessibility Services not designed for users with disabilities. https://9to5google.com/2017/11/12/apps-android-accessibility-services-removed-google-play-store/. (2017). Accessed: 2018-01-15.
[48]
Jun Gao, Li Li, Pingfan Kong, Tegawendé F Bissyandé, and Jacques Klein. 2018. On Vulnerability Evolution in Android Apps. In The 40th International Conference on Software Engineering, Poster Track (ICSE 2018).
[49]
Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, and Mira Mezini. 2017. CodeMatch: obfuscation won't conceal your repackaged app. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. ACM, 638--648.
[50]
Whitson Gordon. 2013. Google Has Started Removing Ad Blockers from the Play Store. https://lifehacker.com/5990448/google-has-started-removing-ad-blockers-from-the-play-store. (2013). Accessed: 2018-01-15.
[51]
IANS. 2017. Google has removed over 500 apps from its Play Store, read why. https://www.gadgetsnow.com/tech-news/google-has-removed-over-500-apps-from-its-play-store-read-why/articleshow/60191102.cms. (2017). Accessed: 2018-01-15.
[52]
Sean Michael Kerner. 2017. Google Removes Three Fake Bitcoin Wallet Apps From Google Play. http://www.eweek.com/security/google-removes-three-fake-bitcoin-wallet-apps-from-google-play. (2017). Accessed: 2018-01-15.
[53]
Swati Khandelwal. 2017. Over 500 Android Apps On Google Play Store Found Spying On 100 Million Users. https://thehackernews.com/2017/08/android-spyware-malware.html. (2017). Accessed: 2018-01-15.
[54]
Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick Mcdaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In Proceedings of the 37th International Conference on Software Engineering (ICSE 2015).
[55]
Li Li, Tegawendé F Bissyandé, Jacques Klein, and Yves Le Traon. 2016. An Investigation into the Use of Common Libraries in Android Apps. In The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016).
[56]
Li Li, Tegawendé F Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Yves Le Traon. 2017. Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology (2017).
[57]
Li Li, Daoyuan Li, Tegawendé F Bissyandé, Jacques Klein, Haipeng Cai, David Lo, and Yves Le Traon. 2017. On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology (2017).
[58]
Li Li, Daoyuan Li, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, David Lo, and Lorenzo Cavallaro. 2017. Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics & Security (TIFS) (2017).
[59]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. {n. d.}. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of UbiComp '12. 501--510.
[60]
Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. {n. d.}. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of SOUPS '14. 199--212.
[61]
Minxing Liu, Haoyu Wang, Yao Guo, and Jason Hong. 2016. Identifying and analyzing the privacy of apps for kids. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 105--110.
[62]
Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen. 2016. Libradar: Fast and accurate detection of third-party libraries in android apps. In Proceedings of the 38th International Conference on Software Engineering Companion. ACM, 653--656.
[63]
Francisco Memoria. 2017. Google Kicks Malicious Bitcoin Exchange Apps from Play Store. https://www.ccn.com/two-malicious-poloniex-exchange-apps-removed-from-google-play-store/. (2017). Accessed: 2018-01-15.
[64]
Alfred Ng. 2017. Google purges malicious Android apps with millions of downloads. https://www.cnet.com/news/google-removes-android-malware-downloaded-up-to-5-9m-times/. (2017). Accessed: 2018-01-15.
[65]
Thuy Ong. 2017. Google removes 300 Android apps that secretly hijacked phones for DDoS attacks. https://www.theverge.com/2017/8/29/16219426/google-removes-apps-play-store-hijack-phones-ddos-attacks. (2017). Accessed: 2018-01-15.
[66]
Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHY-PER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium, Vol. 2013.
[67]
Thanasis Petsas, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P Markatos, and Thomas Karagiannis. 2017. Measurement, modeling, and analysis of the mobile app ecosystem. ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS) 2, 2 (2017), 7.
[68]
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, and Zhong Chen. 2014. Autocog: Measuring the description-to-permission fidelity in android applications. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1354--1365.
[69]
Irwin Reyes, Primal Wiesekera, Abbas Razaghpanah, Joel Reardon, Narseo Vallina-Rodriguez, Serge Egelman, and Christian Kreibich. 2017. " Is Our Children's Apps Learning?" Automatically Detecting COPPA Violations. (2017).
[70]
Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kaafar, Anirban Mahanti, and Prasant Mohapatra. 2015. Early detection of spam mobile apps. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 949--959.
[71]
Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kaafar, Anirban Mahanti, and Prasant Mohapatra. 2017. Spam mobile apps: Characteristics, detection, and in the wild analysis. ACM Transactions on the Web (TWEB) 11, 1 (2017), 4.
[72]
Jagmeet Singh. 2017. UC Browser Removed From Google Play Store, Here's the Reason. https://gadgets.ndtv.com/apps/news/uc-browser-disappears-from-google-play-store-ucweb-1775697. (2017). Accessed: 2018-01-15.
[73]
Tom Spring. 2017. Apps Infected With SonicSpy Spyware Removed From Google Play. https://threatpost.com/apps-infected-with-sonicspy-spyware-removed-from-google-play/127406/. (2017). Accessed: 2018-01-15.
[74]
Vincent F Taylor and Ivan Martinovic. 2017. To update or not to update: Insights from a two-year study of Android app evolution. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 45--57.
[75]
time. 2017. Google Gets Rid of Infected Android Apps After Millions Download Malware. http://time.com/4941968/google-infected-android-apps-malware/.(2017). Accessed: 2018-01-15.
[76]
Liam Tung. 2017. Chat apps laced with spyware removed from Google Play. https://www.cso.com.au/article/625996/chat-apps-laced-spyware-removed-from-google-play/. (2017). Accessed: 2018-01-15.
[77]
Jonathan Vanian. 2017. Google Kicks 500 Apps Off Online Store Over Spyware Concerns. http://fortune.com/2017/08/22/google-spyware-play-online/. (2017). Accessed: 2018-01-15.
[78]
Nicolas Viennot, Edward Garcia, and Jason Nieh. 2014. A measurement study of google play. In ACM SIGMETRICS Performance Evaluation Review, Vol. 42. ACM, 221--233.
[79]
Haoyu Wang and Yao Guo. 2017. Understanding Third-party Libraries in Mobile App Analysis. In Proceedings of the 39th International Conference on Software Engineering Companion (ICSE-C '17). 515--516.
[80]
Haoyu Wang, Yao Guo, Ziang Ma, and Xiangqun Chen. 2015. Wukong: A scalable and accurate two-phase approach to android app clone detection. In Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 71--82.
[81]
Haoyu Wang, Jason I. Hong, and Yao Guo. 2015. Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps. In The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015). 1107--1118.
[82]
Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, and Jason I. Hong. 2017. Understanding the Purpose of Permission Use in Mobile Apps. ACM Trans. Inf. Syst. 35, 4, Article 43 (July 2017), 40 pages.
[83]
Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, and Jason Hong. 2017. An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective. In Proceedings of the 26th International Conference on World Wide Web. 163--172.
[84]
Tingting Wang, Di Wu, Jiaming Zhang, Min Chen, and Yipeng Zhou. 2016. Measuring and Analyzing Third-Party Mobile Game App Stores in China. IEEE Transactions on Network and Service Management 13, 4 (2016), 793--805.
[85]
Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, and Wu Zhou. 2017. Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 252--276.
[86]
Minda Zetlin. 2017. 300 Google Play Store Apps Are Discovered to Contain Malware. https://www.inc.com/minda-zetlin/300-google-play-store-apps-are-discovered-to-conta.html. (2017). Accessed: 2018-01-15.
[87]
Min Zheng, Patrick PC Lee, and John CS Lui. 2012. ADAM: an automatic and extensible platform to stress test android anti-virus systems. In International conference on detection of intrusions and malware, and vulnerability assessment. 82--101.
[88]
Yajin Zhou and Xuxian Jiang. 2012. Dissecting android malware: Characterization and evolution. In Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 95--109.
[89]
Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In NDSS, Vol. 25. 50--52.
[90]
Zeljka Zorz. 2018. 36 fake security apps removed from Google Play. https://www.helpnetsecurity.com/2018/01/04/fake-security-apps-google-play/. (2018). Accessed: 2018-01-15.

Cited By

View all
  • (2024)Empowering User Security Awareness and Risk Assessment Within Gamified Smartphone EnvironmentEntertainment Computing – ICEC 202410.1007/978-3-031-74353-5_2(16-34)Online publication date: 27-Sep-2024
  • (2023)One size does not fit allProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620555(5683-5700)Online publication date: 9-Aug-2023
  • (2023)Reprint of: Platform competition in the tablet PC market: The effect of application qualityInternational Journal of Industrial Organization10.1016/j.ijindorg.2023.10298989(102989)Online publication date: Jul-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MSR '18: Proceedings of the 15th International Conference on Mining Software Repositories
May 2018
627 pages
ISBN:9781450357166
DOI:10.1145/3196398
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 May 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android
  2. app mining
  3. app store
  4. malware

Qualifiers

  • Research-article

Conference

ICSE '18
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Empowering User Security Awareness and Risk Assessment Within Gamified Smartphone EnvironmentEntertainment Computing – ICEC 202410.1007/978-3-031-74353-5_2(16-34)Online publication date: 27-Sep-2024
  • (2023)One size does not fit allProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620555(5683-5700)Online publication date: 9-Aug-2023
  • (2023)Reprint of: Platform competition in the tablet PC market: The effect of application qualityInternational Journal of Industrial Organization10.1016/j.ijindorg.2023.10298989(102989)Online publication date: Jul-2023
  • (2022)Topluluk Öğrenme ile Google Uygulamalarının İçerik Derecelendirmelerini Analiz EtmeEl-Cezeri Fen ve Mühendislik Dergisi10.31202/ecjse.1059822Online publication date: 3-Jul-2022
  • (2022)MalRadarProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35309066:2(1-27)Online publication date: 6-Jun-2022
  • (2022)Early detection of violating Mobile Apps: A data-driven predictive model approachSystems and Soft Computing10.1016/j.sasc.2022.2000454(200045)Online publication date: Dec-2022
  • (2021)Pandemic platform governance: Mapping the global ecosystem of COVID-19 response appsInternet Policy Review10.14763/2021.3.156810:3Online publication date: 6-Aug-2021
  • (2021)Rebooting Research on Detecting Repackaged Android Apps: Literature Review and BenchmarkIEEE Transactions on Software Engineering10.1109/TSE.2019.290167947:4(676-693)Online publication date: 1-Apr-2021
  • (2021)PPChecker: Towards Accessing the Trustworthiness of Android Apps’ Privacy PoliciesIEEE Transactions on Software Engineering10.1109/TSE.2018.288687547:2(221-242)Online publication date: 1-Feb-2021
  • (2021)How Did That Get In My Phone? Unwanted App Distribution on Android Devices2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00041(53-69)Online publication date: May-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media