[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3487552.3487837acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article
Public Access

RacketStore: measurements of ASO deception in Google play via mobile and app usage

Published: 02 November 2021 Publication History

Abstract

Online app search optimization (ASO) platforms that provide bulk installs and fake reviews for paying app developers in order to fraudulently boost their search rank in app stores, were shown to employ diverse and complex strategies that successfully evade state-of-the-art detection methods. In this paper we introduce RacketStore, a platform to collect data from Android devices of participating ASO providers and regular users, on their interactions with apps which they install from the Google Play Store. We present measurements from a study of 943 installs of RacketStore on 803 unique devices controlled by ASO providers and regular users, that consists of 58,362,249 data snapshots collected from these devices, the 12,341 apps installed on them and their 110,511,637 Google Play reviews. We reveal significant differences between ASO providers and regular users in terms of the number and types of user accounts registered on their devices, the number of apps they review, and the intervals between the installation times of apps and their review times. We leverage these insights to introduce features that model the usage of apps and devices, and show that they can train supervised learning algorithms to detect paid app installs and fake reviews with an F1-measure of 99.72% (AUC above 0.99), and detect devices controlled by ASO providers with an F1-measure of 95.29% (AUC = 0.95). We discuss the costs associated with evading detection by our classifiers and also the potential for app stores to use our approach to detect ASO work with privacy.

References

[1]
[n. d.]. 15 U.S. Code § 45 - Unfair methods of competition unlawful; prevention by Commission. Legal Information Institute, https://www.law.cornell.edu/uscode/text/15/45.
[2]
[n. d.]. Apple Media Services Terms and Conditions. https://www.apple.com/legal/internet-services/itunes/us/terms.html.
[3]
[n. d.]. Boostyourapps: Buy App Reviews and Get Installs and Rating for Free. https://boostyourapps.org/.
[4]
[n. d.]. Deploy machine learning models on mobile and IoT devices. https://www.tensorflow.org/lite.
[5]
[n. d.]. Google Digital Wellbeing. https://wellbeing.google/tools/.
[6]
[n. d.]. Google Play. https://play.google.com/store?hl=en.
[7]
[n. d.]. MobiASO: Mobile App Marketing Agency. https://mobiaso.com/.
[8]
[n. d.]. Number of Android apps on Google Play: 2,969,894. AppBrain, https://www.appbrain.com/stats/number-of-android-apps, month=.
[9]
[n. d.]. Permissions Overview. https://bit.ly/2x4HKiW.
[10]
[n. d.]. RacketStore Code. https://github.com/nestorghh/racketstore.
[11]
[n. d.]. Ratings and Reviews on the Play Store. https://play.google.com/about/comment-posting-policy/.
[12]
[n. d.]. Retention Rate Meaning. https://www.adjust.com/glossary/retention-rate/.
[13]
[n. d.]. TapJoy: Mobile Advertising and App Monetization Platform. https://www.tapjoy.com/.
[14]
[n. d.]. Untrue, misleading or unauthorized use of tests and testimonials. https://www.competitionbureau.gc.ca/eic/site/cb-bc.nsf/eng/00527.html.
[15]
[n. d.]. VirusTotal. https://www.virustotal.com/gui/home.
[16]
2005. Directive 2005/29/EC of the European Parliament and of the Council. Official Journal of the European Union, https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2005:149:0022:0039:en:PDF.
[17]
2012. Cell phone culture: How cultural differences affect mobile use. CNN Business, https://www.cnn.com/2012/09/27/tech/mobile-culture-usage/.
[18]
2018. Freedom on the Net, Bangladesh. Freedom House, https://freedomhouse.org/report/freedom-net/2018/bangladesh.
[19]
2018. Journalists, activists in Bangladesh arrested under ICT Act for posting on social media. AccessNow, https://www.accessnow.org/bangladesh-ict-act/.
[20]
2018. No Place for Criticism. Bangladesh Crackdown on Social Media Commentary. https://www.hrw.org/report/2018/05/09/no-place-criticism/bangladesh-crackdown-social-media-commentary.
[21]
2020. AndroidID., https://developer.android.com/reference/android/provider/Settings.Secure.html#ANDROID_ID.
[22]
2020. Mobile Application Market Size, and Trends Analysis Report By Store Type (Google Store, Apple Store), By Application (Gaming, Music and Entertainment, Health and Fitness), By Region, And Segment Forecasts, 2020 - 2027. https://www.grandviewresearch.com/industry-analysis/mobile-application-market.
[23]
2020. Privacy, Security, and Deception. Developer Policy Center, https://play.google.com/about/privacy-security-deception/user-data/.
[24]
2021. Mobile App Download and Usage Statistics (2021). BuildFire, https://buildfire.com/app-statistics/.
[25]
2021. What is App Store Optimization? Ultimate Guide to ASO in 2021. App Radar, https://appradar.com/academy/aso-basics/what-is-app-store-optimization-aso.
[26]
Syed Ishtiaque Ahmed, Md. Romael Haque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). 906--918.
[27]
Prudhvi Ratna Badri Satya, Kyumin Lee, Dongwon Lee, Thanh Tran, and Jason (Jiasheng) Zhang. 2016. Uncovering Fake Likers in Online Social Networks. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (CIKM '16). Association for Computing Machinery, New York, NY, USA, 2365--2370.
[28]
Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. 2013. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In Proceedings of the 22nd International Conference on World Wide Web (WWW '13). Association for Computing Machinery, New York, NY, USA, 119--130.
[29]
A. Bianchi, J. Corbetta, L. Invernizzi, Y. Fratantonio, C. Kruegel, and G. Vigna. 2015. What the App is That? Deception and Countermeasures in the Android User Interface. In 2015 IEEE Symposium on Security and Privacy. 931--948.
[30]
Dearbhail Bracken-Roche, Emily Bell, Mary Ellen Macdonald, and Eric Racine. 2017. The concept of 'vulnerability'in research ethics: an in-depth analysis of policies and guidelines. Health research policy and systems 15, 1 (2017), 8.
[31]
Leo Breiman. 2001. Random Forests. Mach. Learn. 45, 1 (2001), 5--32.
[32]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). Association for Computing Machinery, New York, NY, USA, 477--488.
[33]
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research 16 (2002).
[34]
Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner. 2012. Measuring User Confidence in Smartphone Security and Privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). Association for Computing Machinery, New York, NY, USA, Article 1, 16 pages.
[35]
Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, and M. Zubair Shafiq. 2014. Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). Association for Computing Machinery, New York, NY, USA, 129--136.
[36]
Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, and Alex C. Snoeren. 2017. Exploring the Dynamics of Search Advertiser Fraud. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). Association for Computing Machinery, New York, NY, USA, 157--170.
[37]
Yingtong Dou, Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo, and Philip S. Yu. 2019. Uncovering Download Fraud Activities in Mobile App Markets. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '19). Association for Computing Machinery, New York, NY, USA, 671--678.
[38]
Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, and Narseo Vallina-Rodriguez. 2020. Understanding Incentivized Mobile App Installs on Google Play Store. In Proceedings of the ACM Internet Measurement Conference (IMC '20). Association for Computing Machinery, New York, NY, USA, 696--709.
[39]
Amir Fayazi, Kyumin Lee, James Caverlee, and Anna Squicciarini. 2015. Uncovering Crowdsourced Manipulation of Online Reviews. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '15). Association for Computing Machinery, New York, NY, USA, 233--242.
[40]
G Fei, A Mukherjee, B Liu, M Hsu, M Castellanos, and R Ghosh. 2013. Exploiting burstiness in reviews for review spammer detection. In Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013. 175--184.
[41]
Michael Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, and Xuxian Jiang. 2012. Riskranker: scalable and accurate zero-day android malware detection. In Proceedings of the 10th international conference on Mobile systems, applications, and services. 281--294.
[42]
Stephan Günnemann, Nikou Günnemann, and Christos Faloutsos. 2014. Detecting Anomalies in Dynamic Rating Data: A Robust Probabilistic Model for Rating Evolution. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14). Association for Computing Machinery, New York, NY, USA, 841--850.
[43]
Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, and Bogdan Carbunar. 2018. Fraud De-Anonymization for Fun and Profit. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 115--130.
[44]
Atefeh Heydari, Mohammadali Tavakoli, and Naomie Salim. 2016. Detection of Fake Opinions Using Time Series. Expert Syst. Appl. 58, C (Oct. 2016), 83--92.
[45]
Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2015. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. CoRR abs/1511.06030. arXiv:1511.06030 http://arxiv.org/abs/1511.06030
[46]
Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, and Guoai Xu. 2020. Mobile App Squatting. In Proceedings of The Web Conference 2020 (WWW '20). Association for Computing Machinery, New York, NY, USA, 1727--1738.
[47]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E. Grinter. 2010. Postcolonial Computing: A Lens on Design and Development. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). 1311--1320.
[48]
Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2014. Inferring Strange Behavior from Connectivity Pattern in Social Networks. In Advances in Knowledge Discovery and Data Mining, Vincent S. Tseng, Tu Bao Ho, Zhi-Hua Zhou, Arbee L. P. Chen, and Hung-Yu Kao (Eds.).
[49]
Dave Johnson. 2020. How to check your app usage stats an Android device to figure out which apps you spend the most battery, data, and time on. Business Insider, https://www.businessinsider.com/how-to-check-app-usage-on-android.
[50]
Parisa Kaghazgaran, James Caverlee, and Anna Squicciarini. 2018. Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). Association for Computing Machinery, New York, NY, USA, 306--314.
[51]
Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee, and Jidong Shao. 2017. Bimodal Distribution and Co-Bursting in Review Spam Detection. In Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 1063--1072.
[52]
Shanshan Li, James Caverlee, Wei Niu, and Parisa Kaghazgaran. 2017. Crowdsourced App Review Manipulation. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '17). Association for Computing Machinery, New York, NY, USA, 1137--1140.
[53]
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Liu, and Hady Wirawan Lauw. 2010. Detecting Product Review Spammers Using Rating Behaviors. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM '10). Association for Computing Machinery, New York, NY, USA, 939--948.
[54]
Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. 2018. Using Loops For Malware Classification Resilient to Feature-Unaware Perturbations. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18). Association for Computing Machinery, New York, NY, USA, 112--123.
[55]
Ariana Mirian, Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Kurt Thomas. 2019. Hack for Hire: Exploring the Emerging Market for Account Hijacking. In The World Wide Web Conference (WWW '19). Association for Computing Machinery, New York, NY, USA, 1279--1289.
[56]
James A Muir and PC Van Oorschot. 2006. Internet geolocation and evasion. Ottawa: School of Computer Science, Carleton University (2006).
[57]
Arjun Mukherjee, Abhinav Kumar, Bing Liu, Junhui Wang, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. 2013. Spotting Opinion Spammers Using Behavioral Footprints. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '13). Association for Computing Machinery, New York, NY, USA, 632--640.
[58]
Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie Glance. 2013. What Yelp Fake Review Filter Might Be Doing? https://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/view/6006
[59]
Shirin Nilizadeh, Hojjat Aghakhani, Eric Gustafson, Christopher Kruegel, and Giovanni Vigna. 2019. Think Outside the Dataset: Finding Fraudulent Reviews Using Cross-Dataset Analysis. In The World Wide Web Conference (WWW '19). Association for Computing Machinery, New York, NY, USA, 3108--3115.
[60]
Dario Nisi, Antonio Bianchi, and Yanick Fratantonio. 2019. Exploring Syscall-Based Semantics Reconstruction of Android Applications. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 517--531. https://www.usenix.org/conference/raid2019/presentation/nisi
[61]
Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, and Gianluca Stringhini. 2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secur. 22, 2, Article 14 (April 2019), 34 pages.
[62]
Joyojeet Pal, Meera Lakshmanan, and Kentaro Toyama. 2009. "My child will be respected": Parental perspectives on computers and education in Rural India. Information Systems Frontiers 11, 2 (2009), 129--144.
[63]
TE Parliament. 2016. Regulation (eu) 2016/679 of the european parliament and of the council. Official Journal of the European Union (2016).
[64]
Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 729--746. https://www.usenix.org/conference/usenixsecurity19/presentation/pendlebury
[65]
Mizanur Rahman, Nestor Hernandez, Bogdan Carbunar, and Duen Horng Chau. 2018. Search Rank Fraud De-Anonymization in Online Systems. In Proceedings of ACM Conference on Hypertext and Social Media.
[66]
Mizanur Rahman, Nestor Hernandez, Bogdan Carbunar, and Duen Horng Chau. 2020. Towards De-Anonymization of Google Play Search Rank Fraud. IEEE Transactions on Knowledge and Data Engineering (2020), 1--1.
[67]
Mizanur Rahman, Nestor Hernandez, Ruben Recabarren, Syed Ishtiaque Ahmed, and Bogdan Carbunar. 2019. The Art and Craft of Fraudulent App Promotion in Google Play. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2437--2454.
[68]
Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, and Polo Chau. 2017. Search Rank Fraud and Malware Detection in Google Play. IEEE Transactions on Knowledge and Data Engineering 29, 6 (2017).
[69]
Siegfried Rasthofer, Steven Arzt, Marc Miltenberger, and Eric Bodden. 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016. The Internet Society. https://bit.ly/38ZZ4qe
[70]
Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 603--620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
[71]
Laura Shipp and Jorge Blasco Alis. 2020. How private is your period?: A systematic analysis of menstrual app privacy policies. In Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020), Vol. 2020(4). 491--510.
[72]
Jonghyuk Song, Sangho Lee, and Jong Kim. 2015. CrowdTarget: Target-Based Detection of Crowdturfing in Online Social Networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). Association for Computing Machinery, New York, NY, USA, 793--804.
[73]
Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 563--578. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/stringhini
[74]
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y. Zhao. 2013. Follow the Green: Growth and Dynamics in Twitter Follower Markets. In Proceedings of the 2013 Conference on Internet Measurement Conference (IMC '13). Association for Computing Machinery, New York, NY, USA, 163--176.
[75]
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended Accounts in Retrospect: An Analysis of Twitter Spam. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11). Association for Computing Machinery, New York, NY, USA, 243--258.
[76]
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of the 22nd USENIX Conference on Security (SEC'13). USENIX Association, USA, 195--210.
[77]
Ben Thorn. 2019. Fake Reviews and the Australian Consumer Law. https://xuveo.legal/blog/fake-reviews-australian-consumer-law.
[78]
Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, and Tong Zhang. 2015. Crowd Fraud Detection in Internet Advertising. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 1100--1110.
[79]
Virus Total. 2012. Virustotal-free online virus, malware and url scanner. Online: https://www.virustotal.com/en (2012).
[80]
Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, and Guoai Xu. 2018. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). Association for Computing Machinery, New York, NY, USA, 293--307.
[81]
Ji Wang, Jianguo Zhang, Weidong Bao, Xiaomin Zhu, Bokai Cao, and Philip S. Yu. 2018. Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '18). Association for Computing Machinery, New York, NY, USA, 2407--2416.
[82]
C. Wei and B. E. Kolko. 2005. Studying mobile phone use in context: cultural, political, and economic dimensions of mobile phone use. In IPCC 2005.
[83]
Madeleine Wilson. 2019. How to Improve App Ratings and Reviews. Apptentive, https://www.apptentive.com/blog/2019/08/22/improve-mobile-app-ratings-and-reviews/.
[84]
Sihong Xie, Guan Wang, Shuyang Lin, and Philip S. Yu. 2012. Review Spam Detection via Temporal Pattern Discovery. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '12). Association for Computing Machinery, New York, NY, USA, 823--831.
[85]
Zhen Xie and Sencun Zhu. 2014. GroupTie: Toward Hidden Collusion Group Discovery in App Stores. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14). Association for Computing Machinery, New York, NY, USA, 153--164.
[86]
Zhen Xie and Sencun Zhu. 2015. AppWatcher: Unveiling the Underground Market of Trading Mobile App Reviews. In Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '15). Association for Computing Machinery, New York, NY, USA, Article 10, 11 pages.
[87]
Zhen Xie, Sencun Zhu, Qing Li, and Wenjing Wang. 2016. You Can Promote, but You Can't Hide: Large-Scale Abused App Detection in Mobile App Stores. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC '16). Association for Computing Machinery, New York, NY, USA, 374--385.
[88]
Chang Xu. 2013. Detecting Collusive Spammers in Online Review Communities (PIKM '13). Association for Computing Machinery, New York, NY, USA, 33--40.
[89]
Chang Xu and Jie Zhang. [n. d.]. Combating Product Review Spam Campaigns via Multiple Heterogeneous Pairwise Features. In Proceedings of the 2015 SIAM International Conference on Data Mining. 172--180.
[90]
Xu, Teng and Goossen, Gerard and Cevahir, Huseyin Kerem and Khodeir, Sara and Jin, Yingyezhe and Li, Frank and Shan, Shawn and Patel, Sagar and Freeman, David and Pearce, Paul. 2021. Deep Entity Classification: Abusive Account Detection for Online Social Networks. In Usenix Security Symposium.
[91]
Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. 2015. Appcontext: Differentiating malicious and benign mobile app behaviors using context. In 37th IEEE International Conference on Software Engineering, Vol. 1. 303--313.
[92]
Junting Ye, Santhosh Kumar, and Leman Akoglu. 2016. Temporal Opinion Spam Detection by Multivariate Indicative Signals. In Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016. 743--746.
[93]
Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. 2019. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). Association for Computing Machinery, New York, NY, USA, 1423--1438.
[94]
Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith W. Ross. 2018. Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018.
[95]
Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In Network and Distributed System Security Symposium, NDSS, Vol. 25. 50--52.

Cited By

View all
  • (2024)E-SERS: An Enhanced Approach to Trust-Based Ranking of AppsSoftware10.3390/software30300133:3(250-270)Online publication date: 13-Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '21: Proceedings of the 21st ACM Internet Measurement Conference
November 2021
768 pages
ISBN:9781450391290
DOI:10.1145/3487552
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • USENIX Assoc: USENIX Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. app store optimization
  2. crowdturfing
  3. fake review
  4. opinion spam

Qualifiers

  • Research-article

Funding Sources

Conference

IMC '21
IMC '21: ACM Internet Measurement Conference
November 2 - 4, 2021
Virtual Event

Acceptance Rates

Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)160
  • Downloads (Last 6 weeks)36
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)E-SERS: An Enhanced Approach to Trust-Based Ranking of AppsSoftware10.3390/software30300133:3(250-270)Online publication date: 13-Jul-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media