[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Free access
Just Accepted

LLM App Store Analysis: A Vision and Roadmap

Online AM: 14 December 2024 Publication History

Abstract

The rapid growth and popularity of large language model (LLM) app stores have created new opportunities and challenges for researchers, developers, users, and app store managers. As the LLM app ecosystem continues to evolve, it is crucial to understand the current landscape and identify potential areas for future research and development. This paper presents a forward-looking analysis of LLM app stores, focusing on key aspects such as data mining, security risk identification, development assistance, and market dynamics. Our comprehensive examination extends to the intricate relationships between various stakeholders and the technological advancements driving the ecosystem’s growth. We explore the ethical considerations and potential societal impacts of widespread LLM app adoption, highlighting the need for responsible innovation and governance frameworks. By examining these aspects, we aim to provide a vision for future research directions and highlight the importance of collaboration among stakeholders to address the challenges and opportunities within the LLM app ecosystem. The insights and recommendations provided in this paper serve as a foundation for driving innovation, ensuring responsible development, and creating a thriving, user-centric LLM app landscape.

References

[1]
[n. d.]. About Google. https://about.google. Accessed: 2024-09-23.
[2]
[n. d.]. Bing. https://www.bing.com. Accessed: 2024-09-23.
[3]
[n. d.]. Reddit. https://www.reddit.com. Accessed: 2024-09-23.
[4]
[n. d.]. X Corp. https://en.wikipedia.org/wiki/X_Corp. Accessed: 2024-09-23.
[5]
2024. ByteDance’s CapCut, Doubao top global AI app downloads, outpacing ChatGPT: report. Available online. https://www.scmp.com/tech/big-tech/article/3275336/bytedances-capcut-doubao-top-global-ai-app-downloads-outpacing-chatgpt-report, Accessed: 2024-09-23.
[6]
Hilmi Abdullah and Subhi RM Zeebaree. 2021. Android mobile applications vulnerabilities and prevention methods: A review. 2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) (2021), 148–153.
[7]
Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al. 2023. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023).
[8]
Chub AI. 2024. Chub Venus AI. https://www.chub.ai.
[9]
Crushon AI. 2024. Crushon.AI. https://crushon.ai.
[10]
Afnan A. Al-Subaihin, Federica Sarro, Sue Black, and Licia Capra. 2019. Empirical comparison of text-based mobile apps similarity measurement techniques. Empir. Softw. Eng. 24, 6 (2019), 3290–3315. https://doi.org/10.1007/S10664-019-09726-5
[11]
Suad A Alasadi and Wesam S Bhaya. 2017. Review of data preprocessing techniques in data mining. Journal of Engineering and Applied Sciences 12, 16 (2017), 4102–4107.
[12]
Hazim Almuhimedi, Florian Schaub, Norman M. Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, April 18-23, 2015, Bo Begole, Jinwoo Kim, Kori Inkpen, and Woontack Woo (Eds.). ACM, 787–796. https://doi.org/10.1145/2702123.2702210
[13]
Sagiv Antebi, Noam Azulay, Edan Habler, Ben Ganon, Asaf Shabtai, and Yuval Elovici. 2024. GPT in Sheep’s Clothing: The Risk of Customized GPTs. CoRR abs/2401.09075 (2024). https://doi.org/10.48550/ARXIV.2401.09075 arXiv:2401.09075
[14]
Apple. 2021. App Store Small Business Program. https://developer.apple.com/app-store/small-business-program/.
[15]
Apple. 2021. Human Interface Guidelines. https://developer.apple.com/design/human-interface-guidelines/.
[16]
Apple. 2024. Apple App Store. https://apps.apple.com/sg/genre/ios/id36.
[17]
Apple. 2024. We’re committed to protecting your data. https://www.apple.com/privacy/features/.
[18]
Simon Arvidsson and Johan Axell. 2023. Prompt engineering guidelines for LLMs in Requirements Engineering. (2023).
[19]
Israel Ayliffe. 2024. Personalized Learning Assistant. https://chatgpt.com/g/g-FRJZT5qlV-personalized-learning-assistant.
[20]
Michael Backes, Sven Bugiel, Erik Derr, and Christian Hammer. 2014. Taking Android app vetting to the next level with path-sensitive value analysis. (2014).
[21]
Jinze Bai, Shuai Bai, Yunfei Chu, Zeyu Cui, Kai Dang, Xiaodong Deng, Yang Fan, Wenbin Ge, Yu Han, Fei Huang, Binyuan Hui, Luo Ji, Mei Li, Junyang Lin, Runji Lin, Dayiheng Liu, Gao Liu, Chengqiang Lu, Keming Lu, Jianxin Ma, Rui Men, Xingzhang Ren, Xuancheng Ren, Chuanqi Tan, Sinan Tan, Jianhong Tu, Peng Wang, Shijie Wang, Wei Wang, Shengguang Wu, Benfeng Xu, Jin Xu, An Yang, Hao Yang, Jian Yang, Shusheng Yang, Yang Yao, Bowen Yu, Hongyi Yuan, Zheng Yuan, Jianwei Zhang, Xingxuan Zhang, Yichang Zhang, Zhenru Zhang, Chang Zhou, Jingren Zhou, Xiaohuan Zhou, and Tianhang Zhu. 2023. Qwen Technical Report. CoRR abs/2309.16609 (2023). https://doi.org/10.48550/ARXIV.2309.16609 arXiv:2309.16609
[22]
Baidu. 2024. ERNIE Bot. https://yiyan.baidu.com/agent-square.
[23]
Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. In Workshop on Usable Security. Citeseer, 1–10.
[24]
Dan M Brown. 2010. Communicating design: developing web site documentation for design and planning. New Riders.
[25]
Hao Chen, Daojing He, Sencun Zhu, and Jingshun Yang. 2017. Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, and Xun Yi (Eds.). ACM, 58–70. https://doi.org/10.1145/3052973.3053022
[26]
Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, and Lihua Xu. 2018. Are mobile banking apps secure? what can be improved?. In Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04-09, 2018, Gary T. Leavens, Alessandro Garcia, and Corina S. Pasareanu (Eds.). ACM, 797–802. https://doi.org/10.1145/3236024.3275523
[27]
Sen Chen, Yuxin Zhang, Lingling Fan, Jiaming Li, and Yang Liu. 2022. AUSERA: Automated Security Vulnerability Detection for Android Apps. In 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, Rochester, MI, USA, October 10-14, 2022. ACM, 154:1–154:5. https://doi.org/10.1145/3551349.3559524
[28]
Taenam Cho, Seung-Hyun Seo, and Nammee Moon. 2012. Double Code-signing for Enhanced Android Application Security. International Information Institute (Tokyo). Information 15, 5 (2012), 1913.
[29]
Mike Cohn. 2004. User stories applied: For agile software development. Addison-Wesley Professional.
[30]
Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, and Giovanni Vigna. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/obfuscation-resilient-privacy-leak-detection-mobile-apps-through-differential-analysis/
[31]
David Cooper, Andrew Regenscheid, Murugiah Souppaya, Christopher Bean, Mike Boyle, Dorothy Cooley, and Michael Jenkins. 2018. Security considerations for code signing. NIST Cybersecurity White Paper (2018).
[32]
Coze. 2024. Coze. https://www.coze.com/.
[33]
Bonnie Eisenman. 2015. Learning react native: Building native mobile apps with JavaScript. “O’Reilly Media, Inc.”.
[34]
Hugging Face. 2024. HuggingChat. https://huggingface.co/chat/assistants.
[35]
Álvaro Feal, Julien Gamba, Juan Tapiador, Primal Wijesekera, Joel Reardon, Serge Egelman, and Narseo Vallina-Rodriguez. 2021. Don’t accept candy from strangers: An analysis of third-party mobile sdks. Data Protection and Privacy: Data Protection and Artificial Intelligence 13 (2021), 1.
[36]
Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason I. Hong, and Norman M. Sadeh. 2013. Why people hate your app: making sense of user feedback in a mobile app store. In The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013, Inderjit S. Dhillon, Yehuda Koren, Rayid Ghani, Ted E. Senator, Paul Bradley, Rajesh Parekh, Jingrui He, Robert L. Grossman, and Ramasamy Uthurusamy (Eds.). ACM, 1276–1284. https://doi.org/10.1145/2487575.2488202
[37]
Salvador García, Julián Luengo, and Francisco Herrera. 2015. Data Preprocessing in Data Mining. Intelligent Systems Reference Library, Vol. 72. Springer. https://doi.org/10.1007/978-3-319-10247-4
[38]
Tao Ge, Jing Hu, Lei Wang, Xun Wang, Si-Qing Chen, and Furu Wei. 2024. In-context Autoencoder for Context Compression in a Large Language Model. In The Twelfth International Conference on Learning Representations, ICLR 2024, Vienna, Austria, May 7-11, 2024. OpenReview.net. https://openreview.net/forum?id=uREj4ZuGJE
[39]
Necmiye Genc. 2019. Detection of spam review on mobile app stores, evaluation of helpfulness of user reviews and extraction of quality aspects using machine learning techniques. Ph. D. Dissertation. École de technologie supérieure.
[40]
Hugo Gonzalez, Natalia Stakhanova, and Ali A. Ghorbani. 2014. DroidKin: Lightweight Detection of Android Apps Similarity. In International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 152), Jing Tian, Jiwu Jing, and Mudhakar Srivatsa (Eds.). Springer, 436–453. https://doi.org/10.1007/978-3-319-23829-6_30
[41]
Google. 2021. Espresso. https://developer.android.com/training/testing/espresso.
[42]
Google. 2021. Material Design. https://material.io/design.
[43]
Google. 2024. Google Play. https://play.google.com/store/app.
[44]
GPTStore.AI. 2024. GPTStore.AI. https://gptstore.ai/gpts.
[45]
Ingka Group. 2024. IKEA launches new AI-powered assistant in OpenAI GPT Store. https://www.ingka.com/newsroom/ikea-launches-new-ai-powered-assistant-in-openai-gpt-store/.
[46]
Jiaping Gui, Stuart McIlroy, Meiyappan Nagappan, and William G. J. Halfond. 2015. Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers. In 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1, Antonia Bertolino, Gerardo Canfora, and Sebastian G. Elbaum (Eds.). IEEE Computer Society, 100–110. https://doi.org/10.1109/ICSE.2015.32
[47]
Emitza Guzman and Walid Maalej. 2014. How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews. In IEEE 22nd International Requirements Engineering Conference, RE 2014, Karlskrona, Sweden, August 25-29, 2014, Tony Gorschek and Robyn R. Lutz (Eds.). IEEE Computer Society, 153–162. https://doi.org/10.1109/RE.2014.6912257
[48]
Hamed Haddadi, Pan Hui, and Ian Brown. 2010. MobiAd: private and scalable mobile advertising. In Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture. 33–38.
[49]
Sang Pil Han, Sungho Park, and Wonseok Oh. 2016. Mobile app analytics. MIS quarterly 40, 4 (2016), 983–1008.
[50]
Mark Harman, Yue Jia, and Yuanyuan Zhang. 2012. App store mining and analysis: MSR for app stores. In 9th IEEE Working Conference of Mining Software Repositories, MSR 2012, June 2-3, 2012, Zurich, Switzerland, Michele Lanza, Massimiliano Di Penta, and Tao Xie (Eds.). IEEE Computer Society, 108–111. https://doi.org/10.1109/MSR.2012.6224306
[51]
Qiang He, Bo Li, Feifei Chen, John C. Grundy, Xin Xia, and Yun Yang. 2022. Diversified Third-Party Library Prediction for Mobile App Development. IEEE Trans. Software Eng. 48, 2 (2022), 150–165. https://doi.org/10.1109/TSE.2020.2982154
[52]
Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, and Haoyu Wang. 2023. Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023). https://doi.org/10.48550/ARXIV.2308.10620 arXiv:2308.10620
[53]
Xinyi Hou, Yanjie Zhao, and Haoyu Wang. 2024. On the (In)Security of LLM App Stores. CoRR abs/2407.08422 (2024). https://doi.org/10.48550/ARXIV.2407.08422 arXiv:2407.08422
[54]
Xinyi Hou, Yanjie Zhao, Shenao Wang, and Haoyu Wang. 2024. GPTZoo: A Large-scale Dataset of GPTs for the Research Community. CoRR abs/2405.15630 (2024). https://doi.org/10.48550/ARXIV.2405.15630 arXiv:2405.15630
[55]
GPTs Hunter. 2024. GPTs Hunter. https://www.gptshunter.com/.
[56]
Yongkeun Hwang, Donghyeon Lee, and Kyomin Jung. 2019. Mobile app recommendation with sequential app usage behavior tracking. Journal of Internet Technology 20, 3 (2019), 827–837.
[57]
Idoubi. 2024. GPTs Works. https://gpts.works/.
[58]
Jesús Téllez Isaac and Sherali Zeadally. 2012. An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model. In Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012 (Procedia Computer Science, Vol. 10), Elhadi M. Shakshuki and Muhammad Younas (Eds.). Elsevier, 758–765. https://doi.org/10.1016/J.PROCS.2012.06.097
[59]
JanitorAI. 2024. JanitorAI. https://janitorai.com.
[60]
Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, and Ting Wang. 2018. Model-Reuse Attacks on Deep Learning Systems. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 349–363. https://doi.org/10.1145/3243734.3243757
[61]
Han Jia, Chun Guo, and Xiaozhong Liu. 2020. Smartphone and Tablet Application (App) Life Cycle Characterization via Apple App Store Rank. Data Inf. Manag. 4, 1 (2020), 44–67. https://doi.org/10.2478/DIM-2020-0002
[62]
Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, and Masakatsu Nishigaki. 2013. SanAdBox: Sandboxing third party advertising libraries in a mobile application. In Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9-13, 2013. IEEE, 2150–2154. https://doi.org/10.1109/ICC.2013.6654845
[63]
Nikita Kuzmin, Konstantin Ignatiev, and Denis Grafov. 2020. Experience of developing a mobile application using flutter. In Information Science and Applications: ICISA 2019. Springer, 571–575.
[64]
Mona Land. 2024. Mona Land. https://www.monaland.ai.
[65]
Mikyung Lee, Hyeonkyeong Lee, Youlim Kim, Junghee Kim, Mikyeong Cho, Jaeun Jang, and Hyoeun Jang. 2018. Mobile app-based health promotion programs: a systematic review of the literature. International journal of environmental research and public health 15, 12 (2018), 2838.
[66]
Barry Leiba. 2012. OAuth Web Authorization Protocol. IEEE Internet Comput. 16, 1 (2012), 74–77. https://doi.org/10.1109/MIC.2012.11
[67]
Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, and Heng Ye. 2018. Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Informatics 14, 7 (2018), 3216–3225. https://doi.org/10.1109/TII.2017.2789219
[68]
Tong Li, Yong Li, Mingyang Zhang, Sasu Tarkoma, and Pan Hui. 2023. You Are How You Use Apps: User Profiling Based on Spatiotemporal App Usage Behavior. ACM Trans. Intell. Syst. Technol. 14, 4 (2023), 71:1–71:21. https://doi.org/10.1145/3597212
[69]
Ben Light, Jean Burgess, and Stefanie Duguay. 2018. The walkthrough method: An approach to the study of apps. New Media Soc. 20, 3 (2018), 881–900. https://doi.org/10.1177/1461444816675438
[70]
Zilong Lin, Jian Cui, Xiaojing Liao, and XiaoFeng Wang. 2024. Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. In 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association. https://www.usenix.org/conference/usenixsecurity24/presentation/lin-zilong
[71]
Bin Liu, Deguang Kong, Lei Cen, Neil Zhenqiang Gong, Hongxia Jin, and Hui Xiong. 2015. Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, WSDM 2015, Shanghai, China, February 2-6, 2015, Xueqi Cheng, Hang Li, Evgeniy Gabrilovich, and Jie Tang (Eds.). ACM, 315–324. https://doi.org/10.1145/2684822.2685322
[72]
Bin Liu, Jialiu Lin, and Norman M. Sadeh. 2014. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?. In 23rd International World Wide Web Conference, WWW ’14, Seoul, Republic of Korea, April 7-11, 2014, Chin-Wan Chung, Andrei Z. Broder, Kyuseok Shim, and Torsten Suel (Eds.). ACM, 201–212. https://doi.org/10.1145/2566486.2568035
[73]
Shuang Liu, Baiyang Zhao, Renjie Guo, Guozhu Meng, Fan Zhang, and Meishan Zhang. 2021. Have You been Properly Notified? Automatic Compliance Analysis of Privacy Policy Text with GDPR Article 13. In WWW ’21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021, Jure Leskovec, Marko Grobelnik, Marc Najork, Jie Tang, and Leila Zia (Eds.). ACM / IW3C2, 2154–2164. https://doi.org/10.1145/3442381.3450022
[74]
Daniel Martens and Walid Maalej. 2019. Towards understanding and detecting fake reviews in app stores. Empir. Softw. Eng. 24, 6 (2019), 3316–3355. https://doi.org/10.1007/S10664-019-09706-9
[75]
Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, and Corrado Aaron Visaggio. 2016. I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware. In 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016. IEEE, 129–136. https://doi.org/10.1109/PST.2016.7906947
[76]
Borja Martínez-Pérez, Isabel de la Torre Díez, and Miguel López Coronado. 2015. Privacy and Security in Mobile Health Apps: A Review and Recommendations. J. Medical Syst. 39, 1 (2015), 181. https://doi.org/10.1007/S10916-014-0181-3
[77]
Joanna Milward, Zarnie Khadjesari, Stephanie Fincham-Campbell, Paolo Deluca, Rod Watson, Colin Drummond, et al. 2016. User preferences for content, features, and style for an app to reduce harmful drinking in young adults: analysis of user feedback in app stores and focus group interviews. JMIR mHealth and uHealth 4, 2 (2016), e5242.
[78]
Roberto Minelli and Michele Lanza. 2013. Software Analytics for Mobile Applications-Insights & Lessons Learned. In 17th European Conference on Software Maintenance and Reengineering, CSMR 2013, Genova, Italy, March 5-8, 2013, Anthony Cleve, Filippo Ricca, and Maura Cerioli (Eds.). IEEE Computer Society, 144–153. https://doi.org/10.1109/CSMR.2013.24
[79]
Minimax. 2024. Talkie. https://talkie-ai.com.
[80]
Puneet Mishra, Alessandra Biancolillo, Jean Michel Roger, Federico Marini, and Douglas N Rutledge. 2020. New data preprocessing trends based on ensemble of multiple preprocessing techniques. TrAC Trends in Analytical Chemistry 132 (2020), 116045.
[81]
Patrick Mutchler, Adam Doupé, John Mitchell, Chris Kruegel, and Giovanni Vigna. 2015. A large-scale study of mobile web app security. In Proceedings of the Mobile Security Technologies Workshop (MoST), Vol. 50. Association for Computing Machinery.
[82]
Preksha Nema, Pauline Anthonysamy, Nina Taft, and Sai Teja Peddinti. 2022. Analyzing User Perspectives on Mobile App Privacy at Scale. In 44th IEEE/ACM 44th International Conference on Software Engineering, ICSE 2022, Pittsburgh, PA, USA, May 25-27, 2022. ACM, 112–124. https://doi.org/10.1145/3510003.3510079
[83]
PR Newswire. 2024. FlowGPT, The Open Ecosystem AI Platform, Raises $10M. https://www.prnewswire.com/news-releases/flowgpt-the-open-ecosystem-ai-platform-raises-10m-302070574.html.
[84]
Ohai. 2024. Ohai. http://ohai.ai.
[85]
OpenAI. 2024. GPT Store. https://chat.openai.com/gpts.
[86]
OpenAI. 2024. Introducing the GPT Store. https://openai.com/index/introducing-the-gpt-store/. Accessed: September 23, 2024.
[87]
OpenAI. 2024. Introducing the GPT Store. https://openai.com/blog/introducing-the-gpt-store.
[88]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2019. Knockoff Nets: Stealing Functionality of Black-Box Models. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, Long Beach, CA, USA, June 16-20, 2019. Computer Vision Foundation / IEEE, 4954–4963. https://doi.org/10.1109/CVPR.2019.00509
[89]
Juana María Padilla-Piernas, María Concepción Parra-Meroño, and Miguel Ángel Beltrán-Bueno. 2019. The importance of app store optimization (ASO) for hospitality applications. In Digital and Social Media Marketing: Emerging Applications and Theoretical Development. Springer, 151–161.
[90]
PolyAI. 2024. PolyAI. https://poly.ai.
[91]
Chris Prosser. 2024. GPTs APP. https://gptsapp.io/.
[92]
puzzle.today. 2024. Write For Me. https://chatgpt.com/g/g-B3hgivKK9-write-for-me.
[93]
Daiyong Quan, Lidong Zhai, Fan Yang, and Peng Wang. 2014. Detection of Android Malicious Apps Based on the Sensitive Behaviors. In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014. IEEE Computer Society, 877–883. https://doi.org/10.1109/TRUSTCOM.2014.115
[94]
Quora. 2024. Poe Explore. https://poe.com/explore.
[95]
Mizanur Rahman, Nestor Hernandez, Ruben Recabarren, Syed Ishtiaque Ahmed, and Bogdan Carbunar. 2019. The Art and Craft of Fraudulent App Promotion in Google Play. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (Eds.). ACM, 2437–2454. https://doi.org/10.1145/3319535.3345658
[96]
TP Rani, S Susila Sakthy, P Kalaichelvi, S Prasanth, and S Venkatesh. 2023. Fake App Detection Using Sentiment Analysis. 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS) (2023), 1–6.
[97]
Paul M Schwartz and Daniel J Solove. 2011. The PII problem: Privacy and a new concept of personally identifiable information. NYUL rev. 86 (2011), 1814.
[98]
Semrush. 2024. flowgpt.com Website Traffic, Ranking, Analytics [August 2024] | Semrush. https://www.semrush.com/website/flowgpt.com/overview/. Accessed: September 23, 2024.
[99]
Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, and Prasant Mohapatra. 2015. Early Detection of Spam Mobile Apps. In Proceedings of the 24th International Conference on World Wide Web, WWW 2015, Florence, Italy, May 18-22, 2015, Aldo Gangemi, Stefano Leonardi, and Alessandro Panconesi (Eds.). ACM, 949–959. https://doi.org/10.1145/2736277.2741084
[100]
Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, and Kangbin Yim. 2014. Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38 (2014), 43–53. https://doi.org/10.1016/J.JNCA.2013.05.008
[101]
Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, and Ryan D. Riley. 2018. Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface. IEEE Trans. Mob. Comput. 17, 11 (2018), 2675–2688. https://doi.org/10.1109/TMC.2018.2809727
[102]
Faysal Hossain Shezan, Syeda Farzia Afroze, and Anindya Iqbal. 2017. Vulnerability detection in recent Android apps: An empirical study. In International Conference on Networking, Systems and Security, NSysS 2017, Dhaka, Bangladesh, January 5-8, 2017, Mohammad Zulkernine and Mohammad Mahfuzul Islam (Eds.). IEEE, 55–63. https://doi.org/10.1109/NSYSS.2017.7885802
[103]
Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In CHI Conference on Human Factors in Computing Systems, CHI’14, Toronto, ON, Canada - April 26 - May 01, 2014, Matt Jones, Philippe A. Palanque, Albrecht Schmidt, and Tovi Grossman (Eds.). ACM, 2347–2356. https://doi.org/10.1145/2556288.2557421
[104]
Bruno M Silva, Joel JPC Rodrigues, Fábio Canelo, Ivo C Lopes, and Liang Zhou. 2013. A data encryption solution for mobile health apps in cooperation environments. Journal of medical Internet research 15, 4 (2013), e66.
[105]
SimilarWeb. 2024. Website Analysis: character.ai. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[106]
SimilarWeb. 2024. Website Analysis: chatglm.cn. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[107]
SimilarWeb. 2024. Website Analysis: ciciai.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[108]
SimilarWeb. 2024. Website Analysis: coze.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[109]
SimilarWeb. 2024. Website Analysis: huggingface.co. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[110]
SimilarWeb. 2024. Website Analysis: poe.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[111]
SimilarWeb. 2024. Website Performance Analysis for chub.ai. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[112]
SimilarWeb. 2024. Website Performance Analysis for crushon.ai. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[113]
SimilarWeb. 2024. Website Performance Analysis for janitorai.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[114]
SimilarWeb. 2024. Website Performance Analysis for joyland.ai. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[115]
SimilarWeb. 2024. Website Performance Analysis for talkie-ai.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[116]
SimilarWeb. 2024. Website Performance Analysis for yiyan.baidu.com. Available online. https://pro.similarweb.com/, Accessed: 2024-09-23.
[117]
Hritik Soni, Pranjal Arora, and D Rajeswari. 2020. Malicious application detection in android using machine learning. In 2020 International Conference on Communication and Signal Processing (ICCSP). IEEE, 0846–0848.
[118]
Dongxun Su, Yanjie Zhao, Xinyi Hou, Shenao Wang, and Haoyu Wang. 2024. GPT Store Mining and Analysis. CoRR abs/2405.10210 (2024). https://doi.org/10.48550/ARXIV.2405.10210 arXiv:2405.10210
[119]
Fareena Sultan, Andrew J Rohm, and Tao Gao. 2009. Factors influencing consumer acceptance of mobile marketing: a two-country study of youth markets. Journal of Interactive Marketing 23, 4 (2009), 308–320.
[120]
Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, and Xiangyu Zhang. 2024. Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs. CoRR abs/2401.00905 (2024). https://doi.org/10.48550/ARXIV.2401.00905 arXiv:2401.00905
[121]
Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, and et al. 2024. Gemini: A Family of Highly Capable Multimodal Models. arXiv:2312.11805 [cs.CL] https://arxiv.org/abs/2312.11805
[122]
Arun James Thirunavukarasu, Darren Shu Jeng Ting, Kabilan Elangovan, Laura Gutierrez, Ting Fang Tan, and Daniel Shu Wei Ting. 2023. Large language models in medicine. Nature medicine 29, 8 (2023), 1930–1940.
[123]
Hugo Touvron, Thibaut Lavril, Gautier Izacard, Xavier Martinet, Marie-Anne Lachaux, Timothée Lacroix, Baptiste Rozière, Naman Goyal, Eric Hambro, Faisal Azhar, Aurélien Rodriguez, Armand Joulin, Edouard Grave, and Guillaume Lample. 2023. LLaMA: Open and Efficient Foundation Language Models. CoRR abs/2302.13971 (2023). https://doi.org/10.48550/ARXIV.2302.13971 arXiv:2302.13971
[124]
Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 601–618. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer
[125]
Zhen Tu, Yong Li, Pan Hui, Li Su, and Depeng Jin. 2020. Personalized Mobile App Recommendation by Learning User’s Interest from Social Media. IEEE Trans. Mob. Comput. 19, 11 (2020), 2670–2683. https://doi.org/10.1109/TMC.2019.2929388
[126]
Piotr K Tysowski and M Anwarul Hasan. 2013. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Transactions on Cloud Computing 1, 2 (2013), 172–186.
[127]
Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, and Florian Schaub. 2023. Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. Proc. Priv. Enhancing Technol. 2023, 1 (2023), 5–28. https://doi.org/10.56553/POPETS-2023-0002
[128]
Nishant Verma. 2017. Mobile Test Automation With Appium. Packt Publishing Ltd.
[129]
Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10, 3152676 (2017), 10–5555.
[130]
Haoyu Wang, Hao Li, and Yao Guo. 2019. Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play. In The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019, Ling Liu, Ryen W. White, Amin Mantrach, Fabrizio Silvestri, Julian J. McAuley, Ricardo Baeza-Yates, and Leila Zia (Eds.). ACM, 1988–1999. https://doi.org/10.1145/3308558.3313611
[131]
Lifan Wang and Jay Dang. 2024. FlowGPT. https://flowgpt.com/.
[132]
Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, and Dinghao Wu. 2018. Software protection on the go: a large-scale empirical study on mobile app obfuscation. In Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018, Michel Chaudron, Ivica Crnkovic, Marsha Chechik, and Mark Harman (Eds.). ACM, 26–36. https://doi.org/10.1145/3180155.3180169
[133]
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori. 2017. Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. In Proceedings of the 14th International Conference on Mining Software Repositories, MSR 2017, Buenos Aires, Argentina, May 20-28, 2017, Jesús M. González-Barahona, Abram Hindle, and Lin Tan (Eds.). IEEE Computer Society, 14–24. https://doi.org/10.1109/MSR.2017.23
[134]
Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, and Zheng Yan. 2017. Machine Learning-Based Malicious Application Detection of Android. IEEE Access 5 (2017), 25591–25601. https://doi.org/10.1109/ACCESS.2017.2771470
[135]
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, and Michalis Faloutsos. 2012. ProfileDroid: multi-layer profiling of android applications. In The 18th Annual International Conference on Mobile Computing and Networking, Mobicom’12, Istanbul, Turkey, August 22-26, 2012, Özgür B. Akan, Eylem Ekici, Lili Qiu, and Alex C. Snoeren (Eds.). ACM, 137–148. https://doi.org/10.1145/2348543.2348563
[136]
Qingyun Wu, Gagan Bansal, Jieyu Zhang, Yiran Wu, Shaokun Zhang, Erkang Zhu, Beibin Li, Li Jiang, Xiaoyun Zhang, and Chi Wang. 2023. AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversation Framework. CoRR abs/2308.08155 (2023). https://doi.org/10.48550/ARXIV.2308.08155 arXiv:2308.08155
[137]
Wenhao Wu. 2018. React Native vs Flutter, Cross-platforms mobile application frameworks. (2018).
[138]
Westlake Xinchen. 2024. Joyland. http://joyland.ai.
[139]
Hulya Yalcin. 2017. Extracting user profiles from mobile data. In 2017 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2017, Istanbul, Turkey, June 5-8, 2017. IEEE, 1–5. https://doi.org/10.1109/BLACKSEACOM.2017.8277701
[140]
Wenbo Yang, Juanru Li, Yuanyuan Zhang, and Dawu Gu. 2019. Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019). https://doi.org/10.1016/J.JISA.2019.102358
[141]
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, and Binyu Zang. 2013. Vetting undesirable behaviors in android apps with permission use analysis. In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013, Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung (Eds.). ACM, 611–622. https://doi.org/10.1145/2508859.2516689
[142]
Zejun Zhang, Li Zhang, Xin Yuan, Anlan Zhang, Mengwei Xu, and Feng Qian. 2024. A First Look at GPT Apps: Landscape and Vulnerability. CoRR abs/2402.15105 (2024). https://doi.org/10.48550/ARXIV.2402.15105 arXiv:2402.15105
[143]
Zejun Zhang, Li Zhang, Xin Yuan, Anlan Zhang, Mengwei Xu, and Feng Qian. 2024. A First Look at GPT Apps: Landscape and Vulnerability. CoRR abs/2402.15105 (2024). https://doi.org/10.48550/ARXIV.2402.15105 arXiv:2402.15105
[144]
Benjamin Zi Hao Zhao, Muhammad Ikram, and Mohamed Ali Kâafar. 2024. GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models. CoRR abs/2405.10547 (2024). https://doi.org/10.48550/ARXIV.2405.10547 arXiv:2405.10547
[145]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2013. Ranking fraud detection for mobile apps: a holistic view. In 22nd ACM International Conference on Information and Knowledge Management, CIKM’13, San Francisco, CA, USA, October 27 - November 1, 2013, Qi He, Arun Iyengar, Wolfgang Nejdl, Jian Pei, and Rajeev Rastogi (Eds.). ACM, 619–628. https://doi.org/10.1145/2505515.2505547
[146]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2015. Discovery of Ranking Fraud for Mobile Apps. IEEE Trans. Knowl. Data Eng. 27, 1 (2015), 74–87. https://doi.org/10.1109/TKDE.2014.2320733
[147]
Wenhan Zhu, Sebastian Proksch, Daniel M. Germán, Michael W. Godfrey, Li Li, and Shane McIntosh. 2024. What is an app store? The software engineering perspective. Empir. Softw. Eng. 29, 1 (2024), 35. https://doi.org/10.1007/S10664-023-10362-3
[148]
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, and Joel R. Reidenberg. 2017. Automated Analysis of Privacy Requirements for Mobile Apps. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/automated-analysis-privacy-requirements-mobile-apps/

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Software Engineering and Methodology
ACM Transactions on Software Engineering and Methodology Just Accepted
EISSN:1557-7392
Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Online AM: 14 December 2024
Accepted: 13 November 2024
Revised: 26 September 2024
Received: 06 April 2024

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 123
    Total Downloads
  • Downloads (Last 12 months)123
  • Downloads (Last 6 weeks)123
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media