Novel Approaches to Mobile Application TestingView this Special Issue
The wide-ranging implementation of Android applications used in various devices from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Users of mobile are not aware of their proper use. Security and privacy are the primary concerns of mobile applications. Research work has focused on different aspects of mobile applications and devised solutions. In the context of Android applications, a novel process for evaluating privateer’s protection approaches is proposed . The device, which has recently been tested to include worrying examples of usage, dramatically simplifies the path toward comprehending the security repercussions of inserting in apps. The appliance is made to grow capability. As a result, inclines in the approach can be easily integrated to improve the consistency of quality and sufficiency. To examine the relative usefulness of the two permissions interfaces was presented in the study . People were recruited through Amazon Mechanical Turk for online research. Users do not read permissions for three reasons: they are unconcerned about or unaware of permits; instead, they rely on other measures to choose whether or not to download an app. They have faith in the programmer and system based on variables such as the number of downloads and user ratings, and they have confidence in the developer and platform to screen out highly unsafe programs. The Android 6 UI, according to participants, is more visually attractive than Android5. A proactive user-oriented approach is recommended to enhance user awareness of the privacy risks connected with Android applications to grant access . An effectual privacy assessment approach is described, which evaluates users’ privacy connected with a set of permissions-required apps. Permissions’ harshness and relative relevance, as well as their linkage, are the model’s parameters. A standard severity evaluation method is used to determine severity. A data mining algorithm was used to identify association rules between permits.
Designers should dedicate additional time and effort to software development procedures to satisfy the expanded interest for excellent applications. With an emphasis on recent advancements, the research explores the main issues and genuine concerns in Android mobile application testing . The study provides principles, rules, models, methodologies, and technology for Android application testing and outlines future perspectives. A new approach (CUPA) is offered that permits clients to oversee application admittance to Android framework assets, and private information dependent on client characterized techniques . This method furnishes clients with alternatives not accessible in the Android consent framework in the establishment and the actual time of mobile application, allowing them to decrease the extent of the privacy breach. Users can regulate app behavior using the proposed approach, and application network connections lists can be included and inter-app communication. The suggested method comprises three main components that may be used to check program behavior during installation and runtime. First, a method was offered for analyzing an Android app to determine whether it is malicious or not . Second, by examining permission patterns, a unique technique is suggested to discover malware-based programs. The proposed method obtains permission clusters by using the k-means algorithm to isolate malicious apps. The approach is validated by a 90 percent efficiency rate for malicious behavior. This study backs up the use of application authenticity for applications in Android phishing detection.
2. User Privacy Approach for Android Mobile Application
DroidNet uses the framework to put new apps through a trial period before granting their requests for approval. Based on peer expert user decisions, it provides suggestions about whether to approve or decline access requests to assist users in implementing limited resource access restrictions on unknown apps to protect their identity and improve resource consumption efficiency. Users can install programs in quest mode using the framework, which prompts them with resource access requests and allows them to choose whether or not to approve them . A study  has demonstrated that giving mobile phone users more choices over their information disclosure and increasing their awareness of adverts substantially impacted privacy behaviors and views. Researchers created a privacy warning dialog that simulates actual pre-installation privacy controls screens for Android apps to carry out and manage advertisements recognition. The implications for creating privacy notification dialogs in mobile apps as well as distinct commercial methods are examined. PanGuard, an automated approach for detecting Third-party libraries (TPL) from a large number of Android APPs, is provided in this work . To characterize TPLs, a novel combination of features is presented that includes packages in applications that can have both organizational and semantic data. In APPs, TPLs are isolated from the principal code, and invariants that remain unaltered during modification are identified, and the contained TPLs and versions are determined using these invariants. Extensive testing shows that PanGuard delivers significant TPL quality aspects and sustainability at the same time.
User research with 26 participants was done, and it was discovered that while participants were satisfied with better privacy options, they struggled to adjust to complicated customized interfaces. In a study , a practical solution is proposed to assist users in sorting, suggestions, and profile management, and all require balancing absolute authority and the extra interactive complexity. The study’s key conclusion is that privacy controls must allow users to control their devices and be informed about confidentiality. Research presented a privacy leak-based Android application analysis scheme with a combination attack. The linked apps are extracted after the risk components of the application are discovered. This scheme’s implementation process and principles are discussed. Because it is supported by experimental evidence, the analytical strategy is viable. The difficulty and precision of application pretreatment are increased to some extent . A new approach for effectively detecting and testing authority entrust flaws was constructed by integrating static code analysis, language processing, deep learning, and biological algorithm-based test creation strategies given in the study . The approach finds and identifies insecure applications that reveal delighted to support other apps in an unusual way from legitimate permission entrust circumstances. To demonstrate the vulnerabilities, it also creates solid evidence intrusions and protection reports. The multi-criteria app evaluator of trust for android (MAETROID) framework is presented in this paper  as a way to assess the trustworthiness of Android apps in terms of secrecy and reliability. At the time of deployment, MAETROID does a multi-criteria evaluation of an app and provides a single, simple risk level rating, guiding the customer’s choices as to whether or not to install a new application. A bundle of metadata acquired out from the global market that indicates the app’s reliability and desirability and a collection of desired privileges are among the criteria.
A strategy was presented that uses privacy as a service level agreement rather than the transparency consciousness model. For evaluating an Ambient Assisted Living Application’s proper privacy settings and managing real-time approval queries, the study  presented a participatory privacy protection algorithm. A case study is used to show how these algorithms function. The proposed method is also compared to the state-of-the-art Android privacy management methodology. The proposed algorithms can help users of Ambient Assisted Living Apps in digital cities safeguard their privacy and relieve them through cognitive offloading. A survey  was presented to address the security and privacy concerns around Android application permissions. Because a real-world Android application investigation validates the findings, the protocol has serious security consequences. However, the Android permission protocol has several flaws. The attacker can altogether bypass the permission checks in each of these scenarios. Although application permission-based malware is discussed, as the Android market grows rapidly, a new sort of malware family is forming. A complete study on quick vulnerability assessment was described  and thorough reverse engineering using a variety of smartphones and digital operating systems. The data leakage of the use of messaging platforms on mobile phones is examined. Android-based smartphones with the help of a particular susceptibility evaluation system set were used for this project. Evaluation and vulnerability simulations are also covered in depth to make instant messaging systems more safe and free of vulnerabilities.
3. Privacy-Preserving Categorization of Mobile Applications
A study has proposed to adopt a proactive role to users’ awareness concerning misuse of personal information connected with granting rights to mobile applications . A general privacy risk assessment model was proposed, which assesses the vulnerability to clients’ security associated with a collection of permissions-based applications. This proactive technique was validated through an experimental analysis. The work originality stems from the fact that the security risk for a particular node held by a user changes over time based on the device’s various usage, applications, and related permissions. Research has presented mobile App Reviews Summarization (MARS), which uses Google-Play-Shop user evaluations as an appropriate source for extracting and quantifying private-related allegations linked with applications . MARS uses machine learning to recognize privacy-relevant reviews and classify them into a pre-defined list of confidentiality in the mobile context application. The integration of such approaches enables developers with precise details regarding privacy issues and application behavior to provide self-reports that would be impossible to identify otherwise. The students’ mobile privacy behavior and attitudes are investigated and compared in the case study. In Germany and the United States, participants were observed, and an experiment was used as part of the qualitative ethnographic studies. The findings of the study show that participants’ mobile privacy behavior and attitudes are nearly identical across cultures. In reality, this research identifies and distinguishes various types of mobile privacy. These classifications, which range from “mobile privacy objection” to “mobile privacy learned helplessness,” demonstrate how they have a massive effect on German and American pupils’ privacy behavior and attitudes .
This discovery has led to developing a new confidentiality classification technique for mobile applications, which is intended to explain patterns from a vast amount of usage patterns. To make app feature vectors, shuffle usage data from a large number of users to make it anonymous, then formalize data information as a dataset, identify and aggregate usage information for every application using Dynamic Time Warping, and then utilize the Dynamic Time Warping and Shape Features based on Symbolic Aggregate approXimation methods. On 3,086 apps, five machine learning techniques were employed to train and validate categorization models. SVM is the best performer, as per the results . The Native Protector system, which regulates third-party in Android apps, local libraries are used is proposed . The server app and the client app are the two halves of the standalone Android app. The client application holds the rest of the original app and the server application containing the libraries for offering services from the modules. Native Protector has been implemented as a prototype and successfully detects and blocks efforts by Android apps that use third-party native libraries to undertake harmful actions. In malicious assaults, Android phones can be used as a target and a tool. Individuals and corporations must be aware of the risks and take steps to avoid being exploited for nefarious ends. Mobile app developers must also pay greater attention to security issues and take responsibility for user data protection. Even if the basic security techniques recommended in this chapter do not provide total protection, they can act as a deterrent against most attempts . The study has proposed a new hybrid methodology for ascertaining private information leaks that outperform existing static and dynamic approaches . The notion tool implemented is Hybri-Droid, which extracts each app’s models using both dynamic and static analysis methods, then refines the behavior model depending on the dynamic analysis results. According to the evaluation results, for both inter-app and intra-app interactions, Hybri-Droid is excellent at identifying security leaks. It can significantly increase data leakage detection performance when compared to previous techniques.
Two studies were done to test the hypothesis with the aim of this research . App Tracer is being used to create a dynamic analytic tool to track user interactions and sensitive resource access, as well as to conduct an online survey to see how different UI interactions alter users’ assumptions about whether an app accesses sensitive resources. The findings show that user button clicks, for example, can be considered authorization, it should be possible to reduce the requirement for separate queries that are not directly related to user activities, individually, possibly when apps are first launched. The mechanism by which various apps obtain when installed on Android smartphones, access to crucial device privileges is investigated . It highlighted the user’s difficulties in comprehending what impact differing device restrictions have on their security. Each permission’s impact is influenced by its context and use-case, and when granted numerous permissions, estimating the possible impact on client privacy becomes challenging. The research quantifies the most important human rights have an impact and takes the first steps toward a privacy impact assessment of multiple device permissions. The functionality of the program was examined in a dynamic examination, while a static analysis was carried out by looking at the code. Backdoor configuration, capture of session parameters, insecure encrypting application data transported without authentication, the usage of harmful APIs, and privileges over disclosure are all issues that need to be addressed, and unlimited connection to the databases and modules of the program were detected after executing the vulnerability analysis. The methodology presented introduces an innovative design for running a privacy test on Android-based smartphone apps . The privacy framework for mobile apps is examined for flaws and a survey of proposed tools and frameworks is conducted, with an emphasis on the consequences of confidential data leaks and the cyber security threats it poses . The study also offers some insight into how rogue mobile applications can exploit users’ personal data for their own gain. Users are classified based on how they handle their personal information. Then we spoke about some of the problems with the permissions model framework and how Google fixed them.
The research was presented that allows Android apps to be assessed for compliance recently with the issued Google Play security standards in real-time. A novel methodology for analyzing such compliance is discussed, which relies on a successful mix of dynamic analysis and deep learning approaches. This methodology also examines if each program has private information that follows the Google Play security regulations and only accesses sensitive information once the user agrees on the policies . Providing Android apps using permission control that is both versatile and perfect pleasing has been a challenging issue. A careful inspection of the Android application package file to solve such problem and the retrieved “AndroidManifest.xml” file, which lists all necessary permissions, is recommended, as well as a quick introduction to Android’s authorization administrator, which demonstrates that approvals can be canceled once the apps have been installed. Yet, it does not prevent applications from exploiting resources and information . The study has introduced a risk assessment approach for Android smartphone app authorization that uses dynamic analysis to determine whether or not a specific application is likely to be over-privileged . The technique establishes the necessity of asking authorization indicated in the obvious of the application. The approach differs from existing approaches in that it may be used to compute the attack surface of mobile applications as well as the danger posed by over privileges. By illustrating the importance of app value in the privacy trade-off, the research verifies earlier findings and adds to our understanding of the privacy calculus’ border limits . The work provided is entirely experimental, and that may have implications for the internal and external validity of the conclusions. Every effort was made to make the experiments possibly realistic, and the research has strictly adhered to modification of perception criteria. According to surveys, whether downloading apps or accessing mobile websites, many people who use the Internet on their phones never check the privacy options.
4. Privacy Protection in Mobile Apps
Research works were presented to discover the discriminate and persistent elements obtained from Android APK files that are used to detect malicious apps on a large scale . To accomplish this, the research extract takes a lot of features from each application and divides them into two categories. These feature sets are then used to train classifiers to detect malicious programs. Based on classifier performance, the durability of application particular and framework features are evaluated with two data sets, and the Linear Regression classifier’s key characteristics are thoroughly studied. In Android, the tracking of security-related data was limited to taint tags. Taint-Droid has a simple design that allows for a maximum of thirty-two different data sources. The research introduces Kynoid, an Android-based system for monitoring and enforcing laws in real-time . Kynoid deviates from the traditional taint tracking method by introducing finer granularity. It’s the first significant effort to show that adaptive vulnerability management tracking is possible at this level of detail. An overview of Android and its cutting-edge security features was presented . Then, based on the literature, a thorough and analytic taxonomy of Android malware hardening techniques is offered. Application developers often use hardening measures to protect against reverse engineering. The difficulties associated with them are highlighted and manifest future paths based on this in-depth survey. Then, to offer a complete picture, the trends in application hardening are shown, and a research gap summary for future studies. The knowledge of mobile app users about data gathering procedures is currently insufficient . The study looks into the elements that support privacy and security in mobile applications. It adds to the knowledge about the subject. The findings demonstrate that greater degrees of consciousness and security concerns improve the motivation of smartphone applications users to participate in reducing malicious activity. According to the results, app users are inadvertently and desperately in the limelight, but this will change if they are increasingly concerned regarding their confidentiality in their ability to secure it.
Research work presented some of the security concerns addressed by the Android security architecture and reverse engineering of an Android banking app and static analysis of its code to identify flaws . The work attempts to examine specific security threats in mobile networks. As a result, assaults such as malware infection and DDOS attacks are used. Finally, several recommendations are made to aid programmers in making their mobile apps more secure. A study was presented, and an X-Decaf privacy leakage detection tool and an Automatic Transparent File Encryption/Decryption (ATFed) auto-protection technique on the Android platform in mobile social networking applications (MSNAs) is recommended . MSNAs from China’s domestic market was examined, and it was discovered that during the development process, MSNAs failed to address the security of the user’s privacy data. To keep the cache files created by MSNAs safe, an ATFed technique is provided, which allows the files to be saved in the ciphertext, and during the MSNA’s operation, secured cache files are produced. During the course of the literature review, researchers assembled different research papers and conducted a comprehensive literature evaluation, resulting in a substantial body of work. The goal of the research was to present a coherent picture of current modern work that statically analyzes Android applications, which may draw conclusions about static analysis trends . The review is divided into five sections: challenges addressed by methodology, basic approaches used by the authors, dynamic testing sensitivity properly considered, android features factored, and the assessment scale used. The authors  presented a dynamic analysis approach that collects “second-step behavior cues” to aid application analysis in distinguishing between harmful and benign actions. The features of malicious operations are summarized, and they can be used to categorize them. SSdroid, an analytical prototype, was intended to derive the SSBFs structure of the network. Second step behavior features (SSBFs) have proven successful and valuable in over 9000 activities from benign and hostile programs. Research work has proposed a software library that enables older mobile crowdsourcing applications to boost client security without sacrificing crowdsourced datasets’ fundamental value . The research presents Fougere, a decentralized method for transmitting raw data from consumer devices to third-party databases. To examine this contribution, Fougere was deployed in a simulated Android platform by simulating a crowd of fifteen portable devices running multiple variations of MobiPerf and Fougere.
Research explains how to utilize application instrumentation to impose fine-grained usage control privacy limitations, allowing users to regulate how sensitive resources are accessed by applications . The study aimed to give users more control over their mobile devices’ privacy, confidentiality, and security, especially when it comes to invasive software behaviors. Rather than providing precise API methods that could allow a program to get private data, this approach provides unambiguous regulations that consider the resource being accessed. The study has examined whether a user’s personality is a good predictor of the privacy access they had grant to apps downloaded on their smartphones . The IUIPC questionnaire results and the app permission parameters that were chosen are presented. Deep learning meprivateere utilized to fgrantedst personalized privacy controls for users based on their characteristics and as a result, a unique way for providing permissions to apps is introduced. Research evaluated the privacy and security factor of an Android App in context of how vulnerable it is to leaking end-user personal data and disclosing vulnerabilities . Android static the researchers were collected, and the static code metrics were utilized to estimate the applications’ confidentiality risks. The Androrisk tool, which assesses the measure of privacy and security threat of an Android application as determined by an evaluation of Androidvileges and simulation models. The creation of a computational intelligence anti-malware framework (CIantiMF) is proposed . It is built on powerful computational intelligence technologies and runs on the Android operating system. The Android OS was chosen due to its popularity and a large number of vital applications accessible for it. The CIantiMF can determine whether an android application’s java classes are benign or malicious. It analyzes network data in order to find Tor-based Botnets. Abstract attack models are proposed to the semantics of various Android attacks are accurately identified . The inter-component communication graph (ICCG) is a new diagram architecture for representing programs’ internal management flows and internal component interactions. To discover attacks buried in ICCG, a static searching strategy is proposed and an effective algorithm to search for assaults in ICCG. Experiments have shown that the strategy is viable and effective.
Research work established a new assessment approach based on analytical hierarchy theory and assessments and descriptions of recent design flaws or data security issues in Android apps . The effort put forth in the project is estimated to make a substantial contribution to the security of Android application data. The study evaluation approach analyzed the data protection of Android apps on different stages and aspects but cannot account for all threats to Android application information security. A VULPIX tool for the characteristics of dynamic analysis is combined to provide a comprehensive identification of privacy vulnerabilities in Android apps . A detailed set of PI data items is also defined, which can be used to compare different PI detection methods. On a collection of Android apps, the consistency of detecting leaked confidential info is assessed using a comprehensive list of data pieces deemed private data. Another study was presented with MPDroid, a method for identifying a combination of simulation process and information retrieval that determines the minimal authorization for a mobile application based on its application description and API utilization . Descriptive minimal permission set iteration method, and for each phone app, static analysis is utilized to determine the actual access. The methodology can also be used to assess the hazards associated with existing Android apps by analyzing their permissions.
5. Analyzing the Existing State-of-the-Art Research Work Based on Popular Libraries
The aim of the proposed study is to present an analysis of the existing literature to show associated materials published in the area. This will help researchers to offer the contents published in the area and then will devise new approaches to overcome challenges. The current study has considered the famous libraries with the search keywords “Influencing,” “User’s Behavior,” “Android,” and “Privacy.” Details of the libraries are given in the below subsections. Figure 1 describes the overall search results of all the libraries.
5.1. Search Process in the ACM Library
The ACM library was searched for the diverse format of the search process. The analysis derived from the search process is shown in different figures. The total contents in the ACM library are given in Figure 2.
The events of the conference are described in Figure 3.
The media format is shown in Figure 4.
All publications in the given library are shown in Figure 5.
The sponsors of conferences are given in Figure 6. The figure shows that more publications were done in the SIGCHI.
5.2. Search Process in the IEEE Library
The details of the IEEE library were presented in a different format, such as conference locations are shown in Figure 7.
The topics of publications are given in Figure 8.
5.3. Search Process in the ScienceDirect Library
Details of the ScienceDirect library are given with the details of subject areas are given in Figure 9.
The years of publications are shown in Figure 10. The figure shows that there is an increase in the number of publications year-wise.
Details of the article types are given in Figure 11. The figure describes that more publications were published as research articles.
The publications titles with papers are given in Figure 12.
5.4. Search Process in the MDPI Library
Details of the MDPI library are given with the details of subjects areas in Figure 13.
Details of the journals are depicted in Figure 14.
The county details are given in Figure 15.
Figure 16 shows the articles types. This figure shows that more papers were published as journal articles.
5.5. Search Process in the Springer Library
The Springer library details are given below. Figure 17 describes the details of article types in the given library.
Details of the disciplines are shown in Figure 18.
Figure 19 shows the sub-disciplines in the given library.
No data are available.
Conflicts of Interest
The authors declare no conflicts of interest.
C. C. Sai, C. S. Prakash, J. Jose, S. C. Mana, and B. K. Samhitha, “Analysing android app privacy using classification algorithm,” in Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 551–555, Tirunelveli, India, 2020.View at: Publisher Site | Google Scholar
J. Karmazín and P. Očenášek, “The state of near-field communication (NFC) on the android platform,” in Human Aspects of Information Security, Privacy, and Trust, T. T. Cham, Ed., pp. 247–254, Springer International Publishing, Berlin, Germany, 2016.View at: Google Scholar
Z. Alkindi, M. Sarrab, and N. Alzidi, “CUPA: a configurable user privacy approach for android mobile application,” in Proceedings of the 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 216–221, New York, NY, USA, 2020.View at: Publisher Site | Google Scholar
N. Wang, B. Zhang, B. Liu, and H. Jin, “Investigating effects of control and ads awareness on android users’ privacy behaviors and perceptions,” in Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, Copenhagen, Denmark, 2015.View at: Publisher Site | Google Scholar
A. Ngobeni and S. Mhlongo, “Towards enhancing security in android operating systems - android permissions & user unawareness,” in Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6, Riyadh, Saudi Arabia, 2019.View at: Publisher Site | Google Scholar
A. Hamed, H. Kaffel-Ben Ayed, and D. Machfar, “Assessment for android apps permissions a proactive approach toward privacy risk,” in Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1465–1470, Valencia, Spain, 2017.View at: Publisher Site | Google Scholar
Y.-Y. Hong, Y.-P. Wang, and J. Yin, “NativeProtector: protecting android applications by isolating and intercepting third-party native libraries,” in ICT Systems Security and Privacy Protection, J.-H. Hoepman and S. Katzenbeisser, Eds., pp. 337–351, Springer International Publishing, Cham, Switzerland, 2016.View at: Publisher Site | Google Scholar
M. B. Hosseini, “Semantic inference from natural language privacy policies and android code,” in Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista, FL, USA, 2018.View at: Publisher Site | Google Scholar
S. Kumar and R. Shanker, “Your privacy is not so private: unveiling android apps privacy framework from the dark,” in Proceedings of the 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), pp. 48–53, Jammu, India, 2017.View at: Publisher Site | Google Scholar
P. Singh, S. Singh, and P. Tiwari, “Discovering persuaded risk of permission in android applications for malicious application detection,” in Proceedings of the 2016 International Conference on Inventive Computation Technologies (ICICT), vol. 3, pp. 1–5, Coimbatore, India, 2016.View at: Publisher Site | Google Scholar
H. Li, W. Liu, B. Wang, and W. Zhang, “Detection and auto-protection of cache file privacy leakage for mobile social networking applications in android,” in Human Aspects of Information Security, Privacy and Trust, T. Tryfonas, Ed., pp. 703–721, Springer International Publishing, Cham, Switzerland, 2017.View at: Publisher Site | Google Scholar
A. Rahman, P. Pradhan, A. Partho, and L. Williams, “Predicting android application security and privacy risk with static code metrics,” in Proceedings of the 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft), Buenos Aires, Argentina, 2017.View at: Publisher Site | Google Scholar
L. Yu, X. Luo, C. Qian, and S. Wang, “Revisiting the description-to-behavior fidelity in android applications,” in Proceedings of the 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1, Osaka, Japan, 2016.View at: Publisher Site | Google Scholar
N. Wongwiwatchai, P. Pongkham, and K. Sripanidkulchai, “Comprehensive detection of vulnerable personal information leaks in android applications,” in Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 2020.View at: Publisher Site | Google Scholar
J. Kim, H. Choi, H. Namkung et al., “Enabling automatic protocol behavior analysis for android applications,” in Proceedings of the 12th International on Conference on emerging Networking Experiments and Technologies, Irvine, CA, USA, 2016.View at: Google Scholar
Z. Shan, I. Neamtiu, and R. Samuel, “Self-hiding behavior in android apps: detection and characterization,” in Proceedings of the 40th International Conference on Software Engineering, Gothenburg, Sweden, 2018.View at: Google Scholar
J. Wang and R. Poet, “Permission management and user privacy based on android: permission management on android,” in Proceedings of the 13th International Conference on Security of Information and Networks, Merkez, Turkey, 2020.View at: Google Scholar