|
[1] Google-play-scraper. URL: https://pypi.org/project/ google-play-scraper/. [2] Langdetect · spacy universe. URL: https://spacy.io/universe/project/ spacy-langdetect. [3] Sklearn.metrics.f1 score. URL: https://scikit-learn.org/stable/ modules/generated/sklearn.metrics.f1_score.html. [4] Sklearn.metrics.roc auc score. URL: https://scikit-learn.org/stable/ modules/generated/sklearn.metrics.roc_auc_score.html. [5] Welcome to colaboratory. URL: https://colab.research.google.com/ ?utm_source=scs-index. [6] Mcafee mobile threat report, 2019. URL: https://www.mcafee.com/ enterprise/en-us/assets/reports/rp-mobile-threat-report-2019. pdf. [7] Change app permissions on your android phone, 2022. URL: https://support.google.com/googleplay/answer/9431959?hl=en& amp;ref_topic=2450444#zippy=%2Ctypes-of-permissions. [8] Permissions on android : android developers, 2022. URL: https: //developer.android.com/guide/topics/permissions/overview# perm-groups. [9] Huseyin Alecakir, Burcu Can, and Sevil Sen. Attention: there is an inconsistency between android permissions and application metadata! International Journal of Information Security, 20(6):797–815, 2021. [10] Maxim Anikeev, Haya Shulman, and Hervais Simo. Privacy policies of mobile apps-a usability study. In IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 1–2. IEEE, 2021. [11] Anshul Arora, Sateesh K Peddoju, and Mauro Conti. Permpair: Android malware detection using permission pairs. IEEE Transactions on Information Forensics and Security, 15:1968–1982, 2019. [12] Rawan Baalous and Ronald Poet. How dangerous permissions are described in android apps’ privacy policies? In Proceedings of the 11th International Conference on Security of Information and Networks, pages 1–2, 2018. [13] Rawan Baalous and Ronald Poet. Utilizing sentence embedding for dangerous permissions detection in android apps’ privacy policies. International Journal of Information Security and Privacy (IJISP), 15(1):173–189, 2021. [14] Published by L. Ceci. Annual number of mobile app downloads worldwide 2021, Jan 2022. URL: https://www.statista.com/statistics/271644/ worldwide-free-and-paid-mobile-app-store-downloads/. [15] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018. [16] Johannes Feichtner and Stefan Gruber. Understanding privacy awareness in android app descriptions using deep learning. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pages 203– 214, 2020. [17] Yinglan Feng, Liang Chen, Angyu Zheng, Cuiyun Gao, and Zibin Zheng. Acnet: Assessing the consistency of description and permission in android apps. IEEE Access, 7:57829–57842, 2019. [18] Alessandra Gorla, Ilaria Tavecchia, Florian Gross, and Andreas Zeller. Checking app behavior against app descriptions. In Proceedings of the 36th international conference on software engineering, pages 1025–1035, 2014. [19] Joseph Johnson. Global android malware volume 2020, Jan 2021. URL: https://www.statista.com/statistics/680705/ global-android-malware-volume/, journal=Statista. [20] Yoon Kim. Convolutional neural networks for sentence classification. CoRR, abs/1408.5882, 2014. [21] Shervin Minaee, Nal Kalchbrenner, Erik Cambria, Narjes Nikzad, Meysam Chenaghlu, and Jianfeng Gao. Deep learning–based text classification: a comprehensive review. ACM Computing Surveys (CSUR), 54(3):1–40, 2021. [22] Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. {WHYPER}: Towards automating risk assessment of mobile applications. In 22nd USENIX Security Symposium (USENIX Security 13), pages 527–542, 2013. [23] Jeffrey Pennington, Richard Socher, and Christopher D. Manning. Glove: Global vectors for word representation. In Empirical Methods in Natural Language Processing (EMNLP), pages 1532–1543, 2014. [24] Gautham Prakash. Google play store apps, Jun 2021. URL: https://www. kaggle.com/datasets/gauthamp10/google-playstore-apps. [25] Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, and Zhong Chen. Autocog: Measuring the description-to-permission fidelity in android applications. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1354–1365, 2014. [26] Sevil Sen and Burcu Can. Android security using nlp techniques: A review. arXiv preprint arXiv:2107.03072, 2021. [27] Irina Shklovski, Scott D Mainwaring, Halla Hrund Sk´ulad´ottir, and H¨oskuldur Borgthorsson. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2347–2356, 2014. [28] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in neural information processing systems, 30, 2017. [29] Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori. Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 241–255, 2015. [30] Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium (USENIX Security 15), pages 499–514, 2015. [31] Zhiqiang Wu, Xin Chen, and Scott Uk-Jin Lee. Fcdp: Fidelity calculation for description-to-permissions in android apps. IEEE Access, 9:1062–1075, 2020. [32] Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ R Salakhutdinov, and Quoc V Le. Xlnet: Generalized autoregressive pretraining for language understanding. Advances in neural information processing systems, 32, 2019. |