최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.12 no.1, 2023년, pp.17 - 24
정윤교 (공군사관학교 컴퓨터과학과)
Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile...
L. A. Mutchler, J. P. Shim, and D. Ormond, "Exploratory study on users' behavior: smartphone usage," in Proceedings of Americas Conference on Information Systems, pp.418, 2011.
G. Jeon, M. Choi, S. Lee, J. H. Yi, and H. Cho, "Automated multi-layered bytecode generation for preventing sensitive information leaks from android applications," IEEE Access, Vol.9, pp.119578-119590, 2021.
Google, User data policy [Internet], https://support.google.com/googleplay/android-developer/answer/10144311.
European Union, General Data Protection Regulation [Internet], https://gdpr-info.eu/.
State of California Department of Justice, California Consumer Privacy Act [Internet], https://oag.ca.gov/privacy/ccpa.
U.S. Congress legislation, American Data Privacy and Protection Act[Internet], https://www.congress.gov/bill/117th-congress/house-bill/8152
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and communications security, pp.627-638, 2011.
K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, "Pscout: Analyzing the android permission specification," in Proceedings of the 2012 ACM conference on Computer and Communications Security, pp.217-228, 2012.
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, and C. Siemens, "Drebin: Effective and explainable detection of android malware in your pocket," in Proceeding of the Network and Distributed System Security Symposium, pp.23-26, 2014.
I. M. Almomani and A. A. Khayer, "A comprehensive analysis of the android permissions system," IEEE Access, Vol.8, pp.216671-216688, 2020.
J. Gamba, M. Rashed, A. Razaghpanah, J. Tapiador, and N. Vallina-Rodriguez, "An analysis of pre-installed android software," in Proceeding of IEEE Symposium on Security and Privacy, pp.1039-1055, 2020.
A. M. McDonald and L. F. Cranor, "The cost of reading privacy policies," Isjlp, Vol.4, pp.543, 2008.
S. Wilson et al., "The creation and analysis of a website privacy policy corpus," in Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, pp.1330-1340, 2016.
S. Zimmeck et al., "Maps: Scaling privacy compliance analysis to a million apps," in Proceedings on Privacy Enhancing Technologies, pp.66-86, 2019.
F. Liu, S. Wilson, P. Story, S. Zimmeck, and N. Sadeh, "Towards automatic classification of privacy policy text," School of Computer Science Carnegie Mellon University, 2018.
T. Libert, "An automated approach to auditing disclosure of third-party data collection in website privacy policies," in Proceedings of the 2018 World Wide Web Conference, pp.207-216,
Leontiadis. I, Efstratiou. C, Picone. M, and Mascolo. C, "Don't kill my ads! balancing privacy in an ad-supported mobile application market." in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, pp.1-6, 2012.
M. Backes, S. Bugiel, and E. Derr, "Reliable third-party library detection in android and its security applications," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.356-367, 2016.
M. I. Gordon, D. Kim, J. Perkins, L. Gilham, N. Nguyen, and M. Rinard, "Information-flow analysis of android applications in droidsafe," in Proceeding of the Network and Distributed System Security Symposium, pp.110, 2015
F. Wei, S. Roy, and X. Ou, "Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps," ACM Transactions on Privacy and Security, Vol.21, No.3, pp.1-32,
Y. Pan, X. Ge, C. Fang, and Y. Fan, "A systematic literature review of android malware detection using static analysis," IEEE Access, Vol.8, pp.116363-116379, 2020.
W. Enck et al., "Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones," ACM Transactions on Computer Systems, Vol.32, No.2, pp.1-29, 2014.
A. Razaghpanah et al., "Haystack: A multi-purpose mobile vantage point in user space," arXiv preprint arXiv:1510.014 19, 2015.
J. Ren, M. Lindorfer, D. J. Dubois, A. Rao, D. Choffnes, and N. Vallina-Rodriguez, "Bug fixes, improvements,... and privacy leaks: A longitudinal study of pii leaks across android app versions," in Proceeding of the Network and Distributed System Security Symposium, 2018.
Android Privacy Analysis, Dataset of privacy policy and mobile app analysis [Internet], https://android-privacy.github.io/
Mozilla, Readability.js [Internet], https://github.com/moz illa/readability.
Anthony Desnos, Androguard documentation [Internet], https://androguard.readthedocs.io.
Google, The Privacy Sandbox [Internet], https://privacysan dbox.com.
Y. Jung, "Reliability analysis of privacy policies based on android static analysis," in Proceedings of the Annual Spring Conference of Korea Information Processing Society Conference (KIPS), Vol.29, pp.221-224, 2022.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.