REFERENCES
Arzt, S. et al., 2014. FlowDroid : Precise Context , Flow ,
Field , Object-sensitive and Lifecycle-aware Taint
Analysis for Android Apps. PLDI ’14 Proceedings of
the 35th ACM SIGPLAN Conference on Programming
Language Design and Implementation, pp.259–269.
Enck, W. et al., 2010. TaintDroid: An Information-Flow
Tracking System for Realtime Privacy Monitoring on
Smartphones. Osdi ’10, 49, pp.1–6.
Fahl, S. et al., 2012. Why eve and mallory love android: an
analysis of android SSL (in) security. Proc. of ACM
CCS, pp.50–61.
Gibler, C. et al., 2012. AndroidLeaks: Automatically
detecting potential privacy leaks in Android
applications on a large scale. Lecture Notes in
Computer Science (including subseries Lecture Notes
in Artificial Intelligence and Lecture Notes in
Bioinformatics), 7344 LNCS, pp.291–307.
Gorla, A. et al., 2014. Checking app behavior against app
descriptions. Proceedings of the 36th International
Conference on Software Engineering - ICSE 2014,
pp.1025–1035. Available at:
http://dl.acm.org/citation.cfm?doid=2568225.2568276.
Han, J. et al., 2013. Comparing Mobile Privacy Protection
through Cross-Platform Applications. Network and
Distributed System Security Symposium, pp.1–15.
Available at:
http://www.liaiqin.com/hanjin/%5Cnpapers3://publica
tion/uuid/EDE08F21-0175-4B99-B31B-
86FC339DAFB4.
Huang, J. et al., 2014. AsDroid: detecting stealthy
behaviors in Android applications by user interface and
program behavior contradiction. ICSE 2014:
Proceedings of the 36th International Conference on
Software Engineering, (March). Available at:
https://ece.uwaterloo.ca/~lintan/publications/asdroid-
icse14.pdf.
Huang, J. et al., 2015. SUPOR: Precise and Scalable
Sensitive User Input Detection for Android Apps. 24th
USENIX Security Symposium (USENIX Security 15),
pp.977–992. Available at:
https://www.usenix.org/conference/usenixsecurity15/t
echnical-sessions/presentation/huang.
ITU, 2016. ITU Statistics. Available at:
http://www.itu.int/en/ITU-
D/Statistics/Pages/stat/default.aspx.
Khan, J., Abbas, H. & Al-Muhtadi, J., 2015. Survey on
Mobile User’s Data Privacy Threats and Defense
Mechanisms. Procedia Computer Science, 56(Csdi),
pp.376–383. Available at:
http://www.sciencedirect.com/science/article/pii/S187
7050915017044.
Lu, K. et al., 2015. Checking More and Alerting Less:
Detecting Privacy Leakages via Enhanced Data-flow
Analysis and Peer Voting. Symposium on Network and
Distributed System Security (NDSS).
Lu, K. et al., 2016. DuLeak: A Scalable App Engine for
High-Impact Privacy Leaks. , p.16. Available at:
https://www.google.com/patents/US9245125.
Mitchell, M., Wang, A.-I.A. & Reiher, P., 2015. Cashtags:
Protecting the Input and Display of Sensitive Data.
24th
USENIX Security Symposium (USENIX Security 15),
pp.961–976. Available at:
https://www.usenix.org/conference/usenixsecurity15/t
echnical-sessions/presentation/mitchell.
Nan, Y. et al., 2015. UIPicker : User-Input Privacy
Identification in Mobile Applications This paper is
included in the Proceedings of the.
Pandita, R. et al., 2013. Whyper: Towards Automating Risk
Assessment of Mobile Applications. USENIX Security
Symposium.
La Polla, M., Martinelli, F. & Sgandurra, D., 2013. A
Survey on Security for Mobile Devices. IEEE
Communications Surveys & Tutorials, 15(1), pp.446–
471.
Princeton, U., 2010. WordNet:An Electronic Lexical
Database. Princeton University. Available at:
http://wordnet.princeton.edu.
Rastogi, V., Chen, Y. & Enck, W., 2013. AppsPlayground :
Automatic Security Analysis of Smartphone
Applications. CODASPY ’13 (3rd ACM conference on
Data and Application Security and Privac), pp.209–
220.
Sujithra, M., 2012. Mobile Device Security : A Survey on
Mobile Device Threats , Vulnerabilities and their
Defensive Mechanism. , 56(14), pp.24–29.
Wain, K. et al., 2012. PScout : Analyzing the Android
Permission Specification. CCS ’12 Proceedings of the
2012 ACM conference on Computer and
communications security, pp.217–228. Available at:
http://www.eecg.toronto.edu/~lie/papers/PScout-
CCS2012-
web.pdf%5Cnhttp://dl.acm.org/citation.cfm?id=23822
22.
Xu, R. et al., 2012. Aurasium: Practical Policy Enforcement
for Android Applications. Proceedings of the 21st
USENIX conference …, p.27. Available at:
https://www.usenix.org/system/files/conference/usenix
security12/sec12-
final60.pdf%5Cnhttp://dl.acm.org/citation.cfm?id=236
2793.2362820.
Yang, Z. et al., 2013. AppIntent: analyzing sensitive data
transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC conference on
Computer & communications security - CCS ’13,
pp.1043–1054. Available at:
http://dl.acm.org/citation.cfm?doid=2508859.2516676.