
of the Special Interest Group on Discourse and Dia-
logue (SIGDIAL), pages 257–259.
Joy, D., Kotevska, O., and Al-Masri, E. (2022). Investigat-
ing users’ privacy concerns of internet of things (iot)
smart devices. In 2022 IEEE 4th Eurasia Conference
on IOT, Communication and Engineering (ECICE),
pages 70–76. IEEE.
Khattar, S., Sachdeva, A., Kumar, R., and Gupta, R. (2019).
Smart home with virtual assistant using raspberry pi.
In 2019 9th International Conference on Cloud Com-
puting, Data Science & Engineering (Confluence),
pages 576–579. IEEE.
Kollnig, K., Dewitte, P., Van Kleek, M., Wang, G., Omeiza,
D., Webb, H., and Shadbolt, N. (2021). A fait accom-
pli? an empirical study into the absence of consent
to {Third-Party} tracking in android apps. In Sev-
enteenth Symposium on Usable Privacy and Security
(SOUPS 2021), pages 181–196.
Labs, W. (2013). WebView addJavascriptInterface Remote
Code Execution — labs.withsecure.com. https://labs
.withsecure.com/publications/webview-addjavascript
interface-remote-code-execution. [Accessed 26-10-
2023].
Lei, L., He, Y., Sun, K., Jing, J., Wang, Y., Li, Q., and
Weng, J. (2017). Vulnerable implicit service: A re-
visit. In Proceedings of the 2017 ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 1051–1063.
Lei, X., Tu, G.-H., Liu, A. X., Li, C.-Y., and Xie, T. (2018).
The insecurity of home digital voice assistants-
vulnerabilities, attacks and countermeasures. In 2018
IEEE conference on communications and network se-
curity (CNS), pages 1–9. IEEE.
Liao, S., Wilson, C., Cheng, L., Hu, H., and Deng, H.
(2020). Measuring the effectiveness of privacy poli-
cies for voice assistant applications. In Annual Com-
puter Security Applications Conference, pages 856–
869.
Lin, Y.-C. (2023). Androbugs/androbugs framework. https:
//github.com/AndroBugs.
MITRE (2023). CWE - CWE-297: Improper Valida-
tion of Certificate with Host Mismatch (4.13) —
cwe.mitre.org. https://cwe.mitre.org/data/definitio
ns/297.html. [Accessed 26-10-2023].
Modhave, S. (2019). A survey on virtual personal assistant.
International Journal for Research in Applied Science
and Engineering Technology, 7(12):305–309.
Neupane, S., Tazi, F., Paudel, U., Baez, F. V., Adamjee,
M., De Carli, L., Das, S., and Ray, I. (2022). On the
data privacy, security, and risk postures of iot mobile
companion apps. In IFIP Annual Conference on Data
and Applications Security and Privacy, pages 162–
182. Springer.
NIST (2013). Nvd - cve-2013-6271. https://nvd.nist.gov/v
uln/detail/CVE-2013-6271. Accessed on October 27,
2023.
Rahman Md, R., Miller, E., Hossain, M., and Ali-Gombe,
A. (2022). Intent-aware permission architecture: A
model for rethinking informed consent for android
apps [intent-aware permission architecture: A model
for rethinking informed consent for android apps].
ICISSP 2022.
Schmidt, B., Borrison, R., Cohen, A., Dix, M., G
¨
artler,
M., Hollender, M., Kl
¨
opper, B., Maczey, S., and Sid-
dharthan, S. (2018). Industrial virtual assistants: Chal-
lenges and opportunities. In Proceedings of the 2018
ACM International Joint Conference and 2018 In-
ternational Symposium on Pervasive and Ubiquitous
Computing and Wearable Computers, pages 794–801.
Shahriar, H. and Haddad, H. M. (2014). Content provider
leakage vulnerability detection in android applica-
tions. In Proceedings of the 7th International Confer-
ence on Security of Information and Networks, pages
359–366.
Sharif, K. and Tenbergen, B. (2020). Smart home voice
assistants: a literature survey of user privacy and se-
curity vulnerabilities. Complex Systems Informatics
and Modeling Quarterly, 1(24):15–30.
Shenava, A. A., Mahmud, S., Kim, J.-H., and Sharma,
G. (2022). Exploiting security and privacy issues
in human-iot interaction through the virtual assistant
technology in amazon alexa. In International Con-
ference on Intelligent Human Computer Interaction,
pages 386–395. Springer.
Sokolova, K., Lemercier, M., and Boisseau, J.-B. (2014).
Privacy by design permission system for mobile ap-
plications. In The Sixth International Conferences on
Pervasive Patterns and Applications, PATTERNS.
Tan, J., Drolia, U., Gandhi, R., and Narasimhan, P. (2014).
Poster: Towards secure execution of untrusted code
for mobile edge-clouds. ACM WiSec.
Warkentin, M., Johnston, A. C., and Shropshire, J. (2011).
The influence of the informal social learning environ-
ment on information privacy policy compliance effi-
cacy and intention. European Journal of Information
Systems, 20(3):267–284.
Warren, T. (2023). Using cortana on ios or android. https:
//www.theverge.com/2021/4/1/22361687/microsoft-c
ortana-shut-down-ios-android-mobile-app. Cortana’s
support on mobile ended on March 31, 2021.
Wortley, F., Allison, F., and Thompson, C. (2021).
Log4shell: Rce 0-day exploit found in log4j, a pop-
ular java logging package — lunatrace.
Xie, F., Zhang, Y., Yan, C., Li, S., Bu, L., Chen, K., Huang,
Z., and Bai, G. (2022). Scrutinizing privacy policy
compliance of virtual personal assistant apps. In 37th
IEEE/ACM International Conference on Automated
Software Engineering, pages 1–13.
Evaluating the Security and Privacy Risk Postures of Virtual Assistants
161