
This publication is part of the project PNRR-
NGEU which has received funding from the MUR –
DM 118/2023.
REFERENCES
Anderson, B. B., Jenkins, J. L., Vance, A., Kirwan, C. B.,
and Eargle, D. (2016). Your memory is working
against you: How eye tracking and memory explain
habituation to security warnings. Decision Support
Systems, 92:3–13.
Arianezhad, M., Camp, L. J., Kelley, T., and Stebila, D.
(2013). Comparative eye tracking of experts and
novices in web single sign-on. In Proceedings of the
Third ACM Conference on Data and Application Se-
curity and Privacy, CODASPY ’13, page 105–116,
New York, NY, USA. Association for Computing Ma-
chinery.
Carter, B. T. and Luke, S. G. (2020). Best practices in
eye tracking research. International Journal of Psy-
chophysiology, 155:49–62.
Egelman, S. (2013). My profile is my password, verify
me! the privacy/convenience tradeoff of facebook
connect. In Proceedings of the SIGCHI Conference
on Human Factors in Computing Systems, CHI ’13,
page 2369–2378, New York, NY, USA. Association
for Computing Machinery.
Elbitar, Y., Schilling, M., Nguyen, T. T., Backes, M., and
Bugiel, S. (2021). Explanation beats context: The ef-
fect of timing & rationales on users’ runtime permis-
sion decisions. USENIX Security’21.
Fasano, F., Guerra, M., Milanese, R., and Oliveto, R.
(2023). A dynamic approach to defuse logic bombs in
android applications. In Data and Applications Secu-
rity and Privacy XXXVII: 37th Annual IFIP WG 11.3
Conference, DBSec 2023, Sophia-Antipolis, France,
July 19–21, 2023, Proceedings, page 358–365, Berlin,
Heidelberg. Springer-Verlag.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012). Android permissions: User atten-
tion, comprehension, and behavior. In Proceedings of
the eighth symposium on usable privacy and security,
pages 1–14.
Furman, S. and Theofanos, M. (2014). Preserving privacy
– more than reading a message. In Stephanidis, C.
and Antona, M., editors, Universal Access in Human-
Computer Interaction. Design for All and Accessibil-
ity Practice, pages 14–25, Cham. Springer Interna-
tional Publishing.
Guerra., M., Milanese., R., Oliveto., R., and Fasano., F.
(2023). Rpcdroid: Runtime identification of permis-
sion usage contexts in android applications. In Pro-
ceedings of the 9th International Conference on Infor-
mation Systems Security and Privacy - ICISSP, pages
714–721. INSTICC, SciTePress.
Guerra, M., Scalabrino, S., Fasano, F., and Oliveto, R.
(2023). An empirical study on the effectiveness of pri-
vacy indicators. IEEE Transactions on Software En-
gineering, 49(10):4610–4623.
Miyamoto, D., Iimura, T., Blanc, G., Tazaki, H., and
Kadobayashi, Y. (2014). Eyebit: Eye-tracking ap-
proach for enforcing phishing prevention habits. In
2014 Third International Workshop on Building Anal-
ysis Datasets and Gathering Experience Returns for
Security (BADGERS), pages 56–65.
Papoutsaki, A., Gokaslan, A., Tompkin, J., He, Y., and
Huang, J. (2018). The eye of the typer: A benchmark
and analysis of gaze behavior during typing. In Pro-
ceedings of the 2018 ACM Symposium on Eye Track-
ing Research & Applications, ETRA ’18, New York,
NY, USA. Association for Computing Machinery.
Papoutsaki, A., Sangkloy, P., Laskey, J., Daskalova, N.,
Huang, J., and Hays, J. (2016). Webgazer: Scalable
webcam eye tracking using user interactions. In Pro-
ceedings of the 25th International Joint Conference
on Artificial Intelligence (IJCAI), pages 3839–3845.
AAAI.
Peruma, A., Palmerino, J., and Krutz, D. E. (2018). Investi-
gating user perception and comprehension of android
permission models. In Proceedings of the 5th Inter-
national Conference on Mobile Software Engineering
and Systems, pages 56–66.
Punde, P. A., Jadhav, M. E., and Manza, R. R. (2017).
A study of eye tracking technology and its applica-
tions. In 2017 1st International Conference on Intelli-
gent Systems and Information Management (ICISIM),
pages 86–90. IEEE.
Scoccia, G. L., Malavolta, I., Autili, M., Di Salle, A.,
and Inverardi, P. (2021). Enhancing trustability of
android applications via user-centric flexible permis-
sions. IEEE Transactions on Software Engineering,
47(10):2032–2051.
Shen, B., Wei, L., Xiang, C., Wu, Y., Shen, M., Zhou, Y.,
and Jin, X. (2021). Can systems explain permissions
better? understanding users’ misperceptions under
smartphone runtime permission model. In USENIX
Security Symposium, pages 751–768.
Wang, Y., Wang, Y., Wang, S., Liu, Y., Xu, C., Cheung,
S.-C., Yu, H., and Zhu, Z. (2021). Runtime permis-
sion issues in android apps: Taxonomy, practices, and
ways forward. arXiv preprint arXiv:2106.13012.
Whalen, T. and Inkpen, K. (2005). Gathering evidence: use
of visual security cues in web browsers. In Proceed-
ings of Graphics Interface 2005, GI 2005, pages 137–
144, School of Computer Science, University of Wa-
terloo, Waterloo, Ontario, Canada. Canadian Human-
Computer Communications Society.
Wijesekera, P., Baokar, A., Tsai, L., Reardon, J., Egelman,
S., Wagner, D., and Beznosov, K. (2018). Dynami-
cally regulating mobile application permissions. IEEE
Security & Privacy, 16(1):64–71.
Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking
329