Determining and Detecting Permission Issues of Wearable Apps

作者: Suhaib Mujahid

DOI:

关键词: Ethical issuesEmpirical researchAndroid (operating system)Wearable computerCategorizationApp storeOperationalizationInternet privacyComputer sciencePermission

摘要: Wearable apps are becoming increasingly popular. Nevertheless, to date, very few studies have examined the issues that wearable face. Prior showed user reviews contain a plethora of insights can be used understand quality and help developers build better mobile apps. Therefore, in this thesis, we start by empirically studying complaints about apps. We manually sample categorize 2,667 from 19 Android Additionally, examine replies posted response complaints. This study allows us determine type care most identify problems that, despite being important users, do not receive proper developers. We find frequent related Functional Errors, Cost, Lack Functionality, whereas negatively impacting Installation Problems, Device Compatibility, Privacy & Ethical Issues. mostly reply Issues, Performance notification-related issues. Furthermore, observe when reply, they tend provide solution, request more details, or let know working on solution. Our results highlight users face most, which should pay additional attention due their negative impact. Based these first empirical study, investigate impactful mainly two permission common factor raise cause -namely mismatch problem superfluous features. As result, propose technique detect app. To operationalize our developed tool, called Permlyzer, automatically detects APKs. then perform an 2,724 free findings show mismatches exist 6.1% released app store. Moreover, 19.2% studded features.

参考文章(42)
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Ryan Stevens, Jonathan Ganz, Vladimir Filkov, Premkumar Devanbu, Hao Chen, Asking for (and about) permissions used by Android apps mining software repositories. pp. 31- 40 ,(2013) , 10.1109/MSR.2013.6624000
Mark Harman, Yue Jia, Yuanyuan Zhang, App store mining and analysis: MSR for app stores mining software repositories. pp. 108- 111 ,(2012) , 10.5555/2664446.2664461
E. Ha, D. Wagner, Do Android users write about electric sheep? Examining consumer reviews in Google Play consumer communications and networking conference. pp. 149- 157 ,(2013) , 10.1109/CCNC.2013.6488439
Laura V. Galvis Carreno, Kristina Winbladh, Analysis of user comments: an approach for software requirements evolution international conference on software engineering. pp. 582- 591 ,(2013) , 10.5555/2486788.2486865
Chulhong Min, Seungwoo Kang, Chungkuk Yoo, Jeehoon Cha, Sangwon Choi, Younghan Oh, Junehwa Song, Exploring current practices for battery use and management of smartwatches international symposium on wearable computers. pp. 11- 18 ,(2015) , 10.1145/2802083.2802085
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Stuart McIlroy, Nasir Ali, Hammad Khalid, Ahmed E. Hassan, Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews Empirical Software Engineering. ,vol. 21, pp. 1067- 1106 ,(2016) , 10.1007/S10664-015-9375-7
Hammad Khalid, Emad Shihab, Meiyappan Nagappan, Ahmed E. Hassan, What Do Mobile App Users Complain About? IEEE Software. ,vol. 32, pp. 70- 77 ,(2015) , 10.1109/MS.2014.50