1 |
雷雨田. 严把APP上架审核关[N/OL]. 经济日报(2022-07-02) [2023-04-16]. .
|
|
LEI Y T. Strictly control the review process for APP lauch[N/OL]. Economic Daily(2022-07-02) [2023-04-16]. .
|
2 |
信息通信管理局. 关于侵害用户权益行为的APP通报(2023年第 1批,总第27批)[EB/OL]. [2023-02-28]. .
|
|
Information and Communication Administration. APP notification on infringement of user rights and interests (1st in 2023, total 27th) [EB/OL]. [2023-02-28]. .
|
3 |
SLAVIN R, WANG X, HOSSEINI M B, et al. Toward a framework for detecting privacy policy violations in Android application code[C]// Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering. New York: ACM, 2016: 25-36. 10.1145/2884781.2884855
|
4 |
YU L, LUO X, LIU X, et al. Can we trust the privacy policies of Android apps? [C]// Proceedings of the 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway: IEEE, 2016: 538-549. 10.1109/dsn.2016.55
|
5 |
CER D, DE MARNEFFE M-C, JURAFSKY D, et al. Parsing to stanford dependencies: trade-offs between speed and accuracy[C/OL]// Proceedings of the 7th International Conference on Language Resources and Evaluation [2023-03-01]. .
|
6 |
QU Z, RASTOGI V, ZHANG X, et al. AutoCog: measuring the description-to-permission fidelity in Android applications [C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 1354-1365. 10.1145/2660267.2660287
|
7 |
王靖瑜, 徐明昆, 王浩宇, 等. Android应用隐私条例与敏感行为一致性检测[J]. 计算机科学与探索, 2019, 13(1):56-69. 10.3778/j.issn.1673-9418.1710031
|
|
WANG J Y, XU M K, WANG H Y, et al. Automated detection of consistence between App behavior and privacy policy of Android Apps [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 56-69. 10.3778/j.issn.1673-9418.1710031
|
8 |
MA Z, WANG H, GUO Y, et al. LibRadar: fast and accurate detection of third-party libraries in Android apps [C]// Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering Companion. New York: ACM, 2016: 653-656. 10.1145/2889160.2889178
|
9 |
ZIMMECK S, WANG Z, ZOU L, et al. Automated analysis of privacy requirements for mobile apps [EB/OL]. [2022-11-08]. . 10.14722/ndss.2017.23034
|
10 |
DESNOS A. Androguard documentation: release 3.4.0 [EB/OL]. (2019-10-18) [2023-04-18]. .
|
11 |
WANG X, QIN X, HOSSEINI M B, et al. GUILeak: tracing privacy policy claims on user input data for Android applications[C]// Proceedings of the 2018 IEEE/ACM 40th International Conference on Software Engineering. New York: ACM, 2018: 37-47. 10.1145/3180155.3180196
|
12 |
ROUNTEV A, YAN D. Static reference analysis for GUI objects in Android software [C]// Proceedings of 2014 Annual IEEE/ACM International Symposium on Code Generation and Optimization. New York: ACM, 2014: 143-153. 10.1145/2544137.2544159
|
13 |
ARZT S, RASTHOFER S, FRITZ C, et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps [J]. ACM SIGPLAN Notices, 2014, 49(6): 259-269. 10.1145/2666356.2594299
|
14 |
BUI D, YAO Y, SHIN K G, et al. Consistency analysis of data-usage purposes in mobile apps [C]// Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2021: 2824-2843. 10.1145/3460120.3484536
|
15 |
WANG Y, FAN M, LIU J, et al. Do as you say: consistency detection of data practice in program code and privacy policy in mini-app [EB/OL]. (2023-02-27) [2023-04-18]. .
|
16 |
ZHAO K, ZHAN Z, YU L, et al. Demystifying privacy policy of third-party libraries in mobile apps [EB/OL]. (2023-01-29) [2023-04-16]. . 10.1109/icse48619.2023.00137
|
17 |
MARKOPOULOU A, TRIMANANDA R, CUI H. A CI-based auditing framework for data collection practices [EB/OL]. (2023-03-30) [2023-04-16]. .
|
18 |
HASHMI S S, WAHEED N, TANGARI G, et al. Longitudinal compliance analysis of Android applications with privacy policies[C]// Proceedings of the 18th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. Cham: Springer, 2022: 280-305. 10.1007/978-3-030-94822-1_16
|
19 |
ZHOU L, WEI C, ZHU T, et al. POLICYCOMP: counterpart comparison of privacy policies uncovers overbroad personal data collection practices [EB/OL]. [2023-02-18]. .
|
20 |
NGUYEN T T, BACKES M, STOCK B. Freely given consent? Studying consent notice of third-party tracking and its violations of GDPR in Android apps [C]// Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2022: 2369-2383. 10.1145/3548606.3560564
|
21 |
JIAO Z, SUN S, SUN K. Chinese lexical analysis with deep Bi-GRU-CRF network [EB/OL]. (2018-07-05) [2023-03-20]. .
|
22 |
REPS T, HORWITZ S, SAGIV M. Precise interprocedural dataflow analysis via graph reachability [C]// Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 1995: 49-61. 10.1145/199448.199462
|