1. [1] Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 97–110.
2. [2] Shahriyar Amini, Jialiu Lin, Jason I Hong, Janne Lindqvist, and Joy Zhang. 2013. Mobile Application Evaluation Using Automation and Crowdsourcing. In Workshop on Privacy Enhancing Tools.
3. [3] Karissa Bell. 2015. The 7 best iPhone photography apps of all time. (2015). http://mashable.com/2015/12/13/best-iphone-photo-apps-of-all-time/#NruakC5LTuqF.
4. [4] K. Benton, L. J. Camp, and V. Garg. 2013. Studying the effectiveness of Android application permissions requests. In Security and Social Networking (SESOC), 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 291–296.
5. [5] Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, and Bhargava Shastry. 2012. Towards Taming Privilege-Escalation Attacks on Android. In 19th Network & Distributed System Security Symposium.