Affiliation:
1. Waseda University
2. NTT Social Informatics Laboratories
Publisher
Information Processing Society of Japan
Reference80 articles.
1. [1] Nomoto, K., Watanabe, T., Shioji, E., Akiyama, M. and Mori, T.: Browser Permission Mechanisms Demystified (to appear), Network and Distributed System Security Symposium (2023).
2. [2] Google: Permissions on Android — Android Developers (2021), available from <https://developer.android.com/guide/topics/permissions/overview>.
3. [3] Apple: Accessing User Data - App Architecture - iOS - Human Interface Guidelines - Apple Developer (2021), available from <https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/accessing-user-data/>.
4. [4] Chia, P.H., Yamamoto, Y. and Asokan, N.: Is This App Safe? A Large Scale Study on Application Permissions and Risk Signals, Proc. 21st International Conference on World Wide Web, WWW '12, pp.311-320, Association for Computing Machinery (online), DOI: 10.1145/2187836.2187879 (2012).
5. [5] Qu, Z., Rastogi, V., Zhang, X., Chen, Y., Zhu, T. and Chen, Z.: AutoCog: Measuring the Description-to-Permission Fidelity in Android Applications, Proc. 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1354-1365, Association for Computing Machinery (online), DOI: 10.1145/2660267.2660287 (2014).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献