메뉴 건너뛰기




Volumn , Issue , 2015, Pages 39-50

AutoPPG: Towards automatic generation of privacy policy for android applications

Author keywords

Document generation; Information extraction; Mobile applications; Privacy policy; Program analysis

Indexed keywords

APPLICATION PROGRAMS; CODES (SYMBOLS); COMPUTER PROGRAMMING; INFORMATION RETRIEVAL; MOBILE DEVICES; NATURAL LANGUAGE PROCESSING SYSTEMS; SMARTPHONES;

EID: 84955498728     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2808117.2808125     Document Type: Conference Paper
Times cited : (47)

References (42)
  • 5
    • 18744373738 scopus 로고    scopus 로고
    • Wordnet. http://wordnet.princeton.edu/.
    • Wordnet.
  • 11
    • 84869388345 scopus 로고    scopus 로고
    • Pscout: Analyzing the android permission specification
    • K. Au, Y. Zhou, Z. Huang, and D. Lie. Pscout: Analyzing the android permission specification. In Proc. ACM CCS, 2012.
    • (2012) Proc. ACM CCS
    • Au, K.1    Zhou, Y.2    Huang, Z.3    Lie, D.4
  • 12
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • T. Breaux and A. Anton. Analyzing regulatory rules for privacy and security requirements. IEEE Trans. on Software Eng., 2008.
    • (2008) IEEE Trans. on Software Eng
    • Breaux, T.1    Anton, A.2
  • 13
    • 85035783387 scopus 로고    scopus 로고
    • Parsing to stanford dependencies: Trade-offs between speed and accuracy
    • D. Cer, M. Marnee, D. Jurafsky, and C. Manning. Parsing to stanford dependencies: Trade-offs between speed and accuracy. In Proc. LREC, 2010.
    • (2010) Proc. LREC
    • Cer, D.1    Marnee, M.2    Jurafsky, D.3    Manning, C.4
  • 14
    • 84869196720 scopus 로고    scopus 로고
    • A machine learning solution to assess privacy policy completeness
    • E. Costante, Y. Sun, M. Petkovic, and J. Hartog. A machine learning solution to assess privacy policy completeness. In Proc. ACM WPES, 2012.
    • (2012) Proc. ACM WPES
    • Costante, E.1    Sun, Y.2    Petkovic, M.3    Hartog, J.4
  • 16
    • 84869821127 scopus 로고    scopus 로고
    • I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns
    • A. Felt, S. Egelman, and D. Wagner. I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Proc. ACM SPSM, 2012.
    • (2012) Proc. ACM SPSM
    • Felt, A.1    Egelman, S.2    Wagner, D.3
  • 17
    • 84880915872 scopus 로고    scopus 로고
    • Computing semantic relatedness using wikipedia-based explicit semantic analysis
    • E. Gabrilovich and S. Markovitch. Computing semantic relatedness using wikipedia-based explicit semantic analysis. In Proc. IJCAI, 2007.
    • (2007) Proc. IJCAI
    • Gabrilovich, E.1    Markovitch, S.2
  • 19
    • 84865720897 scopus 로고    scopus 로고
    • Strong higher order mutation-based test data generation
    • M. Harman, Y. Jia, and W. B. Langdon. Strong higher order mutation-based test data generation. In Proc. ESEC/FSE, 2011.
    • (2011) Proc. ESEC/FSE
    • Harman, M.1    Jia, Y.2    Langdon, W.B.3
  • 21
    • 44149083477 scopus 로고    scopus 로고
    • Automated generation of test cases using model-driven architecture
    • A. Javed, P. Strooper, and G. Watson. Automated generation of test cases using model-driven architecture. In Proc. AST, 2007.
    • (2007) Proc. AST
    • Javed, A.1    Strooper, P.2    Watson, G.3
  • 23
    • 84959910133 scopus 로고    scopus 로고
    • A step towards usable privacy policy: Automatic alignment of privacy statements
    • F. Liu, R. Ramanath, N. Sadeh, and N. Smith. A step towards usable privacy policy: Automatic alignment of privacy statements. In Proc. COLING, 2014.
    • (2014) Proc. COLING
    • Liu, F.1    Ramanath, R.2    Sadeh, N.3    Smith, N.4
  • 26
    • 84955497427 scopus 로고    scopus 로고
    • Privacy informer: An automatic privacy description generator for mobile apps
    • D. Miao and L. Kagal. Privacy informer: An automatic privacy description generator for mobile apps. In Proc. ASE PASSAT, 2014.
    • (2014) Proc. ASE PASSAT
    • Miao, D.1    Kagal, L.2
  • 27
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang. Apex: Extending android permission model and enforcement with user-defined runtime constraints. In Proc. ACM ASIACCS, 2010.
    • (2010) Proc. ACM ASIACCS
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 28
    • 85075955161 scopus 로고    scopus 로고
    • Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
    • D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Traon. Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In Proc. USENIX Security, 2013.
    • (2013) Proc. USENIX Security
    • Octeau, D.1    McDaniel, P.2    Jha, S.3    Bartel, A.4    Bodden, E.5    Klein, J.6    Traon, Y.7
  • 30
    • 84925070537 scopus 로고    scopus 로고
    • Vulhunter: Toward discovering vulnerabilities in android applications
    • C. Qian, X. Luo, Y. Le, and G. Gu. Vulhunter: Toward discovering vulnerabilities in android applications. IEEE Micro, 2015.
    • (2015) IEEE Micro
    • Qian, C.1    Luo, X.2    Le, Y.3    Gu, G.4
  • 31
    • 84906929853 scopus 로고    scopus 로고
    • Unsupervised alignment of privacy policies using hidden markov models
    • R. Ramanath, F. Liu, N. Sadeh, and N. Smith. Unsupervised alignment of privacy policies using hidden markov models. In Proc. ACL, 2014.
    • (2014) Proc. ACL
    • Ramanath, R.1    Liu, F.2    Sadeh, N.3    Smith, N.4
  • 32
    • 84920559779 scopus 로고    scopus 로고
    • A machine-learning approach for classifying and categorizing android sources and sinks
    • S. Rasthofer, S. Arzt, and E. Bodden. A machine-learning approach for classifying and categorizing android sources and sinks. In Proc. NDSS, 2014.
    • (2014) Proc. NDSS
    • Rasthofer, S.1    Arzt, S.2    Bodden, E.3
  • 33
    • 0034971203 scopus 로고    scopus 로고
    • Coverage based test-case generation using model checkers
    • S. Rayadurgam and M. P. Heimdahl. Coverage based test-case generation using model checkers. In Proc. ECBS, 2001.
    • (2001) Proc. ECBS
    • Rayadurgam, S.1    Heimdahl, M.P.2
  • 34
    • 84874835750 scopus 로고    scopus 로고
    • Appprofiler: A exible method of exposing privacy-related behavior in android applications to end users
    • S. Rosen, Z. Qian, and Z. M. Mao. Appprofiler: A exible method of exposing privacy-related behavior in android applications to end users. In Proc. CODASPY, 2013.
    • (2013) Proc. CODASPY
    • Rosen, S.1    Qian, Z.2    Mao, Z.M.3
  • 35
    • 84922821366 scopus 로고    scopus 로고
    • Encouraging privacy by design concepts with privacy policy auto-generation in eclipse (page
    • M. Rowan and J. Dehlinger. Encouraging privacy by design concepts with privacy policy auto-generation in eclipse (page). In Proc. ETX, 2014.
    • (2014) Proc. ETX
    • Rowan, M.1    Dehlinger, J.2
  • 36
    • 84955464607 scopus 로고    scopus 로고
    • A case for test-code generation in model-driven systems
    • M. Rutherford and A. Wolf. A case for test-code generation in model-driven systems. In Proc. GPCE, 2003.
    • (2003) Proc. GPCE
    • Rutherford, M.1    Wolf, A.2
  • 38
    • 84955515568 scopus 로고    scopus 로고
    • Relation extraction for inferring access control rules from natural language artifacts
    • J. Slankas, X. Xiao, L. Williams, and T. Xie. Relation extraction for inferring access control rules from natural language artifacts. In Proc. ACSAC, 2014.
    • (2014) Proc. ACSAC
    • Slankas, J.1    Xiao, X.2    Williams, L.3    Xie, T.4
  • 39
    • 84871303885 scopus 로고    scopus 로고
    • Automated extraction of security policies from natural language software documents
    • X. Xiao, A. Paradkar, S. Thummalapenta, and T. Xie. Automated extraction of security policies from natural language software documents. In Proc. ACM FSE, 2012.
    • (2012) Proc. ACM FSE
    • Xiao, X.1    Paradkar, A.2    Thummalapenta, S.3    Xie, T.4
  • 41
  • 42
    • 85066762295 scopus 로고    scopus 로고
    • Privee: An architecture for automatically analyzing web privacy policies
    • S. Zimmeck and S. M. Bellovin. Privee: An architecture for automatically analyzing web privacy policies. In Proc. USENIX Security, 2014.
    • (2014) Proc. USENIX Security
    • Zimmeck, S.1    Bellovin, S.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.