2022
DOI: 10.1109/access.2022.3199882
|View full text |Cite
|
Sign up to set email alerts
|

PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies

Abstract: Privacy laws and app stores (e.g., Google Play Store) require mobile apps to have transparent privacy policies to disclose sensitive actions and data collection, such as accessing the phonebook, camera, storage, GPS, and microphone. However, many mobile apps do not accurately disclose their sensitive data access that requires sensitive ('dangerous') permissions. Thus, analyzing discrepancies between apps' permissions and privacy policies facilitates the identification of compliance issues upon which privacy re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…These permission categories include CAMERA, MICRO-PHONE, PHONE_CALL, SENSOR, SMS, CALENDAR, CONTACTS, LOCATION, STORAGE and PERSISTEN-TID (cf Table 1). The list of permissions considered is consistent with 30 dangerous permission APIs categorized in 10 permission groups in MPP-270 [13,14], an annotated policy corpus for mapping between dangerous android permissions and privacy. The GDPR and the MPP-270 corpus dataset were preprocessed for the N-grams, VSM, FSM and implementation of the BERT word embedding algorithms.…”
Section: B Datasetmentioning
confidence: 93%
See 3 more Smart Citations
“…These permission categories include CAMERA, MICRO-PHONE, PHONE_CALL, SENSOR, SMS, CALENDAR, CONTACTS, LOCATION, STORAGE and PERSISTEN-TID (cf Table 1). The list of permissions considered is consistent with 30 dangerous permission APIs categorized in 10 permission groups in MPP-270 [13,14], an annotated policy corpus for mapping between dangerous android permissions and privacy. The GDPR and the MPP-270 corpus dataset were preprocessed for the N-grams, VSM, FSM and implementation of the BERT word embedding algorithms.…”
Section: B Datasetmentioning
confidence: 93%
“…Hatamian et al [64] studied the extent to which COVID-19 contact tracing Android apps comply with the legal requirements of GDPR. Rahman et al [13] proposed an automated machine learning solution to evaluate completeness checking in Android applications dangerous permissions against privacy policies and highlighted the non-transparent state of permission-policy declarations of dangerous Android permissions. Shezan et al [48] developed an NLP-driven approach, NLP2GDPR, to automatically extract text from Android applications and generate a GDPR-compliant feature.…”
Section: B Completeness Checking Of Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Torre et al [23] and Amaral et al [24] describe an automated solution which combines NLP and ML for the compliance verification of privacy policies according to GDPR. More recently, Rahman et al [66] and Aborujilah et al [67] presented MLbased techniques to monitor users' compliance with mobile applications. Tesfay et al [22] utilize ML for summarizing privacy concerns in privacy notices to make such notices more readable and comprehensible for non-experts.…”
Section: Related Workmentioning
confidence: 99%