MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs
The rising popularity of mini-programs deployed on super-app platforms has drawn significant attention due to their convenience. However, developers’ improper handling of data permission application in mini-programs has raised concerns about non-compliance and violations. Unfortunately, existing tools lack the capability to support the construction of a universal function call graph for the mini-program and the literature lacks a comprehensive and systematic study of the abusive issues. To bridge this gap, this paper introduces an automated tool, MiniChecker, to uncover the abusive permission request behavior in mini-programs. It defines five primary categories of abusive issues, namely homepage pop-up, overlaying pop-up, bothering pop-up, repeating pop-up, and looping pop-up, based on the request behavior features. MiniChecker achieves a detection precision rate of 82.4% and a recall rate of 95.3% on our benchmark, and identifies 3,866 risky mini-programs out of 20,000 real-world mini-programs. Our analysis reveals inherent design flaws in the mini-program permission mechanism, and we have shared our findings with several mini-program platforms.
Tue 29 OctDisplayed time zone: Pacific Time (US & Canada) change
15:30 - 16:30 | GDPR and privacyTool Demonstrations / Research Papers / Journal-first Papers at Gardenia Chair(s): Lina Marsso University of Toronto | ||
15:30 15mTalk | Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps Research Papers Ming Fan Xi'an Jiaotong University, Jifei Shi Xi'an Jiaotong University, Yin Wang Xi'an Jiaotong University, Le Yu Nanjing University of Posts and Telecommunications, Xicheng Zhang Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
15:45 15mTalk | MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs Research Papers Yin Wang Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Jiajia Li Ant Group, Wenbo Chen Ant Group, Shijie Li Ant Group, Yu Zhang Ant Group, Deqiang Han Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
16:00 15mTalk | A Multi-solution Study on GDPR AI-enabled Completeness Checking of DPAs Journal-first Papers Muhammad Ilyas Azeem Institute of Software Chinese Academy of Sciences, Sallam Abualhaija University of Luxembourg | ||
16:15 10mTalk | CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence Tool Demonstrations Orlando Amaral University of Luxembourg, Sallam Abualhaija University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland |