Fri 13 May 2022 05:25 - 05:30 at ICSE room 1-odd hours - Reliability and Safety 2 Chair(s): Shahar Maoz
In this paper we present a methodology to analyze users’ concerns and perspectives about privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and extract privacy concerns. Our methodology is composed of a binary classifier that distinguishes between privacy and non-privacy related reviews. We use clustering to gather reviews that discuss similar privacy concerns, and employ summarization metrics to extract representative sentences to summarize each cluster. We apply our methods on 287M reviews for about 2M apps across the 29 categories in Google Play to identify top privacy pain points in mobile apps. We identified approximately 440K privacy related reviews covering all 29 app categories. We show empirical evidence, first large-scale analysis, that confirms dominant privacy themes – concerns about apps requesting unnecessary permissions, collection of personal information, frustration with privacy controls, tracking and the selling of personal data. We also discuss the implication of our method and findings for developers and app stores.
Mon 9 MayDisplayed time zone: Eastern Time (US & Canada) change
22:00 - 23:00 | Validation and Verification 3SEIP - Software Engineering in Practice / Technical Track at ICSE room 4-even hours Chair(s): Yu Feng University of California at Santa Barbara | ||
22:00 5mTalk | Verifying Dynamic Trait Objects in Rust SEIP - Software Engineering in Practice Alexa VanHattum Cornell University, Daniel Schwartz-Narbonne Amazon, n.n., Nathan Chong Amazon, Adrian Sampson Cornell University Pre-print Media Attached | ||
22:05 5mTalk | Linear-time Temporal Logic guided Greybox Fuzzing Technical Track Ruijie Meng National University of Singapore, Singapore, Zhen Dong Fudan University, China, Jialin Li National University of Singapore, Singapore, Ivan Beschastnikh University of British Columbia, Abhik Roychoudhury National University of Singapore DOI Pre-print Media Attached | ||
22:10 5mTalk | Quantifying Permissiveness of Access Control Policies Technical Track William Eiers University of California at Santa Barbara, USA, Ganesh Sankaran University of California Santa Barbara, Albert Li University of California Santa Barbara, Emily O'Mahony University of California Santa Barbara, Benjamin Prince University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara Pre-print Media Attached | ||
22:15 5mTalk | Analyzing User Perspectives on Mobile App Privacy at Scale Technical Track Preksha Nema Google Inc., Pauline Anthonysamy Google Inc., Nina Taft Google Inc., Sai Teja Peddinti Google Inc. Pre-print Media Attached |
Fri 13 MayDisplayed time zone: Eastern Time (US & Canada) change
05:00 - 06:00 | Reliability and Safety 2NIER - New Ideas and Emerging Results / Technical Track / Journal-First Papers at ICSE room 1-odd hours Chair(s): Shahar Maoz Tel Aviv University, Israel | ||
05:00 5mTalk | TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses Journal-First Papers Linghui Luo Amazon Web Services, Felix Pauck Paderborn University, Germany, Goran Piskachev Fraunhofer IEM, Manuel Benz Paderborn University, Ivan Pashchenko University of Trento, Martin Mory Paderborn University, Eric Bodden , Ben Hermann Technical University Dortmund, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam Link to publication DOI Pre-print Media Attached File Attached | ||
05:05 5mTalk | Are We Training with The Right Data? Evaluating Collective Confidence in Training Data using Dempster Shafer Theory NIER - New Ideas and Emerging Results Pre-print Media Attached | ||
05:10 5mTalk | Multi-Intention-Aware Configuration Selection for Performance Tuning Technical Track Haochen He National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Chenglong Zhou National University of Defense Technology, Qing Liao Harbin Institute of Technology, Ji Wang National University of Defense Technology, Liao Xiangke National University of Defense Technology Pre-print Media Attached | ||
05:15 5mTalk | PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal Analysis Technical Track Jingzhu He ShanghaiTech University, Yuhang Lin North Carolina State University, Xiaohui Gu North Carolina State University, Chin-Chia Michael Yeh Visa Research, Zhongfang Zhuang Visa Research DOI Pre-print Media Attached | ||
05:20 5mTalk | Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning Technical Track Renjue Li Institute of Software at Chinese Academy of Sciences, China, Pengfei Yang Institute of Software at Chinese Academy of Sciences, China, Cheng-Chao Huang Nanjing Institute of Software Technology, ISCAS, Youcheng Sun The University of Manchester, Bai Xue Institute of Software at Chinese Academy of Sciences, China, Lijun Zhang Institute of Software, Chinese Academy of Sciences Pre-print Media Attached | ||
05:25 5mTalk | Analyzing User Perspectives on Mobile App Privacy at Scale Technical Track Preksha Nema Google Inc., Pauline Anthonysamy Google Inc., Nina Taft Google Inc., Sai Teja Peddinti Google Inc. Pre-print Media Attached |