Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-22733
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDi Sorbo, Andrea-
dc.contributor.authorPanichella, Sebastiano-
dc.date.accessioned2021-06-23T12:58:13Z-
dc.date.available2021-06-23T12:58:13Z-
dc.date.issued2021-06-08-
dc.identifier.issn1382-3256de_CH
dc.identifier.issn1573-7616de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/22733-
dc.descriptionThis is a post-peer-review, pre-copyedit version of an article published in Empirical Software Engineering. The final authenticated version is available online at: https://doi.org/10.1007/s10664-021-09978-0de_CH
dc.description.abstractMobile applications are used for accomplishing everyday life activities, such as shopping, banking, and social communications. To leverage the features of mobile apps, users often need to share sensitive information. However, recent research demonstrated that most of such apps present critical security and privacy defects. In this context, we define as vulnerability-proneness the risk level(s) that users meet in downloading specific apps, to better understand whether (1) users select apps with lower risk levels and if (2) vulnerability-proneness of an app might affect its success. We use as proxy to measure such risk level the “number of different types of potential security issues exhibited by the app”. We conjecture that the vulnerability-proneness levels may vary based on (i) the types of data handled by the app, and (ii) the operations for which the app is supposed to be used. Hence, we investigate how the vulnerability-proneness of apps varies when observing (i) different app categories, and (ii) apps with different success levels. Finally, to increase the awareness of both users and developers on the vulnerability-proneness of apps, we evaluate the extent to which contextual information provided by the app market can be exploited to estimate the vulnerability-proneness levels of mobile apps. Results of our study show that apps in the Medical category exhibit the lowest levels of vulnerability-proneness. Besides, while no strong relations between vulnerability-proneness and average rating are observed, apps with a higher number of downloads tend to have higher vulnerability-proneness levels, but lower vulnerability-proneness density. Finally, we found that apps’ contextual information can be used to predict, in the early stages, the vulnerability-proneness levels of mobile apps.de_CH
dc.language.isoende_CH
dc.publisherSpringerde_CH
dc.relation.ispartofEmpirical Software Engineeringde_CH
dc.rightsLicence according to publishing contractde_CH
dc.subject.ddc005: Computerprogrammierung, Programme und Datende_CH
dc.titleExposed! : a case study on the vulnerability-proneness of Google Play Appsde_CH
dc.typeBeitrag in wissenschaftlicher Zeitschriftde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Informatik (InIT)de_CH
dc.identifier.doi10.1007/s10664-021-09978-0de_CH
dc.identifier.doi10.21256/zhaw-22733-
zhaw.funding.euinfo:eu-repo/grantAgreement/EC/H2020/957254//DevOps for Complex Cyber-physical Systems/COSMOSde_CH
zhaw.issue4de_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.start78de_CH
zhaw.publication.statusacceptedVersionde_CH
zhaw.volume26de_CH
zhaw.embargo.end2022-06-09de_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.webfeedSoftware Systemsde_CH
zhaw.funding.zhawCOSMOS – DevOps for Complex Cyber-physical Systems of Systemsde_CH
zhaw.author.additionalNode_CH
zhaw.display.portraitNode_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
2021_DiSorbo-Panichella_Exposed-a-case-study-on-the-vulnerability-proneness-of-Google-Play-Apps.pdfAccepted Version559.71 kBAdobe PDFThumbnail
View/Open
Show simple item record
Di Sorbo, A., & Panichella, S. (2021). Exposed! : a case study on the vulnerability-proneness of Google Play Apps. Empirical Software Engineering, 26(4), 78. https://doi.org/10.1007/s10664-021-09978-0
Di Sorbo, A. and Panichella, S. (2021) ‘Exposed! : a case study on the vulnerability-proneness of Google Play Apps’, Empirical Software Engineering, 26(4), p. 78. Available at: https://doi.org/10.1007/s10664-021-09978-0.
A. Di Sorbo and S. Panichella, “Exposed! : a case study on the vulnerability-proneness of Google Play Apps,” Empirical Software Engineering, vol. 26, no. 4, p. 78, Jun. 2021, doi: 10.1007/s10664-021-09978-0.
DI SORBO, Andrea und Sebastiano PANICHELLA, 2021. Exposed! : a case study on the vulnerability-proneness of Google Play Apps. Empirical Software Engineering. 8 Juni 2021. Bd. 26, Nr. 4, S. 78. DOI 10.1007/s10664-021-09978-0
Di Sorbo, Andrea, and Sebastiano Panichella. 2021. “Exposed! : A Case Study on the Vulnerability-Proneness of Google Play Apps.” Empirical Software Engineering 26 (4): 78. https://doi.org/10.1007/s10664-021-09978-0.
Di Sorbo, Andrea, and Sebastiano Panichella. “Exposed! : A Case Study on the Vulnerability-Proneness of Google Play Apps.” Empirical Software Engineering, vol. 26, no. 4, June 2021, p. 78, https://doi.org/10.1007/s10664-021-09978-0.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.