{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:25:03Z","timestamp":1772583903139,"version":"3.50.1"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030763459","type":"print"},{"value":"9783030763466","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76346-6_15","type":"book-chapter","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T11:08:18Z","timestamp":1622200098000},"page":"154-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Combating Against Potentially Harmful Mobile Apps"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Suleman","sequence":"first","affiliation":[]},{"given":"Tariq Rahim","family":"Soomro","sequence":"additional","affiliation":[]},{"given":"Taher M.","family":"Ghazal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7336-381X","authenticated-orcid":false,"given":"Muhammad","family":"Alshurideh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"15_CR1","unstructured":"Mente, R.: Android application security. In: Advances in Computational Sciences and Technology, Solapur (2017)"},{"key":"15_CR2","unstructured":"Greenfield, M.: Number of available applications in the Google Play Store from December 2009 to December 2018, 28 December 2018. https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/. Accessed 21 Mar 2019"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York (2014)","DOI":"10.1145\/2623330.2623705"},{"key":"15_CR4","unstructured":"Fajemilehin, N.: Introduction to mobile applications, 18 Feb 2018. https:\/\/codeburst.io\/introduction-to-mobile-applications-ddf9732b690a. Accessed 02 Mar 2019"},{"key":"15_CR5","unstructured":"Porta, L.L.: iOS app permissions - are your apps asking too much, 22 April 2019. https:\/\/www.wandera.com\/mobile-security\/ios-app-permissions\/. Accessed 24 Apr 2019"},{"key":"15_CR6","unstructured":"Gray, R.: What is the zero trust security model & its importance for mobile security, 11 April 2019. https:\/\/www.wandera.com\/zero-trust-security\/. Accessed 20 Apr 2019"},{"key":"15_CR7","unstructured":"Yu, M., Ren, C., Octeau, D.: Combating potentially harmful applications with machine learning at Google: datasets and models, 15 November 2018. https:\/\/android-developers.googleblog.com\/2018\/11\/combating-potentially-harmful.html. Accessed 05 Dec 2019"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Grano, G., Di Sorbo, A., Mercaldo, F., Visaggio, C.A., Canfora, G., Panichella, S.: Android apps and user feedback: a dataset for software. In: Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Paderborn, Germany (2017)","DOI":"10.1145\/3121264.3121266"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Fu, B., Lin, J., Li, L., Faloutsos, C., Hong, J., Sadeh, N.: Why people hate your app: making sense of user. In: 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois USA (2013)","DOI":"10.1145\/2487575.2488202"},{"key":"15_CR10","unstructured":"Lin, J., Liu, B., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: Tenth USENIX Conference on Usable Privacy and Security, Menlo Park, California (2014)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Liu, H., Yu, C., Wu, H.: Potential applications of smart devices recongnition in industry. In: Smart Device Recognition, pp. 259\u2013294 (2020)","DOI":"10.1007\/978-981-33-4925-4_9"},{"key":"15_CR12","unstructured":"Jung, J.: Automated security validation of mobile apps at app markets. In: Automated Security Validation of Mobile Apps at App Markets, pp. 97\u2013102 (2011)"},{"key":"15_CR13","unstructured":"T Security: Symantec\u2019s annual threat report, 19 Febraury 2019. https:\/\/www.symantec.com\/blogs\/threat-intelligence\/istr-24-cyber-security-threat-landscape. Accessed 22 Aug 2019"},{"key":"15_CR14","unstructured":"Raymond, J.: What is backdoor virus? 17 November 2018. https:\/\/antivirus.comodo.com\/blog\/comodo-news\/backdoor-virus\/. Accessed 13 Sept 2019"},{"key":"15_CR15","unstructured":"Google: Potentially Harmful Application (PHAs) Categories, 07 March 2018. https:\/\/developers.google.com\/android\/play-protect\/phacategories#toll-fraud. Accessed 24 Sept 2019"},{"key":"15_CR16","unstructured":"Gray, R.: The risks of commercial spyware, 17 December 2018. https:\/\/www.wandera.com\/the-risks-of-commercial-spyware\/. Accessed 29 Sept 2019"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"de los Reyes, G., Macwan, S., Chawla, D., Serban, C.: Securing the mobile enterprise with network-based security and cloud computing. In: 35th IEEE Sarnoff Symposium, New Jersey (2012)","DOI":"10.1109\/SARNOF.2012.6222759"},{"key":"15_CR18","unstructured":"appKnox: DDoS attacks on mobile apps - are they real and how to be safe, 24 May 2019. https:\/\/www.appknox.com\/blog\/ddos-attacks-on-mobile-apps. Accessed 30 Sept 2019"},{"key":"15_CR19","unstructured":"Palermo, E.: What is privilege escalation? 18 December 2013. https:\/\/www.tomsguide.com\/us\/privilege-escalation,review-1983.html. Accessed 9 Oct 2019"},{"key":"15_CR20","unstructured":"M Lab: All about ransomware, 12 July 2017. https:\/\/www.malwarebytes.com\/ransomware\/. Accessed 15 Oct 2019"},{"key":"15_CR21","unstructured":"Techopedia: Rooting, 17 June 2017. https:\/\/www.techopedia.com\/definition\/31284\/rooting-smartphones. Accessed 11 Oct 2019"},{"key":"15_CR22","unstructured":"Stacey, P.: What is Spam? 10 August 2015. https:\/\/forerunner.com.au\/internet\/what-is-spam\/. Accessed 12 May 2019"},{"key":"15_CR23","unstructured":"Rouse, M.: Spyware, 17 November 2018. https:\/\/searchsecurity.techtarget.com\/definition\/spyware. Accessed 20 June 2019"},{"key":"15_CR24","unstructured":"Kaspersky: What is a Trojan Virus? 23 March 2018. https:\/\/www.kaspersky.com\/resource-center\/threats\/trojans. Accessed 18 July 2019"},{"key":"15_CR25","unstructured":"Play Protect: Mobile unwanted software (MUwS), 25 November 2018. https:\/\/developers.google.com\/android\/play-protect\/phacategories#muws. Accessed 05 Aug 2019"},{"key":"15_CR26","volume-title":"Android Malware and Analysis","author":"K Dunham","year":"2015","unstructured":"Dunham, K., Hartman, S., Quintans, M., Morales, J.A., Strazzere, T.: Android Malware and Analysis. CRC Press, New York (2015)"},{"key":"15_CR27","unstructured":"Malicious Android app had more than 100 million downloads in Google Play, 27 August 2019. https:\/\/www.kaspersky.com\/blog\/camscanner-malicious-android-app\/28156\/. Accessed 26 Oct 2019"},{"key":"15_CR28","unstructured":"Liang, K.Y.: Investigating potentially harmful applications on android. ResearchGate, Yokohama (2018)"},{"key":"15_CR29","unstructured":"BBC: China study the Great nation app enables spying via back door,14 October 2019. https:\/\/www.bbc.com\/news\/technology-50042379. Accessed 01 Nov 2019"},{"key":"15_CR30","unstructured":"Check Point: ExpensiveWall: a dangerous packed malware on google play that will hit your wallet, 14 September 2017. https:\/\/blog.checkpoint.com\/2017\/09\/14\/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet\/. Accessed 03 Nov 2019"},{"key":"15_CR31","unstructured":"O'Donnell, L.: WhatsApp spyware attack: uncovering NSO group activity, 30 October 2019. https:\/\/threatpost.com\/whatsapp-hack-nso-group-investigation\/149696\/. Accessed 13 Nov 2019"},{"key":"15_CR32","unstructured":"Saarinen, J.: Google mass-culls apps after malware found in Play Store, 23 August 2017. https:\/\/www.itnews.com.au\/news\/google-mass-culls-apps-after-malware-found-in-play-store-471485. Accessed 27 Nov 2019"},{"key":"15_CR33","unstructured":"Davis, J.: Majority of health apps share user data, without transparency, 21 March 2019. https:\/\/healthitsecurity.com\/news\/majority-of-health-apps-share-user-data-without-transparency. Accessed 15 June 2019"},{"key":"15_CR34","unstructured":"Alexandra Dmitrienko, M.W.: Privilege escalation attacks on android. ResearchGate, Bochum (2010)"},{"key":"15_CR35","unstructured":"Stefanko, L.: Android ransomware is back, 29 July 2019. https:\/\/www.welivesecurity.com\/2019\/07\/29\/android-ransomware-back\/. Accessed 28 Nov 2019"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Chandy, R., Gu, H.: Identifying spam in the iOS app store. In: 2nd Joint WICOW\/AIRWeb Workshop on Web Quality, Lyon, France (2012)","DOI":"10.1145\/2184305.2184317"},{"key":"15_CR37","unstructured":"Garcia, A.: LinkedIn to pay $13 million for unwanted e-mails, lawyers could get $3.3 million, 03 October 2015. https:\/\/money.cnn.com\/2015\/10\/03\/news\/linkedin-settles-lawsuit-emails\/index.html. Accessed 29 Nov 2019"},{"key":"15_CR38","unstructured":"Sly, L.: U.S. soldiers are revealing sensitive and dangerous information by jogging, 29 January 2018. https:\/\/www.washingtonpost.com\/world\/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing\/2018\/01\/28\/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.daedfe0677ee. Accessed 24 Apr 2019"},{"issue":"1","key":"15_CR39","doi-asserted-by":"crossref","first-page":"85","DOI":"10.33590\/emjreprohealth\/20-00033","volume":"6","author":"CL Curchoe","year":"2020","unstructured":"Curchoe, C.L.: Smartphone applications for reproduction: from rigorously validated and clinically relevent to potentially harmful. EMJ Repro Health 6(1), 85\u201391 (2020)","journal-title":"EMJ Repro Health"},{"issue":"2","key":"15_CR40","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1093\/jamia\/ocz175","volume":"27","author":"S Akbar","year":"2020","unstructured":"Akbar, S., Coiera, E., Magrabi, F.: Safety concerns with consumer - facing mobile health applications and their consdequences: a scoping reivew. J. Am. Med. Inform. Assoc. 27(2), 330\u2013340 (2020)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"15_CR41","unstructured":"WHO, 08 September 2018. https:\/\/www.who.int\/features\/qa\/gaming-disorder\/en\/. Accessed 25 Dec 2019"},{"key":"15_CR42","volume-title":"Children in a Digital World","author":"A Lake","year":"2017","unstructured":"Lake, A.: Children in a Digital World. UNICEF, New York (2017)"},{"key":"15_CR43","unstructured":"N.C. Institute: Effects of using mobile phones too much. International Telecommunication Union, Ukraine (2011)"},{"key":"15_CR44","first-page":"562","volume":"7","author":"L D\u2019Souza","year":"2019","unstructured":"D\u2019Souza, L., Manish, S., Deeksha, S.: Development and validation of PUBG addiction test. Int. J. Indian Psychol. 7, 562\u2013574 (2019)","journal-title":"Int. J. Indian Psychol."},{"key":"15_CR45","unstructured":"Ganjoo, S.: PUBG addiction: teenager dies of cardiac arrest while playing PUBG, 31 May 219. https:\/\/www.indiatoday.in\/technology\/news\/story\/teenager-dies-of-cardiac-arrest-while-playing-pubg-1539409-2019-05-31. Accessed 05 Nov 2019"},{"key":"15_CR46","unstructured":"Mukherjee, A.: PUBG MOBILE player in Jammu falls sick after playing game for 10 days without rest, admitted to hospital, 10 January 2019. https:\/\/www.indiatoday.in\/technology\/news\/story\/pubg-mobile-makes-player-go-mad-admitted-to-hospital-under-serious-trauma-1427705-2019-01-10. Accessed 5 Nov 2019"},{"issue":"3","key":"15_CR47","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1093\/tbm\/ibaa131","volume":"11","author":"E Panagiotopoulou","year":"2021","unstructured":"Panagiotopoulou, E., Peiris, C., Hayes, D.: Behavior change techniques in mobile apps targeting self-harm in young people: a systematic review. Transl. Behav. Med. 11(3), 832\u2013841 (2021)","journal-title":"Transl. Behav. Med."},{"key":"15_CR48","unstructured":"Adeane: Blue Whale: what is the truth behind an online \u2018suicide challenge\u2019? 13 January 2019. https:\/\/www.bbc.com\/news\/blogs-trending-46505722. Accessed 5 Nov 2019"},{"key":"15_CR49","unstructured":"Tiktokdeath: Home, 18 August 2019. https:\/\/www.tiktokdeath.com\/. Accessed 24 Aug 2019"},{"key":"15_CR50","unstructured":"Kumar, S.: TikTok challenge gone wrong: 12-year-old boy hangs himself wearing mangalsutra, bangles in Rajasthan, 20 June 2019. https:\/\/www.indiatoday.in\/india\/story\/tiktok-challenge-boy-hangs-self-wearing-mangalsutra-bangles-kota-rajasthan-1553087-2019-06-20. Accessed 6 Nov 2019"},{"key":"15_CR51","unstructured":"UAE mother raises alarm after teenager survives choking game, 28 October 2019. https:\/\/gulfnews.com\/uae\/uae-mother-raises-alarm-after-teenager-survives-choking-game-1.67450513. Accessed 05 Dec 2019"},{"key":"15_CR52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.56770\/jcp201701","volume":"1","author":"P Das","year":"2017","unstructured":"Das, P., Zhu, M.O., McLaughlin, L., Bilgrami, Z., Milanaik, R.L.: Augmented reality video games: new possibilities and implications for children and adolescents. MTI 1, 1\u201310 (2017)","journal-title":"MTI"},{"key":"15_CR53","doi-asserted-by":"publisher","unstructured":"Mamun, M.A., Griffiths, M.D.: The psychosocial impact of extreme gaming on Indian. Int. J. Mental Health Addict. 24\u201329 (2019). https:\/\/doi.org\/10.1007\/s11469-019-00102-4","DOI":"10.1007\/s11469-019-00102-4"},{"key":"15_CR54","unstructured":"UKCCIS: Child Safety Online, 16 March 2015. https:\/\/www.gov.uk\/government\/groups\/uk-council-for-child-internet-safety-ukccis. Accessed 22 Dec 2019"},{"key":"15_CR55","unstructured":"FTC ruling sees Musical.ly (TikTok) fined $5.7M for violating children\u2019s privacy law, app updated with age gate, 27 February 2019. https:\/\/techcrunch.com\/2019\/02\/27\/musical-ly-tiktok-fined-5-7m-by-ftc-for-violating-childrens-privacy-laws-will-update-app-with-age-gate\/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAANBPBuaqBqaLSiU08G1TeABtUohJ3u1yfYDq. Accessed 26 Dec 2019"},{"key":"15_CR56","unstructured":"Silva, M.: Video app TikTok fails to remove online predators, 05 April 2019. https:\/\/www.bbc.com\/news\/blogs-trending-47813350. Accessed 7 Nov 2019"},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.R.: Unsafe exposure analysis of mobile in-app advertisements. In: 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Arizona, USA (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"15_CR58","unstructured":"Rowan, L.: Watch out for scams targeting cash app users, 10 November 2019. https:\/\/twocents.lifehacker.com\/watch-out-for-scams-targeting-cash-app-users-1838974205. Accessed 17 Nov 2019"},{"key":"15_CR59","unstructured":"Feinstein, E.: The costs of mobile payment fraud and how to avoid it, 10 August 2017. https:\/\/www.business.com\/articles\/avoiding-mobile-payment-fraud\/. Accessed 18 Nov 2019"},{"key":"15_CR60","doi-asserted-by":"crossref","unstructured":"Badillo-Urquiola, K., Smriti, D., McNally, B., Golub, E., Bonsignore, E., Wisniewski, P.J.: \u201cStranger Danger!\u201d social media app features co-designed with children to keep them safe online. In: 18th ACM International Conference on Interaction Design and Children, Boise, USA (2019)","DOI":"10.1145\/3311927.3323133"},{"key":"15_CR61","unstructured":"Keach, S.: TikTok stars \u2018exploiting kids\u2019 for gifts as Brit fans pay \u00a3100s just to talk to them, 03 July 2019. https:\/\/www.thesun.co.uk\/tech\/9425355\/tiktok-gifts-drama-queen-exploiting-kids\/. Accessed 08 Nov 2019"},{"key":"15_CR62","unstructured":"1011 Now: Lincoln man loses $3,000 after daughter scammed through Tik Tok app, 12 July 2019. https:\/\/www.1011now.com\/content\/news\/Lincoln-man-loses-3000-after-scam-through-Tik-Tok-app-512636981.html. Accessed 09 Dec 2019"},{"key":"15_CR63","unstructured":"Nadeau, M.: What is cryptojacking? How to prevent detect and recover from it, 31 October 2019. https:\/\/www.csoonline.com\/article\/3253572\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html. Accessed 02 Dec 2019"},{"key":"15_CR64","unstructured":"Beedham, M.: Google lifts ban on Ethereum wallet app it thought was mining cryptocurrency, 03 January 2020. https:\/\/thenextweb.com\/hardfork\/2020\/01\/03\/google-lifts-ban-ethereum-wallet-app-metamask-mining-cryptocurrency\/. Accessed 05 Jan 2020"},{"key":"15_CR65","unstructured":"Grustniy, L.: Hidden miners on Google Play, 04 April 2018. https:\/\/www.kaspersky.com\/blog\/google-play-hidden-miners\/21882\/. Accessed 10 Dec 2019"},{"key":"15_CR66","unstructured":"AFP: Hackers target smartphones to mine cryptocurrencies, 22 August 2018. https:\/\/www.livemint.com\/Technology\/fdgH7ffZAeAFtHdboLkvsN\/Hackers-target-smartphones-to-mine-cryptocurrencies.html. Accessed 12 Dec 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76346-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T23:37:40Z","timestamp":1672270660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76346-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030763459","9783030763466"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76346-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AICV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Artificial Intelligence and Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Settat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicv12021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AICV2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}