{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:55:49Z","timestamp":1773154549881,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617102","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"143-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6389-5508","authenticated-orcid":false,"given":"Urvashi","family":"Kishnani","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Denver, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8416-1415","authenticated-orcid":false,"given":"Naheem","family":"Noah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Denver, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Denver, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-2157","authenticated-orcid":false,"given":"Rinku","family":"Dewri","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Denver, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243842"},{"key":"e_1_3_2_1_2_1","unstructured":"Aijn Abraham D Schlecht G Ma M Dobrushin and V Nadal. 2016. Mobile security framework (MobSF)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.55"},{"key":"e_1_3_2_1_4_1","volume-title":"The Application of Mobile Security Framework (MOBSF) and Mobile Application Security Testing Guide to Ensure the Security in Mobile Commerce Applications. Jurnal Sistim Informasi dan Teknologi 5, 2","author":"Anwar Chairul","year":"2023","unstructured":"Chairul Anwar, Sultan Hady, Novi Rahayu, Kraugusteeliana Kraugusteeliana, 2023. The Application of Mobile Security Framework (MOBSF) and Mobile Application Security Testing Guide to Ensure the Security in Mobile Commerce Applications. Jurnal Sistim Informasi dan Teknologi 5, 2 (2023), 97\u2013102."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security. Association for Computing MachineryNew YorkNYUnited States, Raleigh North Carolina USA, 217\u2013228","author":"Wain\u00a0Yee Au Kathy","year":"2012","unstructured":"Kathy Wain\u00a0Yee Au, Yi\u00a0Fan Zhou, Zhen Huang, and David Lie. 2012. Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security. Association for Computing MachineryNew YorkNYUnited States, Raleigh North Carolina USA, 217\u2013228."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282921"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351722"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04536-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Chen Sen","unstructured":"Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, and Lihua Xu. 2018. Are mobile banking apps secure? what can be improved?. In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Association for Computing Machinery New York United States, Lake Buena Vista FL USA, 797\u2013802."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622115"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23106"},{"key":"e_1_3_2_1_14_1","volume-title":"Enigma 2018 (Enigma","author":"Derr Erik","year":"2018","unstructured":"Erik Derr. 2018. The impact of third-party code on android app security. In Enigma 2018 (Enigma 2018). USENIX Association, Santa Clara, CA, USA."},{"key":"e_1_3_2_1_15_1","volume-title":"Android Documentation: Security. https:\/\/developer.android.com\/topic\/security\/.","author":"Developers Android","year":"2022","unstructured":"Android Developers. 2022. Android Documentation: Security. https:\/\/developer.android.com\/topic\/security\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Developer Guides: Android Developers. https:\/\/developer.android.com\/guide\/.","author":"Developers Android","year":"2023","unstructured":"Android Developers. 2023. Developer Guides: Android Developers. https:\/\/developer.android.com\/guide\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Permission based Android security: Issues and countermeasures. computers & security 43","author":"Fang Zheran","year":"2014","unstructured":"Zheran Fang, Weili Han, and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security 43 (2014), 205\u2013218."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371300.3383346"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833729"},{"key":"e_1_3_2_1_22_1","first-page":"36","article-title":"Issues and security measures of mobile banking Apps","volume":"6","author":"Hayikader Sameer","year":"2016","unstructured":"Sameer Hayikader, FN Hadi, and Jamaludin Ibrahim. 2016. Issues and security measures of mobile banking Apps. International Journal of Scientific and Research Publications 6, 1 (2016), 36\u201341.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282895"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-03-2018-0072"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"e_1_3_2_1_26_1","volume-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, IEEE","author":"Jain Arushi","year":"2016","unstructured":"Arushi Jain 2016. Android security: Permission based attacks. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, IEEE, New Delhi, India, 2754\u20132759."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2792-2_50"},{"key":"e_1_3_2_1_28_1","volume-title":"Security Testing Of Android Based Covid Tracer Applications. In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). IEEE, IEEE","author":"Kohli Narmada","year":"2020","unstructured":"Narmada Kohli and Mahsa Mohaghegh. 2020. Security Testing Of Android Based Covid Tracer Applications. In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). IEEE, IEEE, Gold Coast, Australia, 1\u20136."},{"key":"e_1_3_2_1_29_1","volume-title":"MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis. In 2020 IEEE MIT Undergraduate Research Technology Conference (URTC). IEEE, IEEE, Virtual, 1\u20134.","author":"LaMalva Grace","year":"2020","unstructured":"Grace LaMalva and Suzanna Schmeelk. 2020. MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis. In 2020 IEEE MIT Undergraduate Research Technology Conference (URTC). IEEE, IEEE, Virtual, 1\u20134."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2016.77"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-017-0336-7"},{"key":"e_1_3_2_1_32_1","volume-title":"Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015","author":"Lin Yu-Cheng","year":"2015","unstructured":"Yu-Cheng Lin. 2015. Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015 (2015)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the Fourteenth European Conference on Information Systems, ECIS 2006","author":"Linck Kathrin","year":"2006","unstructured":"Kathrin Linck, Key Pousttchi, and Dietmar\u00a0Georg Wiedemann. 2006. Security Issues in Mobile Payment from the Customer Viewpoint, In Proceedings of the Fourteenth European Conference on Information Systems, ECIS 2006, G\u00f6teborg, Sweden, 2006. University of Augsburg \u2013 Working Paper, 1085\u20131095."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. USENIX Association","author":"Mahmud Samin\u00a0Yaseer","year":"2020","unstructured":"Samin\u00a0Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves. 2020. Cardpliance: PCI DSS compliance of android applications. In Proceedings of the 29th USENIX Conference on Security Symposium. USENIX Association, Wilmington, DE, USA, 1517\u20131533."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.27"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3424953.3426633"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9375-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_36"},{"key":"e_1_3_2_1_39_1","unstructured":"Microsoft. 2022. Accessibility Insights. https:\/\/accessibilityinsights.io\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21049"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJEG.2022.123245"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10684-2_10"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00012"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300698"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETSIoT.2012.6311252"},{"key":"e_1_3_2_1_47_1","volume-title":"WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium. USENIX Association, USENIX Association","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security Symposium. USENIX Association, USENIX Association, Washington, DC, 527\u2013542."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 2018 CHI conference on human factors in computing systems. ACM, Montreal QC Canada, 1\u201316","author":"Pettersson Ingrid","year":"2018","unstructured":"Ingrid Pettersson, Florian Lachner, Anna-Katharina Frison, Andreas Riener, and Andreas Butz. 2018. A Bermuda triangle? A Review of method application and triangulation in user experience evaluation. In Proceedings of the 2018 CHI conference on human factors in computing systems. ACM, Montreal QC Canada, 1\u201316."},{"key":"e_1_3_2_1_49_1","unstructured":"PyPI. 2023. Python Package Index. https:\/\/pypi.org\/."},{"key":"e_1_3_2_1_50_1","volume-title":"symposium (USENIX security 19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari\u00a0Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 ways to leak your data: An exploration of apps\u2019 circumvention of the android permissions system. In 28th USENIX security symposium (USENIX security 19). USENIX Association, Santa Clara CA USA, 603\u2013620."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40558-015-0035-y"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512223"},{"key":"e_1_3_2_1_54_1","volume-title":"IFIP Annual Conference on Data and Applications Security and Privacy","author":"Surani Aishwarya","unstructured":"Aishwarya Surani, Amani Bawaked, Matthew Wheeler, Braden Kelsey, Nikki Roberts, David Vincent, and Sanchari Das. 2023. Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Springer, Sophia-Antipolis, France, 319\u2013338."},{"key":"e_1_3_2_1_55_1","volume-title":"Analisis dan Deteksi Malware dengan Metode Hybrid Analysis Menggunakan Framework MOBSF. (JurTI) Jurnal Teknologi Informasi 4, 2","author":"Tansen Edward","year":"2020","unstructured":"Edward Tansen and Deris\u00a0Wahyu Nurdiarto. 2020. Analisis dan Deteksi Malware dengan Metode Hybrid Analysis Menggunakan Framework MOBSF. (JurTI) Jurnal Teknologi Informasi 4, 2 (2020), 191\u2013201."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106290"},{"key":"e_1_3_2_1_57_1","volume-title":"Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems","author":"Tazi Faiza","unstructured":"Faiza Tazi, Suleiman Saka, Griffin Opp, Shradha Neupane, Sanchari Das, Lorenzo De\u00a0Carli, and Indrakshi Ray. 2023. Accessibility Evaluation of IoT Android Mobile Companion Apps. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery New York NY United States, Hamburg, Germany, 1\u20137."},{"key":"e_1_3_2_1_58_1","unstructured":"Textblob. 2023. Simplified Text Processing. https:\/\/textblob.readthedocs.io\/en\/dev\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2012.6261085"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4226"},{"key":"e_1_3_2_1_61_1","volume-title":"Opinion Analysis and Organization of Mobile Application User Reviews. In REFSQ Workshops. REFSQ, Virtual, 1\u20139.","author":"Wang Long","year":"2020","unstructured":"Long Wang, Hiroyuki Nakagawa, and Tatsuhiro Tsuchiya. 2020. Opinion Analysis and Organization of Mobile Application User Reviews. In REFSQ Workshops. REFSQ, Virtual, 1\u20139."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19143052"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.15439\/2019F289"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761572"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS49979.2021.9432666"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","location":"Copenhagen Denmark","acronym":"EuroUSEC 2023"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":65,"alternative-id":["10.1145\/3617072.3617102","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617102","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}