{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:26:52Z","timestamp":1766068012440,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3663529.3663863","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:43:13Z","timestamp":1720640593000},"page":"440-451","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Property-Based Testing for Validating User Privacy-Related Functionalities in Social Media Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8437-0687","authenticated-orcid":false,"given":"Jingling","family":"Sun","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1628-9796","authenticated-orcid":false,"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9286-8285","authenticated-orcid":false,"given":"Jianwen","family":"Li","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3566-0088","authenticated-orcid":false,"given":"Mengfei","family":"Wang","sequence":"additional","affiliation":[{"name":"ByteDance, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9750-8334","authenticated-orcid":false,"given":"Geguang","family":"Pu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771786"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings international symposium on empirical software engineering. 37\u201347","author":"Andersson Carina","year":"2002","unstructured":"Carina Andersson and Per Runeson. 2002. Verification and validation in industry-a qualitative survey on the state of practice. In Proceedings international symposium on empirical software engineering. 37\u201347."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509549"},{"key":"e_1_3_2_1_5_1","volume-title":"Covert: Compositional analysis of android inter-app permission leakage","author":"Bagheri Hamid","year":"2015","unstructured":"Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, and Sam Malek. 2015. Covert: Compositional analysis of android inter-app permission leakage. IEEE transactions on Software Engineering, 41, 9 (2015), 866\u2013886."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2697848"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ezio Bartocci Yli\u00e8s Falcone Adrian Francalanza and Giles Reger. 2018. Introduction to runtime verification. In Lectures on Runtime Verification. 1\u201333.","DOI":"10.1007\/978-3-319-75632-5_1"},{"key":"e_1_3_2_1_8_1","volume-title":"26th International symposium on temporal representation and reasoning (TIME).","author":"Brunello Andrea","year":"2019","unstructured":"Andrea Brunello, Angelo Montanari, and Mark Reynolds. 2019. Synthesis of LTL formulas from natural language texts: State of the art and research directions. In 26th International symposium on temporal representation and reasoning (TIME)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2824\u20132843","author":"Bui Duc","year":"2021","unstructured":"Duc Bui, Yuan Yao, Kang G Shin, Jong-Min Choi, and Junbum Shin. 2021. Consistency analysis of data-usage purposes in mobile apps. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2824\u20132843."},{"key":"e_1_3_2_1_10_1","unstructured":"ByteDance. 2023. TikTok. Retrieved 2024-2 from https:\/\/www.tiktok.com\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Koen Claessen and John Hughes. 2000. QuickCheck: a lightweight tool for random testing of Haskell programs. In fifth ACM SIGPLAN international conference on Functional programming (ICFP). 268\u2013279.","DOI":"10.1145\/357766.351266"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Matthias Cosler Christopher Hahn Daniel Mendoza Frederik Schmitt and Caroline Trippel. 2023. nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models. arXiv preprint arXiv:2303.04864.","DOI":"10.1007\/978-3-031-37703-7_18"},{"key":"e_1_3_2_1_13_1","unstructured":"Louis DeNicola. 2023. How to Manage Your Privacy Settings on Social Media. Retrieved 2024-2 from https:\/\/www.experian.com\/blogs\/ask-experian\/how-to-manage-your-privacy-settings-on-social-media\/"},{"key":"e_1_3_2_1_14_1","volume-title":"42nd International Conference on Software Engineering (ICSE). 1\u201312","author":"Dong Zhen","year":"2020","unstructured":"Zhen Dong, Marcel B\u00f6hme, Lucia Cojocaru, and Abhik Roychoudhury. 2020. Time-travel testing of Android apps. In 42nd International Conference on Software Engineering (ICSE). 1\u201312."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"E Allen Emerson and Edmund M Clarke. 1980. Characterizing correctness properties of parallel programs using fixpoints. In International Colloquium on Automata Languages and Programming. 169\u2013181.","DOI":"10.1007\/3-540-10003-2_69"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_17_1","volume-title":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). 308\u2013318","author":"Fazzini Mattia","year":"2017","unstructured":"Mattia Fazzini and Alessandro Orso. 2017. Automated cross-platform inconsistency detection for mobile apps. In 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). 308\u2013318."},{"key":"e_1_3_2_1_18_1","unstructured":"Lauren Feiner. 2018. Facebook\u2019s worst year ever is now over. Here\u2019s how its scandals affected the stock. Retrieved 2024-2 from https:\/\/www.cnbc.com\/2018\/12\/31\/how-facebooks-stocked-fared-through-privacy-scandals-in-2018.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/263244.263267"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Paul Gastin and Denis Oddoux. 2001. Fast LTL to B\u00fcchi Automata Translation. computer aided verification.","DOI":"10.1007\/3-540-44585-4_6"},{"key":"e_1_3_2_1_21_1","volume-title":"ARSENAL: Automatic Requirements Specification Extraction from Natural Language. arXiv: Computation and Language.","author":"Ghosh Shalini","year":"2014","unstructured":"Shalini Ghosh, Daniel Elenius, Wenchao Li, Patrick Lincoln, Natarajan Shankar, and Wilfried Steiner. 2014. ARSENAL: Automatic Requirements Specification Extraction from Natural Language. arXiv: Computation and Language."},{"key":"e_1_3_2_1_22_1","volume-title":"Trust and Trustworthy Computing: 5th International Conference (TRUST). 291\u2013307","author":"Gibler Clint","year":"2012","unstructured":"Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. 2012. Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Trust and Trustworthy Computing: 5th International Conference (TRUST). 291\u2013307."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2024. Google Play. Retrieved 2024-2 from https:\/\/play.google.com\/store"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Nakul Gopalan Dilip Arumugam Lawson Wong and Stefanie Tellex. 2018. Sequence-to-sequence language grounding of non-Markovian task specifications. In Robotics: Science and Systems XIV.","DOI":"10.15607\/RSS.2018.XIV.067"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00042"},{"key":"e_1_3_2_1_27_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18). 531\u2013548."},{"key":"e_1_3_2_1_28_1","volume-title":"Abdul Rehman Javed, Zunera Jalil, Xuan Liu, and Waleed S Alnumay.","author":"Imtiaz Syed Ibrahim","year":"2021","unstructured":"Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, and Waleed S Alnumay. 2021. DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Generation computer systems, 115 (2021), 844\u2013856."},{"key":"e_1_3_2_1_29_1","volume-title":"QuickREST: Property-based Test Generation of OpenAPI-Described RESTful APIs. In 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST). 131\u2013141","author":"Karlsson Stefan","year":"2020","unstructured":"Stefan Karlsson, Adnan \u010cau\u0161evi\u0107, and Daniel Sundmark. 2020. QuickREST: Property-based Test Generation of OpenAPI-Described RESTful APIs. In 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST). 131\u2013141."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133850.3133853"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3360607","article-title":"Coverage guided, property based testing","volume":"181","author":"Lampropoulos Leonidas","year":"2019","unstructured":"Leonidas Lampropoulos, Michael Hicks, and Benjamin C. Pierce. 2019. Coverage guided, property based testing. Proc. ACM Program. Lang., 181:1\u2013181:29.","journal-title":"Proc. ACM Program. Lang."},{"key":"e_1_3_2_1_32_1","volume-title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE). 1, 280\u2013291","author":"Li Li","year":"2015","unstructured":"Li Li, Alexandre Bartel, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2015. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE). 1, 280\u2013291."},{"key":"e_1_3_2_1_33_1","article-title":"Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at A Large Scale","author":"Li Shuai","year":"2024","unstructured":"Shuai Li, Zhemin Yang, Yunteng Yang, Dingyi Liu, and Min Yang. 2024. Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at A Large Scale. IEEE Transactions on Information Forensics and Security.","journal-title":"IEEE Transactions on Information Forensics and Security."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/TSE.2014.2331982","article-title":"On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices","author":"Lin Ying-Dar","year":"2014","unstructured":"Ying-Dar Lin, Jos\u00e9 F. Rojas, Edward T.-H. Chu, and Yuan-Cheng Lai. 2014. On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices. IEEE Trans. Software Eng., 957\u2013970.","journal-title":"IEEE Trans. Software Eng."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559505"},{"volume-title":"27th annual ACM symposium on applied computing. 1457\u20131462.","author":"Mann Christopher","key":"e_1_3_2_1_37_1","unstructured":"Christopher Mann and Artem Starostin. 2012. A framework for static detection of privacy leaks in android applications. In 27th annual ACM symposium on applied computing. 1457\u20131462."},{"key":"e_1_3_2_1_38_1","volume-title":"25th International Symposium on Software Testing and Analysis (ISSTA). 94\u2013105","author":"Mao Ke","year":"2016","unstructured":"Ke Mao, Mark Harman, and Yue Jia. 2016. Sapienz: multi-objective automated testing for Android applications. In 25th International Symposium on Software Testing and Analysis (ISSTA). 94\u2013105."},{"volume-title":"Encyclopedia of Computer Science. 129\u2013131.","author":"McCracken Daniel D","key":"e_1_3_2_1_39_1","unstructured":"Daniel D McCracken and Edwin D Reilly. 2003. Backus-naur form (bnf). In Encyclopedia of Computer Science. 129\u2013131."},{"key":"e_1_3_2_1_40_1","unstructured":"Monkey Team. 2023. Android Monkey. Retrieved 2024-2 from https:\/\/developer.android.com\/studio\/test\/monkey"},{"volume-title":"Winter School on Logic and Computer Science","author":"Mukund Madhavan","key":"e_1_3_2_1_41_1","unstructured":"Madhavan Mukund. 1997. Linear-time temporal logic and B\u00fcchi automata. Tutorial talk, Winter School on Logic and Computer Science, Indian Statistical Institute, Calcutta, 8."},{"volume-title":"Automated Identification of LTL Patterns in Natural Language Requirements. International Symposium on Software Reliability Engineering.","author":"Allen","key":"e_1_3_2_1_42_1","unstructured":"Allen P. Nikora and Galen Balcom. 2009. Automated Identification of LTL Patterns in Natural Language Requirements. International Symposium on Software Reliability Engineering."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Yuuki Nishimoto Naoya Kajiwara Shinichi Matsumoto Yoshiaki Hori and Kouichi Sakurai. 2013. Detection of Android API Call Using Logging Mechanism within Android Framework. Lecture notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering.","DOI":"10.1007\/978-3-319-04283-1_25"},{"key":"e_1_3_2_1_44_1","unstructured":"Business of Apps. 2024. Digital 2024: Global Overview Report. Retrieved 2024-2 from https:\/\/datareportal.com\/reports\/digital-2024-global-overview-report"},{"key":"e_1_3_2_1_45_1","volume-title":"Practical Aspects of Declarative Languages: 23rd International Symposium (PADL). 127\u2013144","author":"Padhiyar Sumit","year":"2021","unstructured":"Sumit Padhiyar and KC Sivaramakrishnan. 2021. ConFuzz: Coverage-guided property fuzzing for event-driven programs. In Practical Aspects of Declarative Languages: 23rd International Symposium (PADL). 127\u2013144."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Roma Patel Ellie Pavlick and Stefanie Tellex. 2020. Grounding Language to Non-Markovian Tasks with No Supervision of Task Specifications.. In Robotics: Science and Systems.","DOI":"10.15607\/RSS.2020.XVI.016"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_49_1","unstructured":"Junit quickcheck Team. 2024. Junit-quickcheck. Retrieved 2024-2 from https:\/\/github.com\/pholser\/junit-quickcheck"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397379"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278186.3278195"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Tain\u00e3 Santos Gustavo Carvalho and Augusto Sampaio. 2018. Formal Modelling of Environment Restrictions from Natural-Language Requirements..","DOI":"10.1007\/978-3-030-03044-5_16"},{"key":"e_1_3_2_1_53_1","volume-title":"2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). 1\u20136.","author":"Schindler Christian","year":"2022","unstructured":"Christian Schindler, M\u00fcsl\u00fcm Atas, Thomas Strametz, Johannes Feiner, and Reinhard Hofer. 2022. Privacy leak identification in third-party Android libraries. In 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). 1\u20136."},{"key":"e_1_3_2_1_54_1","volume-title":"Symposium and Bootcamp on the Science of Security. 115\u2013117","author":"Schmerl Bradley","year":"2016","unstructured":"Bradley Schmerl, Jeffrey Gennari, Javier C\u00e1mara, and David Garlan. 2016. Raindroid: A system for run-time mitigation of Android intent vulnerabilities [poster]. In Symposium and Bootcamp on the Science of Security. 115\u2013117."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJESMA.2019040101"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338910"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Ting Su Yichen Yan Jue Wang Jingling Sun Yiheng Xiong Geguang Pu Ke Wang and Zhendong Su. 2021. Fully automated functional fuzzing of Android apps for detecting non-crashing logic bugs. ACM on Programming Languages (OOPSLA) 1\u201331.","DOI":"10.1145\/3485533"},{"key":"e_1_3_2_1_60_1","volume-title":"2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). 532\u2013539","author":"Sun Haiyang","year":"2017","unstructured":"Haiyang Sun, Andrea Rosa, Omar Javed, and Walter Binder. 2017. ADRENALIN-RV: Android runtime verification using load-time weaving. In 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). 532\u2013539."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464806"},{"key":"e_1_3_2_1_62_1","unstructured":"Hypothesis Team. 2023. Hypothesis. Retrieved 2024-2 from https:\/\/github.com\/HypothesisWorks\/hypothesis"},{"key":"e_1_3_2_1_63_1","unstructured":"Quickcheck Team. 2023. Quickcheck. Retrieved 2024-2 from https:\/\/github.com\/BurntSushi\/quickcheck"},{"key":"e_1_3_2_1_64_1","unstructured":"Spot Team. 2023. Spot. Retrieved 2024-2 from https:\/\/spot.lre.epita.fr\/"},{"key":"e_1_3_2_1_65_1","unstructured":"Stanza Team. 2023. Stanza. Retrieved 2024-2 from https:\/\/stanfordnlp.github.io\/stanza\/"},{"key":"e_1_3_2_1_66_1","first-page":"433","article-title":"Computing machinery and intelligence","author":"A. M.","year":"1950","unstructured":"A. M. TURING. 1950. Computing machinery and intelligence. Mind, LIX, 236 (1950), 433\u2013460.","journal-title":"Mind"},{"key":"e_1_3_2_1_67_1","unstructured":"uiautomator2 Team. 2023. uiautomator2. Retrieved 2024-2 from https:\/\/github.com\/openatx\/uiautomator2"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382756.2382797"},{"key":"e_1_3_2_1_69_1","unstructured":"Christopher Wang Candace Ross Yen-Ling Kuo Boris Katz and Andrei Barbu. 2020. Learning a natural-language to LTL executable semantic parser for grounded robotics. arXiv: Computation and Language arXiv: Computation and Language."},{"key":"e_1_3_2_1_70_1","volume-title":"ACM\/IEEE 42nd International Conference on Software Engineering (ICSE). 469\u2013480","author":"Wang Jue","year":"2020","unstructured":"Jue Wang, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma, and Jian Lu. 2020. ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case Combinations. In ACM\/IEEE 42nd International Conference on Software Engineering (ICSE). 469\u2013480."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Yin Wang Ming Fan Junfeng Liu Junjie Tao Wuxia Jin Qi Xiong Yuhao Liu Qinghua Zheng and Ting Liu. 2023. Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. arXiv preprint arXiv:2302.13860.","DOI":"10.1109\/TSE.2024.3479288"},{"key":"e_1_3_2_1_72_1","unstructured":"WEditor Team. 2023. WEditor. Retrieved 2024-2 from https:\/\/pypi.org\/project\/weditor\/"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"e_1_3_2_1_74_1","unstructured":"James A Whittaker. 2009. Exploratory software testing: tips tricks tours and techniques to guide test design. Pearson Education."},{"key":"e_1_3_2_1_75_1","unstructured":"Dong-Jie Wu Ching-Hao Mao Te-En Wei Hahn-Ming Lee and Kuo-Ping Wu. 2012. DroidMat: Android Malware Detection through Manifest and API Calls Tracing. Information Security."},{"key":"e_1_3_2_1_76_1","unstructured":"Xiaomi. 2024. GetApps. Retrieved 2024-2 from https:\/\/global.app.mi.com\/"},{"key":"e_1_3_2_1_77_1","unstructured":"Rongjie Yan Chih-Hong Cheng and Yesheng Chai. 2015. Formal consistency checking over specifications in natural languages. Design Automation and Test in Europe Design Automation and Test in Europe."},{"key":"e_1_3_2_1_78_1","first-page":"221","article-title":"Ppchecker: Towards accessing the trustworthiness of android apps\u2019 privacy policies","volume":"47","author":"Yu Le","year":"2018","unstructured":"Le Yu, Xiapu Luo, Jiachi Chen, Hao Zhou, Tao Zhang, Henry Chang, and Hareton KN Leung. 2018. Ppchecker: Towards accessing the trustworthiness of android apps\u2019 privacy policies. IEEE Transactions on Software Engineering, 47, 2 (2018), 221\u2013242.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_79_1","first-page":"228","article-title":"Permission-based android malware detection","volume":"2","author":"Zarni Aung Win Zaw","year":"2013","unstructured":"Win Zaw Zarni Aung. 2013. Permission-based android malware detection. International Journal of Scientific & Technology Research, 2, 3 (2013), 228\u2013234.","journal-title":"International Journal of Scientific & Technology Research"}],"event":{"name":"FSE '24: 32nd ACM International Conference on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Porto de Galinhas Brazil","acronym":"FSE '24"},"container-title":["Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663529.3663863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:22Z","timestamp":1750290262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":79,"alternative-id":["10.1145\/3663529.3663863","10.1145\/3663529"],"URL":"https:\/\/doi.org\/10.1145\/3663529.3663863","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}