{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:01:51Z","timestamp":1754161311746,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3696630.3728571","type":"proceedings-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:09:27Z","timestamp":1753729767000},"page":"491-502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Are iOS Apps Immune to Abusive Advertising Practices?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5216-933X","authenticated-orcid":false,"given":"Tianming","family":"Liu","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1876-9285","authenticated-orcid":false,"given":"Jiapeng","family":"Deng","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8793-5367","authenticated-orcid":false,"given":"Yanjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4224-6450","authenticated-orcid":false,"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Newcastle, Newcastle, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3728-9541","authenticated-orcid":false,"given":"Xiaoning","family":"Du","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Developer Policy Center: Monetization and Ads. https:\/\/play.google.com\/about\/monetization-ads\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. CPM and CPC: Understanding Mobile Advertising Rates - Moloco. https:\/\/www.moloco.com\/blog\/cpm-and-cpc."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Inappropriate Ads | Apple Community. https:\/\/discussions.apple.com\/thread\/253220407."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Disturbing Adult Content Ads | Apple Community. https:\/\/discussions.apple.com\/thread\/253799147."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. How do i block sexually explicit ads from playing in games that are rated safe for children? | Apple Community. https:\/\/discussions.apple.com\/thread\/254383270."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Inappropriate ads in the kids apps | Apple Community. https:\/\/discussions.apple.com\/thread\/253534067."},{"key":"e_1_3_2_1_7_1","unstructured":"2022. PORNOGRAPHIC ADS FOR KIDS GAMES | Apple Community. https:\/\/discussions.apple.com\/thread\/253581261."},{"key":"e_1_3_2_1_8_1","unstructured":"2024. App market global revenues by segment | Statista. https:\/\/www.statista.com\/forecasts\/1324000\/global-app-market-revenue-monetization-segment."},{"key":"e_1_3_2_1_9_1","unstructured":"2024. App Privacy Details - App Store - Apple Developer. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2024. App Review Guidelines - Apple Developer. https:\/\/developer.apple.com\/app-store\/review\/guidelines\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2024. App-Store: Baby Car Games - A Complete Collection of Truck and Bus Games. https:\/\/apps.apple.com\/cn\/app\/id1197200768."},{"key":"e_1_3_2_1_12_1","unstructured":"2024. appium\/appium-ios-device: Tools for interacting with iOS devices. https:\/\/github.com\/appium\/appium-ios-device."},{"key":"e_1_3_2_1_13_1","unstructured":"2024. AppStore iPhone Free Apps Real-time Ranking - Qimai Data. https:\/\/www.qimai.cn\/rank\/index\/brand\/free\/device\/iphone\/country\/us\/genre\/6061."},{"key":"e_1_3_2_1_14_1","unstructured":"2024. BaiduMobAdSDK. https:\/\/union.baidu.com\/docs\/sdk\/iOSSDK.html."},{"key":"e_1_3_2_1_15_1","unstructured":"2024. CocoaPods.org. https:\/\/cocoapods.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2024. Detect explicit content (SafeSearch) - Cloud Vision API - Google Cloud. https:\/\/cloud.google.com\/vision\/docs\/detecting-safe-search."},{"key":"e_1_3_2_1_17_1","unstructured":"2024. Distribution of free and paid iOS apps in 2024 - Statista. https:\/\/www.statista.com\/statistics\/1020996\/distribution-of-free-and-paid-ios-apps\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2024. Financial Services - Play Console Help. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9876821?hl=en&ref_topic=9877466."},{"key":"e_1_3_2_1_19_1","unstructured":"2024. Frida: A world-class dynamic instrumentation for developers reverse-engineers and security researchers. https:\/\/frida.re\/."},{"key":"e_1_3_2_1_20_1","unstructured":"2024. Get Started | iOS | Goggle Admob. https:\/\/developers.google.com\/admob\/ios\/quick-start."},{"key":"e_1_3_2_1_21_1","unstructured":"2024. GitHub - AFNetworking\/AFNetworking: A delightful networking framework for iOS macOS watchOS and tvOS. https:\/\/github.com\/AFNetworking\/AFNetworking."},{"key":"e_1_3_2_1_22_1","unstructured":"2024. GitHub - Alamofire\/Alamofire: Elegant HTTP Networking in Swift. https:\/\/github.com\/Alamofire\/Alamofire."},{"key":"e_1_3_2_1_23_1","unstructured":"2024. GitHub - nygard\/class-dump: Generate Objective-C headers from Mach-O files. https:\/\/github.com\/nygard\/class-dump."},{"key":"e_1_3_2_1_24_1","unstructured":"2024. GitHub - theos\/theos: A cross-platform suite of tools for building and deploying software for iOS and other platforms. https:\/\/github.com\/theos\/theos."},{"key":"e_1_3_2_1_25_1","unstructured":"2024. Google AdMob - Earn More With Mobile App Monetization. https:\/\/admob.google.com\/."},{"key":"e_1_3_2_1_26_1","unstructured":"2024. GPT-4o | OpenAI. https:\/\/openai.com\/index\/hello-gpt-4o\/."},{"key":"e_1_3_2_1_27_1","unstructured":"2024. How can you monetize your app or game in China? | AppInChina. https:\/\/appinchina.co\/services\/monetization\/ad-monetization\/."},{"key":"e_1_3_2_1_28_1","unstructured":"2024. IADAUDITOR\/ViolatingVideoAdInKidsApp.mp4 at main \u00b7 IADAUDIT\/IADAUDITOR. https:\/\/github.com\/IADAUDIT\/IADAUDITOR\/blob\/main\/ViolatingVideoAdInKidsApp.mp4."},{"key":"e_1_3_2_1_29_1","unstructured":"2024. In-App Advertising - Worldwide - Statista. https:\/\/www.statista.com\/outlook\/amo\/advertising\/in-app-advertising\/worldwide."},{"key":"e_1_3_2_1_30_1","unstructured":"2024. Integration | Pangle SDK. https:\/\/www.pangleglobal.com\/integration\/integrate-pangle-sdk-for-android."},{"key":"e_1_3_2_1_31_1","unstructured":"2024. Introduction to real-time bidding (RTB) - Authorized Buyers Help - Google Ads. https:\/\/support.google.com\/authorizedbuyers\/answer\/6136272."},{"key":"e_1_3_2_1_32_1","unstructured":"2024. iOS jailbreaking - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/IOS_jailbreaking."},{"key":"e_1_3_2_1_33_1","unstructured":"2024. Market share of mobile operating systems worldwide from 2009 to 2024 - Statista. https:\/\/www.statista.com\/statistics\/272698\/global-market-share-held-by-mobile-operating-systems-since-2009\/."},{"key":"e_1_3_2_1_34_1","unstructured":"2024. mitmproxy - an interactive HTTPS proxy. https:\/\/mitmproxy.org\/."},{"key":"e_1_3_2_1_35_1","unstructured":"2024. Mobile and CTV App Intelligence | 42matters. https:\/\/42matters.com\/."},{"key":"e_1_3_2_1_36_1","unstructured":"2024. My City : Jail House on the App Store. https:\/\/apps.apple.com\/us\/app\/my-city-jail-house\/id1513523639."},{"key":"e_1_3_2_1_37_1","unstructured":"2024. nm (Unix) - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Nm_(Unix)."},{"key":"e_1_3_2_1_38_1","unstructured":"2024. NSURLSession | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/foundation\/nsurlsession."},{"key":"e_1_3_2_1_39_1","unstructured":"2024. Number of apps available in leading app stores in 2024 - Statista. https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/."},{"key":"e_1_3_2_1_40_1","unstructured":"2024. NyaMisty\/ipatool-py: IPATool-py: download ipa easily. https:\/\/github.com\/NyaMisty\/ipatool-py."},{"key":"e_1_3_2_1_41_1","unstructured":"2024. Overview of Dynamic Libraries - Apple Developer. https:\/\/developer.apple.com\/library\/archive\/documentation\/DeveloperTools\/Conceptual\/DynamicLibraries\/100-Articles\/OverviewOfDynamicLibraries.html."},{"key":"e_1_3_2_1_42_1","unstructured":"2024. Restricted Content - Play Console Help. https:\/\/support.google.com\/googleplay\/android-developer\/topic\/9877466?hl=en."},{"key":"e_1_3_2_1_43_1","unstructured":"2024. Security of runtime process in iOS iPadOS and visionOS - Assistance Apple (FR). https:\/\/support.apple.com\/fr-fr\/guide\/security\/sec15bfe098e\/web."},{"key":"e_1_3_2_1_44_1","unstructured":"2024. Set the maximum ad content rating for an app or account - Google AdMob Help. https:\/\/support.google.com\/admob\/answer\/7562142?hl=en."},{"key":"e_1_3_2_1_45_1","unstructured":"2024. Setting Ad Content Ratings for Underaged Users. https:\/\/www.csjplatform.com\/supportcenter\/28178."},{"key":"e_1_3_2_1_46_1","unstructured":"2024. Tencent GDTMobSDK. https:\/\/developers.adnet.qq.com\/doc\/ios\/guide."},{"key":"e_1_3_2_1_47_1","unstructured":"2024. Top 20 Ad Networks SDKs Used in iOS Apps on the Apple App Store - 42Matters. https:\/\/42matters.com\/sdk-analysis\/app-store\/top-ad-networks-sdks."},{"key":"e_1_3_2_1_48_1","unstructured":"2024. UIKit | Apple Developer Documentation. https:\/\/developer.apple.com\/documentation\/uikit\/."},{"key":"e_1_3_2_1_49_1","unstructured":"2024. VirusTotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207\u2013217","author":"Chen Gong","year":"2019","unstructured":"Gong Chen, Wei Meng, and John Copeland. 2019. Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207\u2013217."},{"key":"e_1_3_2_1_51_1","volume-title":"2013 International Conference on Social Computing. IEEE, 196\u2013203","author":"Chen Ying","year":"2013","unstructured":"Ying Chen, Sencun Zhu, Heng Xu, and Yilu Zhou. 2013. Children's exposure to mobile in-app advertising: an analysis of content appropriateness. In 2013 International Conference on Social Computing. IEEE, 196\u2013203."},{"key":"e_1_3_2_1_52_1","volume-title":"ReckDroid: Detecting red packet fraud in Android apps. Computers & Security","author":"Cheng Yu","year":"2024","unstructured":"Yu Cheng, Xiaofang Qi, Yanhui Li, and Yumeng Wang. 2024. ReckDroid: Detecting red packet fraud in Android apps. Computers & Security (2024), 104117."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/3673660.3655042","article-title":"A large scale study and classification of virustotal reports on phishing and malware urls","volume":"52","author":"Choo Euijin","year":"2024","unstructured":"Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, and Issa Khalil. 2024. A large scale study and classification of virustotal reports on phishing and malware urls. ACM SIGMETRICS Performance Evaluation Review 52, 1 (2024), 55\u201356.","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"e_1_3_2_1_54_1","unstructured":"Federal Trade Commission. 2020. Children's Privacy. https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security\/children's-privacy."},{"key":"e_1_3_2_1_55_1","volume-title":"FraudDroid: Automated Ad Fraud Detection for Android Apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Dong Feng","year":"2018","unstructured":"Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawend\u00e9 F Bissyand\u00e9, Tianming Liu, Guoai Xu, and Jacques Klein. 2018. FraudDroid: Automated Ad Fraud Detection for Android Apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2018)."},{"key":"e_1_3_2_1_56_1","unstructured":"General Data Protection Regulation (GDPR). 2022. General Data Protection Regulation (GDPR) Compliance Guidelines. https:\/\/gdpr.eu\/."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201313","author":"He Ziyao","year":"2024","unstructured":"Ziyao He, Syed Fatiul Huq, and Sam Malek. 2024. \" I tend to view ads almost like a pestilence\": On the Accessibility Implications of Mobile Ads for Blind Users. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201313."},{"key":"e_1_3_2_1_58_1","volume-title":"Large language models for software engineering: A systematic literature review. arXiv preprint arXiv:2308.10620","author":"Hou Xinyi","year":"2023","unstructured":"Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John Grundy, and Haoyu Wang. 2023. Large language models for software engineering: A systematic literature review. arXiv preprint arXiv:2308.10620 (2023)."},{"key":"e_1_3_2_1_59_1","volume-title":"2019 IEEE Conference on Communications and Network Security (CNS). IEEE, 223\u2013231","author":"Hu Boyang","year":"2019","unstructured":"Boyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, and Qingyang Wang. 2019. Characterizing location-based mobile tracking in mobile ad networks. In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE, 223\u2013231."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MS.2020.3014669","article-title":"What people focus on when reviewing your app-an analysis across app categories","volume":"38","author":"Huebner Johannes","year":"2020","unstructured":"Johannes Huebner, Andrea Girardello, Olivia Sliz, Elgar Fleisch, and Alexander Ilic. 2020. What people focus on when reviewing your app-an analysis across app categories. IEEE Software 38, 3 (2020), 96\u2013105.","journal-title":"IEEE Software"},{"key":"e_1_3_2_1_61_1","first-page":"1138","article-title":"Madlens: Investigating into android in-app ad practice at api granularity","volume":"20","author":"Jin Ling","year":"2019","unstructured":"Ling Jin, Boyuan He, Guangyao Weng, Haitao Xu, Yan Chen, and Guanyu Guo. 2019. Madlens: Investigating into android in-app ad practice at api granularity. IEEE Transactions on Mobile Computing 20, 3 (2019), 1138\u20131155.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_62_1","volume-title":"A Study of Using Multimodal LLMs for Non-Crash Functional Bug Detection in Android Apps. arXiv preprint arXiv:2407.19053","author":"Ju Bangyan","year":"2024","unstructured":"Bangyan Ju, Jin Yang, Tingting Yu, Tamerlan Abdullayev, Yuanyuan Wu, Dingbang Wang, and Yu Zhao. 2024. A Study of Using Multimodal LLMs for Non-Crash Functional Bug Detection in Android Apps. arXiv preprint arXiv:2407.19053 (2024)."},{"key":"e_1_3_2_1_63_1","volume-title":"DaPanda: Detecting Aggressive Push Notifications in Android Apps. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 66\u201378","author":"Liu Tianming","year":"2019","unstructured":"Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, and Guoai Xu. 2019. DaPanda: Detecting Aggressive Push Notifications in Android Apps. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 66\u201378."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of The Web Conference","author":"Liu Tianming","year":"2020","unstructured":"Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawend\u00e9 Bissyand\u00e9, and Jacques Klein. 2020. Maddroid: Characterizing and detecting devious ad contents for android apps. In Proceedings of The Web Conference 2020. 1715\u20131726."},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201313","author":"Liu Zhe","year":"2024","unstructured":"Zhe Liu, Chunyang Chen, Junjie Wang, Mengzhuo Chen, Boyu Wu, Xing Che, Dandan Wang, and Qing Wang. 2024. Make llm a testing expert: Bringing human-like interaction to mobile gui testing via functionality-aware decisions. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201313."},{"key":"e_1_3_2_1_66_1","volume-title":"Vision-driven Automated Mobile GUI Testing via Multimodal Large Language Model. arXiv preprint arXiv:2407.03037","author":"Liu Zhe","year":"2024","unstructured":"Zhe Liu, Cheng Li, Chunyang Chen, Junjie Wang, Boyu Wu, Yawen Wang, Jun Hu, and Qing Wang. 2024. Vision-driven Automated Mobile GUI Testing via Multimodal Large Language Model. arXiv preprint arXiv:2407.03037 (2024)."},{"key":"e_1_3_2_1_67_1","volume-title":"Xusheng Xiao, Tao Xie, and Yanfang Ye.","author":"Ma Shang","year":"2024","unstructured":"Shang Ma, Chaoran Chen, Shao Yang, Shifu Hou, Toby Jia-Jun Li, Xusheng Xiao, Tao Xie, and Yanfang Ye. 2024. Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph. arXiv preprint arXiv:2410.07588 (2024)."},{"key":"e_1_3_2_1_68_1","volume-title":"2019 IEEE\/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft). IEEE, 1\u201311","author":"Meftah Lakhdar","year":"2019","unstructured":"Lakhdar Meftah, Romain Rouvoy, and Isabelle Chrisment. 2019. Testing nearby peer-to-peer mobile apps at large. In 2019 IEEE\/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft). IEEE, 1\u201311."},{"key":"e_1_3_2_1_69_1","volume-title":"Valuable features in mobile health apps for patients and consumers: content analysis of apps and user ratings. JMIR mHealth and uHealth 3, 2","author":"Mendiola Martin F","year":"2015","unstructured":"Martin F Mendiola, Miriam Kalnicki, and Sarah Lindenauer. 2015. Valuable features in mobile health apps for patients and consumers: content analysis of apps and user ratings. JMIR mHealth and uHealth 3, 2 (2015), e4283."},{"key":"e_1_3_2_1_70_1","unstructured":"Brian Pia. 2017. Sexually suggestive ads appearing on children's apps. https:\/\/abc3340.com\/archive\/sexually-suggestive-ads-appearing-on-childrens-apps."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan D Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Abbas Razaghpanah Rishab Nithyanand Narseo Vallina-Rodriguez Srikanth Sundaresan Mark Allman Christian Kreibich Phillipa Gill et al. 2018. Apps trackers privacy and regulators: A global study of the mobile tracking ecosystem. In The 25th annual network and distributed system security symposium (NDSS 2018).","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_1_73_1","unstructured":"Elena Root and Bogdan Melnykov. 2018. Malware Displaying Porn Ads Discovered in Game Apps on Google Play. https:\/\/research.checkpoint.com\/malware-displaying-porn-ads-discovered-in-game-apps-on-google-play\/."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3465361","article-title":"Maat: Automatically analyzing virustotal for accurate labeling and effective malware detection","volume":"24","author":"Salem Aleieldin","year":"2021","unstructured":"Aleieldin Salem, Sebastian Banescu, and Alexander Pretschner. 2021. Maat: Automatically analyzing virustotal for accurate labeling and effective malware detection. ACM Transactions on Privacy and Security (TOPS) 24, 4 (2021), 1\u201335.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","first-page":"2675","DOI":"10.1109\/TMC.2018.2809727","article-title":"Understanding in-app ads and detecting hidden attacks through the mobile app-web interface","volume":"17","author":"Shao Rui","year":"2018","unstructured":"Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, and Ryan Riley. 2018. Understanding in-app ads and detecting hidden attacks through the mobile app-web interface. IEEE Transactions on Mobile Computing 17, 11 (2018), 2675\u20132688.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_76_1","unstructured":"Mikey Smith. 2015. Porn advert shown in children's smartphone game to kids as young as five. https:\/\/www.mirror.co.uk\/news\/uk-news\/porn-advert-shown-childrens-smartphone-5855008."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Sooel Son Daehyeok Kim and Vitaly Shmatikov. 2016. What Mobile Ads Know About Mobile Users.. In Ndss.","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_1_78_1","volume-title":"Faisal Aman Abbasi, and Lukas Wiewiorra","author":"Steffen Nico","year":"2023","unstructured":"Nico Steffen, Peter Kroon, Faisal Aman Abbasi, and Lukas Wiewiorra. 2023. Access charges in software-based termination monopolies. Technical Report. WIK Diskussionsbeitrag."},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the ACM Web Conference","author":"Sun Ruoxi","year":"2023","unstructured":"Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, and Surya Nepal. 2023. Not seen, not heard in the digital world! measuring privacy practices in children's apps. In Proceedings of the ACM Web Conference 2023. 2166\u20132177."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","first-page":"4135","DOI":"10.1109\/TSE.2023.3285743","article-title":"STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews","volume":"49","author":"Tan Youshuai","year":"2023","unstructured":"Youshuai Tan, Jinfu Chen, Weiyi Shang, Tao Zhang, Sen Fang, Xiapu Luo, Zijie Chen, and Shuhao Qi. 2023. STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. IEEE Transactions on Software Engineering 49, 8 (2023), 4135\u20134151.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_81_1","unstructured":"Ash Turner. 2024. How many smartphones are in the world? https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world."},{"key":"e_1_3_2_1_82_1","volume-title":"Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3","author":"Wang Yaqing","year":"2020","unstructured":"Yaqing Wang, Quanming Yao, James T Kwok, and Lionel M Ni. 2020. Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3 (2020), 1\u201334."},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the 30th Annual International Conference on Mobile Computing and Networking. 543\u2013557","author":"Wen Hao","year":"2024","unstructured":"Hao Wen, Yuanchun Li, Guohong Liu, Shanhui Zhao, Tao Yu, Toby Jia-Jun Li, Shiqi Jiang, Yunhao Liu, Yaqin Zhang, and Yunxin Liu. 2024. Autodroid: Llm-powered task automation in android. In Proceedings of the 30th Annual International Conference on Mobile Computing and Networking. 543\u2013557."},{"key":"e_1_3_2_1_84_1","volume-title":"HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19\u201324, 2020, Proceedings, Part III 22","author":"Wen Peihan","year":"2020","unstructured":"Peihan Wen and Mo Chen. 2020. A new analysis method for user reviews of mobile fitness apps. In Human-Computer Interaction. Human Values and Quality of Life: Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19\u201324, 2020, Proceedings, Part III 22. Springer, 188\u2013199."},{"key":"e_1_3_2_1_85_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, 922\u2013932","author":"Wu Huayao","year":"2021","unstructured":"Huayao Wu, Wenjun Deng, Xintao Niu, and Changhai Nie. 2021. Identifying key features from app user reviews. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). IEEE, 922\u2013932."},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. 1\u201313","author":"Wu Shuohan","year":"2023","unstructured":"Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, and Xiapu Luo. 2023. CydiOS: A Model-Based Testing Framework for iOS Apps. In Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. 1\u201313."},{"key":"e_1_3_2_1_87_1","volume-title":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 518\u2013526","author":"Xu Guosheng","year":"2020","unstructured":"Guosheng Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, and Haoyu Wang. 2020. Dissecting mobile offerwall advertisements: An explorative study. In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 518\u2013526."},{"key":"e_1_3_2_1_88_1","volume-title":"Large language models for cyber security: A systematic literature review. arXiv preprint arXiv:2405.04760","author":"Xu HanXiang","year":"2024","unstructured":"HanXiang Xu, ShenAo Wang, Ningke Li, Yanjie Zhao, Kai Chen, Kailong Wang, Yang Liu, Ting Yu, and HaoYu Wang. 2024. Large language models for cyber security: A systematic literature review. arXiv preprint arXiv:2405.04760 (2024)."},{"key":"e_1_3_2_1_89_1","unstructured":"An Yan Zhengyuan Yang Wanrong Zhu Kevin Lin Linjie Li Jianfeng Wang Jianwei Yang Yiwu Zhong Julian McAuley Jianfeng Gao et al. 2023. Gpt-4v in wonderland: Large multimodal models for zero-shot smartphone gui navigation. arXiv preprint arXiv:2311.07562 (2023)."},{"key":"e_1_3_2_1_90_1","volume-title":"Appagent: Multimodal agents as smartphone users. arXiv preprint arXiv:2312.13771","author":"Yang Zhao","year":"2023","unstructured":"Zhao Yang, Jiaxuan Liu, Yucheng Han, Xin Chen, Zebiao Huang, Bin Fu, and Gang Yu. 2023. Appagent: Multimodal agents as smartphone users. arXiv preprint arXiv:2312.13771 (2023)."},{"key":"e_1_3_2_1_91_1","volume-title":"Llm lies: Hallucinations are not bugs, but features as adversarial examples. arXiv preprint arXiv:2310.01469","author":"Yao Jia-Yu","year":"2023","unstructured":"Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, and Li Yuan. 2023. Llm lies: Hallucinations are not bugs, but features as adversarial examples. arXiv preprint arXiv:2310.01469 (2023)."},{"key":"e_1_3_2_1_92_1","unstructured":"Shuangmin Zhang Ruixuan Li Junwei Tang and Xiwu Gu. 2020. Automated Rogue Behavior Detection for Android Applications.. In SEKE. 550\u2013553."},{"key":"e_1_3_2_1_93_1","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 95\u2013106","author":"Zhang Zhen","year":"2021","unstructured":"Zhen Zhang, Yu Feng, Michael D Ernst, Sebastian Porst, and Isil Dillig. 2021. Checking conformance of applications against GUI policies. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 95\u2013106."},{"key":"e_1_3_2_1_94_1","volume-title":"Proceedings of the ACM Web Conference","author":"Zhao Yanjie","year":"2023","unstructured":"Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John Grundy, and Li Li. 2023. Are Mobile Advertisements in Compliance with App's Age Group?. In Proceedings of the ACM Web Conference 2023. 3132\u20133141."},{"key":"e_1_3_2_1_95_1","volume-title":"Proceedings of the 28th annual ACM symposium on applied computing. 499\u2013504","author":"Zhong Nan","year":"2013","unstructured":"Nan Zhong and Florian Michahelles. 2013. Google Play is not a long tail market: An empirical analysis of app adoption on the Google Play app market. In Proceedings of the 28th annual ACM symposium on applied computing. 499\u2013504."},{"key":"e_1_3_2_1_96_1","volume-title":"2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 534\u2013546","author":"Zhou Ziyi","year":"2022","unstructured":"Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, and Dawu Gu. 2022. Simulation: demystifying (insecure) cellular network based one-tap authentication services. In 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 534\u2013546."},{"key":"e_1_3_2_1_97_1","volume-title":"2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 318\u2013330","author":"Zungur Onur","year":"2020","unstructured":"Onur Zungur, Gianluca Stringhini, and Manuel Egele. 2020. Libspector: Context-aware large-scale network traffic analysis of android applications. In 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 318\u2013330."}],"event":{"name":"FSE Companion '25: 33rd ACM International Conference on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Clarion Hotel Trondheim Trondheim Norway","acronym":"FSE Companion '25"},"container-title":["Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696630.3728571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:16:10Z","timestamp":1753730170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696630.3728571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":97,"alternative-id":["10.1145\/3696630.3728571","10.1145\/3696630"],"URL":"https:\/\/doi.org\/10.1145\/3696630.3728571","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-07-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}