{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:40:07Z","timestamp":1750858807802,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,18]]},"DOI":"10.1145\/3703323.3703733","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T12:03:28Z","timestamp":1750853008000},"page":"261-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Application Security Assessment through Large Language Models (LLMs) based on User Reviews"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2558-229X","authenticated-orcid":false,"given":"Tejaswi","family":"S","sequence":"first","affiliation":[{"name":"SCIS, University of Hyderabad, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2105-0459","authenticated-orcid":false,"given":"Sastry","family":"VN","sequence":"additional","affiliation":[{"name":"Mobile and Social Media Banking Lab, Institute for Development and Research in Banking Technology, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4413-0328","authenticated-orcid":false,"given":"Durga Bhavani","family":"S","sequence":"additional","affiliation":[{"name":"SCIS, University of Hyderabad, Hyderabad, Telangana, India"}]}],"member":"320","published-online":{"date-parts":[[2025,6,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Moutaz Alazab Mamoun Alazab Andrii Shalaginov Abdelwadood Mesleh and Albara Awajan. 2020. Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems 107 (2020) 509\u2013521.","DOI":"10.1016\/j.future.2020.02.002"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3325917.3325941"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-2029"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICT60153.2023.10374057"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3559524"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Yung-Sung Chuang Rumen Dangovski Hongyin Luo Yang Zhang Shiyu Chang Marin Solja\u010di\u0107 Shang-Wen Li Wen-tau Yih Yoon Kim and James Glass. 2022. DiffCSE: Difference-based contrastive learning for sentence embeddings. arXiv preprint arXiv:2204.10298 (2022).","DOI":"10.18653\/v1\/2022.naacl-main.311"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Adjei\u00a0Peter Darko Decui Liang Zeshui Xu Kobina Agbodah and Sandra Obiora. 2023. A novel multi-attribute decision-making for ranking mobile payment services using online consumer reviews. Expert Systems with Applications 213 (2023) 119262.","DOI":"10.1016\/j.eswa.2022.119262"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3194968"},{"key":"e_1_3_3_3_11_2","unstructured":"Tianyu Gao Xingcheng Yao and Danqi Chen. 2021. Simcse: Simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821 (2021)."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Christopher\u00a0S Gates Ninghui Li Hao Peng Bhaskar Sarma Yuan Qi Rahul Potharaju Cristina Nita-Rotaru and Ian Molloy. 2014. Generating summary risk scores for mobile applications. IEEE Transactions on dependable and secure computing 11 3 (2014) 238\u2013251.","DOI":"10.1109\/TDSC.2014.2302293"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"crossref","unstructured":"Marcos\u00a0PS G\u00f4lo Adailton\u00a0F Ara\u00fajo Rafael\u00a0G Rossi and Ricardo\u00a0M Marcacini. 2022. Detecting relevant app reviews for software evolution and maintenance through multimodal one-class learning. Information and Software Technology 151 (2022) 106998.","DOI":"10.1016\/j.infsof.2022.106998"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.88"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210414"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563196"},{"key":"e_1_3_3_3_17_2","first-page":"1499","volume-title":"29th usenix security symposium (usenix security 20)","author":"Kumar Renuka","year":"2020","unstructured":"Renuka Kumar, Sreesh Kishore, Hao Lu, and Atul Prakash. 2020. Security analysis of unified payments interface and payment apps in India. In 29th usenix security symposium (usenix security 20). 1499\u20131516."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Mike Lewis Yinhan Liu Naman Goyal Marjan Ghazvininejad Abdelrahman Mohamed Omer Levy Ves Stoyanov and Luke Zettlemoyer. 2019. Bart: Denoising sequence-to-sequence pre-training for natural language generation translation and comprehension. arXiv preprint arXiv:1910.13461 (2019).","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"e_1_3_3_3_19_2","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_3_3_20_2","unstructured":"Sarvesh M. 2022. IT Ministry releases security guidelines for mobile devices and services for public consultation. Retrieved August 10 2023 from https:\/\/www.medianama.com\/wp-content\/uploads\/2022\/09\/MSG_Guidelines_Draft_V1.0_July_22-2.pdf"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDMA54072.2022.00017"},{"key":"e_1_3_3_3_22_2","first-page":"3659","volume-title":"Proceedings of the 29th international conference on computational linguistics","author":"Marchal Marian","year":"2022","unstructured":"Marian Marchal, Merel Scholman, Frances Yung, and Vera Demberg. 2022. Establishing annotation quality in multi-label annotations. In Proceedings of the 29th international conference on computational linguistics. 3659\u20133668."},{"key":"e_1_3_3_3_23_2","unstructured":"Noble\u00a0Saji Mathews Yelizaveta Brus Yousra Aafer Mei Nagappan and Shane McIntosh. 2024. Llbezpeky: Leveraging large language models for vulnerability detection. arXiv preprint arXiv:2401.01269 (2024)."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Akshay Mathur Laxmi\u00a0Mounika Podila Keyur Kulkarni Quamar Niyaz and Ahmad\u00a0Y Javaid. 2021. NATICUSdroid: A malware detection framework for Android using native and custom permissions. Journal of Information Security and Applications 58 (2021) 102696.","DOI":"10.1016\/j.jisa.2020.102696"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_36"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510079"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00012"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213873"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084 (2019).","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Thiago Rocha Eduardo Souto and Khalil El-Khatib. 2020. Functionality-based mobile application recommendation system with security and privacy awareness. Computers & Security 97 (2020) 101972.","DOI":"10.1016\/j.cose.2020.101972"},{"key":"e_1_3_3_3_31_2","unstructured":"V Sanh. 2019. DistilBERT A Distilled Version of BERT: Smaller Faster Cheaper and Lighter. arXiv preprint arXiv:1910.01108 (2019)."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Mohd Saqib Samaneh Mahdavifar Benjamin\u00a0CM Fung and Philippe Charland. 2024. A Comprehensive Analysis of Explainable AI for Malware Hunting. Comput. Surveys (2024).","DOI":"10.1145\/3677374"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524933"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33491-7_26"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC60265.2024.10433828"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Chuanqi Tao Hongjing Guo and Zhiqiu Huang. 2020. Identifying security issues for mobile applications based on user review summarization. Information and Software Technology 122 (2020) 106290.","DOI":"10.1016\/j.infsof.2020.106290"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24848-1_8"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Fei Wang Nan Yang P\u00a0Mohamed Shakeel and Vijayalakshmi Saravanan. 2024. Machine learning for mobile network payment security evaluation system. Transactions on Emerging Telecommunications Technologies 35 4 (2024) e4226.","DOI":"10.1002\/ett.4226"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Junjie Wang Yuchao Huang Chunyang Chen Zhe Liu Song Wang and Qing Wang. 2024. Software testing with large language models: Survey landscape and vision. IEEE Transactions on Software Engineering (2024).","DOI":"10.1109\/TSE.2024.3368208"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.61"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Yaru Wang Ning Zheng Ming Xu Tong Qiao Qiang Zhang Feipeng Yan and Jian Xu. 2019. Hierarchical identifier: application to user privacy eavesdropping on mobile payment app. Sensors 19 14 (2019) 3052.","DOI":"10.3390\/s19143052"},{"key":"e_1_3_3_3_42_2","unstructured":"Xing Wu Chaochen Gao Liangjun Zang Jizhong Han Zhongyuan Wang and Songlin Hu. 2021. Esimcse: Enhanced sample building method for contrastive learning of unsupervised sentence embedding. arXiv preprint arXiv:2109.04380 (2021)."},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Xiaoying Xu Kaushik Dutta Anindya Datta and Chunmian Ge. 2018. Identifying functional aspects from user reviews for functionality-based mobile app recommendation. Journal of the Association for Information Science and Technology 69 2 (2018) 242\u2013255.","DOI":"10.1002\/asi.23932"}],"event":{"name":"CODS-COMAD 2024: 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)","location":"Jodhpur India","acronym":"CODS-COMAD Dec '24"},"container-title":["Proceedings of the 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703323.3703733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:04:58Z","timestamp":1750856698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703323.3703733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":42,"alternative-id":["10.1145\/3703323.3703733","10.1145\/3703323"],"URL":"https:\/\/doi.org\/10.1145\/3703323.3703733","relation":{},"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"2025-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}