File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Demystifying hidden privacy settings in mobile apps

TitleDemystifying hidden privacy settings in mobile apps
Authors
KeywordsAndroid
Privacy
Privacy-setting
Usability
Issue Date2019
Citation
Proceedings - IEEE Symposium on Security and Privacy, 2019, v. 2019-May, p. 570-586 How to Cite?
AbstractMobile apps include privacy settings that allow their users to configure how their data should be shared. These settings, however, are often hard to locate and hard to understand by the users, even in popular apps, such as Facebook. More seriously, they are often set to share user data by default, exposing her privacy without proper consent. In this paper, we report the first systematic study on the problem, which is made possible through an in-depth analysis of user perception of the privacy settings. More specifically, we first conduct two user studies (involving nearly one thousand users) to understand privacy settings from the user's perspective, and identify these hard-to-find settings. Then we select 14 features that uniquely characterize such hidden privacy settings and utilize a novel technique called semantics- based UI tracing to extract them from a given app. On top of these features, a classifier is trained to automatically discover the hidden privacy settings, which together with other innovations, has been implemented into a tool called Hound. Over our labeled data set, the tool achieves an accuracy of 93.54%. Further running it on 100,000 latest apps from both Google Play and third-party markets, we find that over a third (36.29%) of the privacy settings identified from these apps are 'hidden'. Looking into these settings, we observe that they become hard to discover and hard to understand primarily due to the problematic categorization on the apps' user interfaces and/or confusing descriptions. Further importantly, though more privacy options have been offered to the user over time, also discovered is the persistence of their usability issue, which becomes even more serious, e.g., originally easy-to-find settings now harder to locate. And among all such hidden privacy settings, 82.16% are set to leak user privacy by default. We provide suggestions for improving the usability of these privacy settings at the end of our study.
Persistent Identifierhttp://hdl.handle.net/10722/350220
ISSN
2020 SCImago Journal Rankings: 2.407

 

DC FieldValueLanguage
dc.contributor.authorChen, Yi-
dc.contributor.authorZha, Mingming-
dc.contributor.authorZhang, Nan-
dc.contributor.authorXu, Dandan-
dc.contributor.authorZhao, Qianqian-
dc.contributor.authorFeng, Xuan-
dc.contributor.authorYuan, Kan-
dc.contributor.authorSuya, Fnu-
dc.contributor.authorTian, Yuan-
dc.contributor.authorChen, Kai-
dc.contributor.authorWang, Xiaofeng-
dc.contributor.authorZou, Wei-
dc.date.accessioned2024-10-21T04:35:09Z-
dc.date.available2024-10-21T04:35:09Z-
dc.date.issued2019-
dc.identifier.citationProceedings - IEEE Symposium on Security and Privacy, 2019, v. 2019-May, p. 570-586-
dc.identifier.issn1081-6011-
dc.identifier.urihttp://hdl.handle.net/10722/350220-
dc.description.abstractMobile apps include privacy settings that allow their users to configure how their data should be shared. These settings, however, are often hard to locate and hard to understand by the users, even in popular apps, such as Facebook. More seriously, they are often set to share user data by default, exposing her privacy without proper consent. In this paper, we report the first systematic study on the problem, which is made possible through an in-depth analysis of user perception of the privacy settings. More specifically, we first conduct two user studies (involving nearly one thousand users) to understand privacy settings from the user's perspective, and identify these hard-to-find settings. Then we select 14 features that uniquely characterize such hidden privacy settings and utilize a novel technique called semantics- based UI tracing to extract them from a given app. On top of these features, a classifier is trained to automatically discover the hidden privacy settings, which together with other innovations, has been implemented into a tool called Hound. Over our labeled data set, the tool achieves an accuracy of 93.54%. Further running it on 100,000 latest apps from both Google Play and third-party markets, we find that over a third (36.29%) of the privacy settings identified from these apps are 'hidden'. Looking into these settings, we observe that they become hard to discover and hard to understand primarily due to the problematic categorization on the apps' user interfaces and/or confusing descriptions. Further importantly, though more privacy options have been offered to the user over time, also discovered is the persistence of their usability issue, which becomes even more serious, e.g., originally easy-to-find settings now harder to locate. And among all such hidden privacy settings, 82.16% are set to leak user privacy by default. We provide suggestions for improving the usability of these privacy settings at the end of our study.-
dc.languageeng-
dc.relation.ispartofProceedings - IEEE Symposium on Security and Privacy-
dc.subjectAndroid-
dc.subjectPrivacy-
dc.subjectPrivacy-setting-
dc.subjectUsability-
dc.titleDemystifying hidden privacy settings in mobile apps-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/SP.2019.00054-
dc.identifier.scopuseid_2-s2.0-85072916140-
dc.identifier.volume2019-May-
dc.identifier.spage570-
dc.identifier.epage586-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats