50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System.
Joel ReardonÁlvaro FealPrimal WijesekeraAmit Elazari Bar OnNarseo Vallina-RodriguezSerge EgelmanPublished in: USENIX Security Symposium (2019)
Keyphrases
- database
- data collection
- data sets
- high quality
- experimental data
- data visualization
- raw data
- data distribution
- missing data
- data analysis
- small number
- statistical analysis
- synthetic data
- sensor data
- probability distribution
- original data
- complex data
- data processing
- knowledge discovery
- end users
- data quality
- training data