E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps
<p>Survey response on App evaluating factors.</p> "> Figure 2
<p>E-SERS Architecture.</p> "> Figure 3
<p>User−given rating score vs. review’s sentiment score.</p> "> Figure 4
<p>Review−based evidence analysis.</p> "> Figure 5
<p>E-SERS web prototype.</p> ">
Abstract
:1. Introduction
- (i)
- E-SERS formalizes SERS so that it can support any number of sources for generating the necessary evidence for a given App.
- (ii)
- This framework includes a reputation score for each of the sources used to generate internal and external evidence.
- (iii)
- The system features an enhanced risk assessment matrix associated with user permissions.
- (iv)
- The methodology quantifies and uses temporal and reputational aspects of user reviews.
- (v)
- The approach incorporates the feedback from surveys within the computing community, highlighting the preference for combined ranking schemes over simplistic rating-based approaches.
2. Related Literature
3. E-SERS Design
3.1. Architecture
3.2. Evidence-Based Trust Rating Algorithm
3.2.1. Evidence to Opinion Mapping
3.2.2. Algorithms for Computing the Trust Score for an App X
Algorithm 1. Computation of the Trust Score for an App |
procedure calculateTrustScore (DTAX, ITAX, SDT, SIT, α, β) #Generate internal opinion from DTA for an App X. ωX⊕SDT ← create_internal_opinion (DTAX, SDT). #Generate external opinion from ITA for an App X. ωX⊕SIT ← create_external_opinion (ITAX, SIT). #Apply weighted consensus operator ωX⊕ (SDT, SIT) ← weighted_fusion (ωX⊕SDT, ωX⊕SIT, α, β). #Apply Formula (5) to compute expected value and normalize EX ← E (ωX⊕ (SDT, SIT)). return normalized ||EX ||2 to scale 5. |
Algorithm 2. Computation of opinion from DTA |
procedure createInternalOpinion (DTAX, SDT) for Si ∈ SDT do positive_evidence ← null negative_evidence ← null Si: ev (X) ← generate_internal_evidence(X) for e ∈ Si: ev(X)! = null do if e is positive evidence positive_evidence++. else negative_evidence++. end for Apply Formulae (1) to (4) to determine (b, d, u, a), ωXSi. Evaluate reputation (ri) of Si based on F1-Score, ωSiri. Calculate weighted opinion of Si, ωXri: Si, using the discounting operator. end for Apply consensus operator to fuse opinions from different sources and compute ωX⊕SDT. |
Algorithm 3. Computation of opinion from ITA |
procedure createExternalOpinion (ITAX, SIT) for Si ∈ SIT do positive_evidence ← null. negative_evidence ← null. Si: ev (X) ← generate_external_evidence(X). for e ∈ Si: ev(X)! = null do review_reputation_weight ← apply Formula (6) # Normalized to scale 10 ||temporal weight||2 ← assign highest score to to recent reviews weight[e] ← review_reputation_weight temporal_weight. if (e is positive_evidence) positive_evidence += weight[e] else negative_evidence += weight[e] end for Apply formulae (1) to (4) to determine (b, d, u, a), ωXSi. Evaluate reputation (ri) of Si based on F1-Score, ωSiri. Calculate weighted opinion of Si, ωXri: Si, using the discounting operator. end for Apply consensus operator to fuse opinions from different sources and compute ωX⊕SIT. |
4. E-SERS Approach and Evaluation
4.1. Computation of Direct Trust
4.1.1. Evidence Mapping to Trust Tuple Creation
4.1.2. Computing Opinion of Direct Trust
4.2. Computation of Indirect Trust
4.2.1. Data Collection and Pre-Processing
4.2.2. Mapping Sentiment Value to Opinion Model
4.2.3. Sentiment Score to (b, d, u) Tuple Mapping
4.2.4. Review Reputation
4.2.5. Determination of Temporal Weight
4.2.6. Computing Opinion of Indirect Trust
4.3. Evidence Processor and Opinion Fusion
5. Experimental Results
- ▪
- If we consider only the traditional star ratings of all the Apps, as a typical App user would, we find that there is hardly any difference between Apps; however, the number of installs for each App varies a lot. This highlights the fact that traditional star rating does not accurately reflect the trust of an App.
- ▪
- In our experimental data set and based on the associated evidence that SERS generated, a less popular App (in terms of the number of downloads) is assessed as a more secure App than the other popular Apps. So, the SERS will provide users with a comprehensive view of an App and help them to select a more secure App instead of just following the traditional ratings and making a choice.
5.1. Findings from DTA Sources
5.2. Findings from ITA Sources
5.3. Comparison of Different Ranking Schemes
6. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- How Rating Affects Ranking in Search Results and Top Charts across Platforms. 2012. Available online: https://www.adweek.com/digital/how-rating-affects-ranking-in-search-results-and-top-charts-across-platforms/ (accessed on 4 March 2021).
- Harman, M.; Jia, Y.; Zhang, Y. App store mining and analysis: MSR for app stores. In Proceedings of the 9th IEEE Working Conference on Mining Software Repositories, Zurich, Switzerland, 2–3 June 2012. [Google Scholar]
- Pagano, D.; Maalej, W. User Feedback in the AppStore: An Empirical Study. In Proceedings of the 21st IEEE International Requirements Engineering Conference, Rio de Janeiro, Brazil, 15–19 July 2013. [Google Scholar]
- Svedic, Z. The Effect of Informational Signals on Mobile Apps Sales Ranks across the Globe. Ph.D. Thesis, Simon Fraser University, Burnaby, BC, Canada, 2015. [Google Scholar]
- Martin, W.; Sarro, F.; Jia, Y.; Zhang, Y.; Harman, M. A Survey of App Store Analysis for Software Engineering. IEEE Trans. Softw. Eng. 2016, 43, 817–847. [Google Scholar] [CrossRef]
- Finkelstein, A.; Harman, M.; Jia, Y.; Martin, W.; Sarro, F.; Zhang, Y. Investigating the relationship between price, rating, and popularity in the Blackberry World App Store. Inf. Softw. Technol. 2017, 87, 119–139. [Google Scholar] [CrossRef]
- Lim, S.L.; Bentley, P.J.; Kanakam, N.; Ishikawa, F.; Honiden, S. Investigating Country Differences in Mobile App User Behavior and Challenges for Software Engineering. IEEE Trans. Softw. Eng. 2014, 41, 40–64. [Google Scholar] [CrossRef]
- Martens, D.; Maalej, W. Towards understanding and detecting fake reviews in app stores. Empir. Softw. Eng. 2019, 24, 3316–3355. [Google Scholar] [CrossRef]
- Siegler, M. YouTube Comes To A 5-Star Realization: Its Ratings Are Useless. Techcrunch 2009. Available online: https://techcrunch.com/2009/09/22/youtube-comes-to-a-5-star-realization-its-ratings-are-useless/ (accessed on 4 March 2021).
- Chowdhury, N.S.; Raje, R.R. Disparity between the Programmatic Views and the User Perceptions of Mobile Apps. In Proceedings of the 20th International Conference of Computer and Information Technology, Dhaka, Bangladesh, 22–24 December 2017. [Google Scholar]
- Dellinger, A. Many Popular Android Apps Leak Sensitive Data, Leaving Millions of Consumers at Risk, Technical Report Forbes. 2019. Available online: https://www.forbes.com/sites/ajdellinger/2019/06/07/many-popular-android-apps-leak-sensitive-data-leaving-millions-of-consumers-at-risk/#7bc629d0521e (accessed on 4 March 2021).
- Doevan, Android Virus, The List of Infected Apps for 2019, 2-Spyware. Available online: https://www.2-spyware.com/remove-android-virus.html (accessed on 4 March 2021).
- Venkat, A. Kaspersky: Malware Found Hiding in Popular Android App, Bankinfosecurity. Available online: https://www.bankinfosecurity.com/kaspersky-malware-found-hiding-in-popular-android-app-a-13008 (accessed on 4 March 2021).
- Kan, M. Malware Discovered in Popular Android App Cam-Scanner, PCMag. Available online: https://www.pcmag.com/news/malware-discovered-in-popular-android-app-camscanner (accessed on 4 March 2021).
- Liam, T. Android Google Play App with 100 Million Downloads Starts to Deliver Malware, ZDNet. Available online: https://www.zdnet.com/article/android-google-play-app-with-100-million-downloads-starts-to-deliver-malware/ (accessed on 4 March 2021).
- Doffman, Z. Android Warning: Devious Malware Found Inside 34 Apps Already Installed by 100M+ Users, Forbes. Available online: https://www.forbes.com/sites/zakdoffman/2019/08/13/android-users-have-installed-dangerous-new-malware-from-google-play/5c7ed4cd22a9 (accessed on 4 March 2021).
- Chowdhury, N.; Raje, R. A Holistic Ranking Scheme for Apps. In Proceedings of the 21st International Conference of Computer and Information Technology, Dhaka, Bangladesh, 21–23 December 2018. [Google Scholar]
- Chowdhury, N.; Raje, R. SERS: A Security-related and Evidence-based Ranking Scheme for Mobile Apps. In Proceedings of the the First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, Los Angeles, CA, USA, 12–14 December 2019. [Google Scholar]
- Shafer, G. A Mathematical Theory of Evidence, White-Paper; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
- Jøsang, A.; Hayward, R.; Pope, S. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference, Hobart, TAS, Australia, 16–19 January 2006. [Google Scholar]
- Jøsang, A.; Hayward, R.; Pope, S. A Logic for Uncertain Probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 2001, 9, 279–311. [Google Scholar] [CrossRef]
- Zhuang, L.; Jing, F.; Zhu, X. Movie review mining and summarization. In Proceedings of the 15th ACM International Conference on Information and Knowledge Management, Arlington, VA, USA, 6–11 November 2006. [Google Scholar]
- Tang, H.; Tan, S.; Cheng, X. A survey on sentiment detection of reviews. Expert Syst. Appl. 2009, 36, 10760–10773. [Google Scholar] [CrossRef]
- Pang, B.; Lee, L. Opinion Mining and Sentiment Analysis. Found. Trends Inf. Retr. 2008, 2, 1–135. [Google Scholar] [CrossRef]
- Panichella, S.; Sorboy, A.; Guzmanz, E.; Visaggioy, C.; Canforay, G.; Gall, H. How Can I Improve My App? Classifying User Reviews for Software Maintenance and Evolution. In Proceedings of the International Conference on Software Maintenance and Evolution, Bremen, Germany, 29 September–1 October 2015. [Google Scholar]
- Pang, B.; Lee, L.; Vaithyanathan, S. ThumbsUp? Sentiment Classification using Machine Learning Techniques. In Proceedings of the Empirical Methods in Natural Language Processing, 6 July 2002. [Google Scholar]
- Sangani, C.; Ananthanarayanan, S. Sentiment Analysis of App Store Reviews. Methodology 2013, 4, 153–162. [Google Scholar]
- Palomba, F.; Linares-Vásquez, M.; Bavota, G.; Oliveto, R.; Di Penta, M.; Poshyvanyk, D.; De Lucia, A. User Reviews Matter! Tracking Crowdscourced Reviews to Support Evolution of Successful Apps. In Proceedings of the International Conference on Software Maintenance and Evolution, Bremen, Germany, 29 September–1 October 2015. [Google Scholar]
- Gallege, L. Trust-Based Service Selection and Recommendation for Online Software Marketplaces (TruSStReMark). Ph.D. Thesis, Purdue University, West Lafayette, IN, USA, 2016. [Google Scholar]
- Gallege, L.; Raje, R. Parallel Methods for Evidence and Trust-Based Selection and Recommendation of Software Apps from Online Marketplaces. In Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, 4–6 April 2017. [Google Scholar]
- Sarma, B.P.; Li, N.; Gates, C.; Potharaju, R.; Nita-Rotaru, C.; Molloy, I. Android permissions: A perspective combining risks and benefits. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, Newark, NJ, USA, 20–22 June 2012. [Google Scholar]
- Zhou, Y.; Wang, Z.; Zhou, W.; Jiang, X. Hey, you, get off of my market: Detecting malicious Apps in official and alternative android markets. NDSS 2012, 25, 50–52. [Google Scholar]
- Wang, Y.; Zheng, J.; Sun, C.; Mukkamala, S. Quantitative Security Risk Assessment of Android Permissions and Applications. In Proceedings of the 27th Data and Applications Security and Privacy, Newark, NJ, USA, 15–17 July 2013. [Google Scholar]
- Gates, C.; Li, N.; Peng, H.; Sarma, B.; Qi, Y.; Potharaju, R.; Rotaru, C.N.; Molloy, I. Generating summary risk scores for mobile applications. IEEE Trans. Dependable Secur. Comput. 2014, 11, 238–251. [Google Scholar] [CrossRef]
- Acar, Y.; Backes, M.; Bugiel, S.; Fahl, S.; McDaniel, P.; Smith, M. SoK: Lessons Learned from Android Security Research for Applied Software Platforms. In Proceedings of the 2016 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–26 May 2016. [Google Scholar]
- Mirzaei, O.; Suarez-Tangil, G.; Fuentes, J. TriFlow: Triaging Android Applications Using Speculative Information Flows. In Proceedings of the ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 2–6 April 2017. [Google Scholar]
- Arzt, S.; Rasthofer, S.; Bodden, C.F.E.; Bartel, A.; Klein, J.; Traon, Y.; Octeau, D.; McDaniel, P. FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK, 9–11 June 2014. [Google Scholar]
- Enck, W.; Gilbert, P.; Han, S.; Tendulkar, V.; Chun, B.; Cox, L.; Jung, J.; McDaniel, P.; Sheth, A. Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones. ACM Trans. Comput. Syst. 2014, 32, 1–29. [Google Scholar] [CrossRef]
- Gibler, C.; Crussell, J.; Erickson, J.; Chen, H. AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale. In Proceedings of the International Conference on Trust and Trustworthy Computing, Vienna, Austria, 13–15 June 2012. [Google Scholar]
- Gordon, M.; Kim, D.; Perkins, J.; Gilham, L.; Nguyen, N.; Rinard, M. Information flow analysis of android applications in DroidSafe. NDSS 2015, 15, 110. [Google Scholar]
- Cheng, X.; Luo, Y.; Gui, Q. Research on Trust Management Model of Wireless Sensor Networks. In Proceedings of the IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, China, 12–14 October 2018. [Google Scholar]
- Awan, K.; Din, I.U.; Almogren, A.; Guizani, M.; Altameem, A.; Jadoon, S. Robust Trust—APro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things. IEEE Access 2019, 7, 62095–62106. [Google Scholar] [CrossRef]
- Ruan, Y.; Zhang, P.; Alfantoukh, L.; Durresi, A. Measurement Theory-Based Trust Management Framework for Online Social Communities. ACM Trans. Internet Technol. 2017, 17, 1–24. [Google Scholar] [CrossRef]
- Tang, T.; Winoto, P.; Niu, X. I-TRUST: Investigating trust between users and agents in a multi-agent portfolio management system, Electronic Commerce Research and Applications. Electron. Commer. Res. Appl. 2003, 2, 302–314. [Google Scholar]
- Tang, J.; Hu, X.; Chang, Y.; Liu, H. Predictability of Distrust with Interaction Data. In Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, Shanghai, China, 3–7 November 2014. [Google Scholar]
- Gallege, L.S.; Gamage, D.U.; Hill, J.H.; Raje, R.R. Understanding the trust of software-intensive distributed systems. Concurr. Comput. Pr. Exp. 2015, 28, 114–143. [Google Scholar] [CrossRef]
- Jøsang, A. Artificial Reasoning with Subjective Logic. In Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth, Australia, December 1997; Australian Computer Society: Sydney, NSW, Australia. Available online: https://folk.universitetetioslo.no/josang/papers/Jos1997-AWCR.pdf (accessed on 1 July 2024).
- Hernandez, N.; Recabarren, R.; Carbunar, B.; Ahmed, S.I. RacketStore: Measurements of ASO deception in Google play via mobile and app usage. In Proceedings of the 21st ACM Internet Measurement Conference, Virtual Event, 2–4 November 2021. [Google Scholar]
- Farooqi, S.; Feal, Á.; Lauinger, T.; McCoy, D.; Shafiq, Z.; Vallina-Rodriguez, N. Understanding Incentivized Mobile App Installs on Google Play Store. In Proceedings of the ACM Internet Measurement Conference, Virtual Event, 27–29 October 2020. [Google Scholar]
- Zhu, H.; Xiong, H.; Ge, Y.; Chen, E. Mobile App Recommendations with Security and Privacy Awareness. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 24–27 August 2014. [Google Scholar]
- Cen, L.; Kong, D.; Jin, H.; Si, L. Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach. In Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, 30 April–2 May 2015. [Google Scholar]
- Jøsang, A.; McAnally, D. Multiplication and co-multiplication of beliefs. Int. J. Approx. Reason. 2005, 38, 19–51. [Google Scholar] [CrossRef]
- Zhou, H.; Shi, W.; Liang, Z.; Liang, B. Using new fusion operations to improve trust expressiveness of subjective logic. Wuhan Univ. J. Nat. Sci. 2011, 16, 376–382. [Google Scholar] [CrossRef]
- Skoric, B.; Zannone, N. Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. Int. J. Inf. Secur. 2016, 15, 381–402. [Google Scholar] [CrossRef]
- Avdiienko, V.; Kuznetsov, K.; Gorla, A.; Zeller, A.; Arzt, S.; Rasthofer, S.; Bodden, E. Mining Apps for Abnormal Usage of Sensitive Data. In Proceedings of the IEEE/ACM 37th IEEE International Conference on Software Engineering, Florence, Italy, 16–24 May 2015. [Google Scholar]
- Arzt, S.; Rasthofer, S.; Bodden, E. SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks; Technical Report; Technische Universität Darmstadt & Fraunhofer SIT: Darmstadt, Germany, 2013. [Google Scholar]
- Stoneburner, G.; Goguen, A.; Feringa, A. Risk management guide for information technology systems. Natl. Inst. Stand. Technol. (NIST) 2002, 800, 800–830. [Google Scholar]
- Joh, H.; Malaiya, Y. Defining and assessing quantitative security risk measures using vulnerability lifecycle and cvss metrics. In Proceedings of the 2011 International Conference on Security and Management, Las Vegas, NV, USA, 18–21 July 2011. [Google Scholar]
- Android, Android Permissions Overview. Available online: https://developer.android.com/guide/topics/permissions/overview (accessed on 6 March 2021).
- Au, K.; Zhou, Y.; Huang, Z.; Lie, D. PScout: Analyzing the Android Permission Specification. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012. [Google Scholar]
- DroidBench—Benchmarks. Available online: https://blogs.unipaderborn.de/sse/tools/droidbench/ (accessed on 6 March 2021).
- Shung, K. Accuracy, Precision, Recall or F1? Towards Data Science. Available online: https://towardsdatascience.com/accuracy-precision-recall-or-f1331fb37c5cb9 (accessed on 6 March 2021).
- Brian, R. Test of 250 Popular Android Mobile Apps Reveals That 70% Leak Sensitive Personal Data; Technical Report; NowSecure: 2019. Available online: https://www.nowsecure.com/blog/2019/06/06/test-of-250-popular-android-mobile-apps-reveal-that-70-leak-sensitive-personal-data/ (accessed on 7 March 2021).
- Unicodedata. Available online: https://docs.python.org/2/library/unicodedata.html (accessed on 6 March 2021).
- The IBM Watson Natural Language Understanding. Available online: https://cloud.ibm.com/docs/services/natural-languageunderstanding?topic=natural-language-understanding-getting-started (accessed on 6 March 2021).
- Krishni, A Beginners Guide to Random Forest Regression, Medium. Available online: https://medium.com/datadriveninvestor/random-forest-regression-871bc9a25eb (accessed on 6 March 2021).
- Jindal, N.; Liu, B. Analyzing and Detecting Review Spam. In Proceedings of the Seventh IEEE International Conference on Data Mining, Omaha, NE, USA, 28–31 October 2007. [Google Scholar]
- Song, Y.; Wu, C.; Zhu, S.; Wang, H. A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. ICST Trans. Secur. Saf. 2019, 5, e3. [Google Scholar] [CrossRef]
- MacKay, D. Information Theory, Inference and Learning Algorithms; Cambridge University Press: Cambridge, UK, 2003. [Google Scholar]
- Hawkes, A. Spectra of some self-exciting and mutually exciting point processes. Biometrika 1971, 58, 83–90. [Google Scholar] [CrossRef]
- Johnson, D. Using Weights in the Analysis of Survey Data; Population Research Institute, The Pennsylvania State University: University Park, PA, USA, 2008. [Google Scholar]
- Kendall, M. A New Measure of Rank Correlation. Biometrika 1938, 30, 81–93. [Google Scholar] [CrossRef]
- Maalej, W.; Nabil, H. Bug report, feature request, or simply praise? On automatically classifying app reviews. In Proceedings of the 2015 IEEE 23rd International Requirements Engineering Conference (RE), Ottawa, ON, Canada, 24–28 August 2015. [Google Scholar]
- App Radar, App Ranking Factors How to Improve App Store Search Rankings. Available online: https://appradar.com/academy/bonus-chapters/appstore-ranking-factors/ (accessed on 7 March 2021).
Likelihood (Source/Sink) | Catastrophic Impact (100) | Critical Impact (50) | Marginal Impact (20) | Negligible Impact (10) |
---|---|---|---|---|
Frequent (1.0) | High (100) | Moderate (50) | Moderate (20) | Low (10) |
Probable (0.5) | Moderate (50) | Moderate (50) | Low (10) | Low (5) |
Remote (0.2) | Moderate (20) | Low (10) | Low (4) | Low (2) |
Improbable (0.1) | Low (10) | Low (5) | Low (2) | Low (1) |
Likelihood | Source Category | Sink Category |
---|---|---|
Frequent (1.0) | ACCOUNT_INFORMATION LOCATION_INFORMATION NETWORK_INFORMATION NO_CATEGORIES UNIQUE_INFORMATION | LOG NETWORK NO_CATEGORIES SMS_MMS |
Probable (0.5) | DATABASE_INFORMATION FILE_INFORMATION | ACCOUNT_SETTINGS FILE CONTACT_INFORMATION |
Remote (0.2) | CONTACT_INFORMATION NFC UNIQUE_INFORMATION | CALENDAR_INFORMATION SYSTEM_SETTINGS |
Improbable (0.1) | Rest of the Source categories | Rest of the Sink categories |
Source (SDT ⊂ S) | Precision (p) | Recall (r) | F1-Score (2pr/(p + r)) | Reputation (b, d, u, a) |
---|---|---|---|---|
FlowDroid (S1) | 0.86 | 0.93 | 0.89 | (0.89, 0.11, 0, 0.5) |
Sentiment Score | (b, d, u) | Sentiment Score | (b, d, u) |
---|---|---|---|
−1 | (0, 1, 0) | +1 | (1, 0, 0) |
−0.75 | (0, 0.75, 0.25) | +0.75 | (0.75, 0, 0.25) |
−0.5 | (0, 0.5, 0.5) | +0.5 | (0.5, 0, 0.5) |
−0.25 | (0, 0.25, 0.75) | +0.25 | (0.25, 0, 0.75) |
Positive (Actual) | Negative (Actual) | |
---|---|---|
Positive (Predicted) | 853 (TP) | 99 (FP) |
Negative (Predicted) | 147 (FN) | 901 (TN) |
App Category | # of Data Leaks | Source Categories | Sink Categories |
---|---|---|---|
Shopping | 664 | LOG (239) SMS_MMS (186) NETWORK_INFORMATION (17) FILE (6) LOCATION_INFORMATION (2) | SMS_MMS (93) NETWORK (24) FILE (5) CALENDAR_INFORMATION (4) CONTACT_INFORMATION (3) |
Travel | 881 | SMS_MMS (68) LOG (63) FILE (8) NETWORK_INFORMATION (3) CALENDAR_INFORMATION (2) ACCOUNT_SETTINGS (1) | SMS_MMS (46) FILE (10) CALENDAR_INFORMATION (2) ACCOUNT_SETTINGS (1) NETWORK (1) |
Insurance | 635 | SMS_MMS (186) LOG (155) FILE (9) ACCOUNT_SETTINGS (5) NETWORK_INFORMATION (4) CALENDAR_INFORMATION (2) | SMS_MMS (73) NETWORK (16) ACCOUNT_SETTINGS (3) CALENDAR_INFORMATION (3) FILE (2) |
Finance | 1237 | LOG(l61) SMS_MMS (63) NETWORK_INFORMATION (13) FILE (2) | SMS_MMS (86) NETWORK (9) CALENDAR_INFORMATION (5) LOG (2) |
News | 1399 | LOG (114) SMS_MMS (80) UNIQUE_IDENTIFIER (14) FILE (9) NETWORK_INFORMATION (8) ACCOUNT_SETTINGS (3) | SMS_MMS (157) NETWORK (18) LOG (13) FILE (6) ACCOUNT_SETTINGS (4) CALENDAR_lNFORMATION (3) CONTACT_lNFORMATION (1) |
Newest Review Data Set | Most Helpful Review Data Set | ||
---|---|---|---|
Total number of crawled reviews | 52,519 | Total number of crawled reviews | 24,299 |
Average number of reviews per App | 2100 | Average number of reviews per App | 970 |
Average words per review | 14.8 | Average words per review | 22.3 |
Newest Reviews | |||||
---|---|---|---|---|---|
Shopping | Travel | Insurance | Finance | News | |
Bug (%) | 9.7 | 11.2 | 9.6 | 7.3 | 8.4 |
Fix (%) | 33 | 24.7 | 33.9 | 34 | 43.2 |
Problem (%) | 23.1 | 27.9 | 19.8 | 27.7 | 24.6 |
Issue (%) | 20.7 | 28.6 | 19.6 | 27.7 | 24.6 |
Defect (%) | 0.1 | 0.2 | 0 | 0 | 0.2 |
Crash (%) | 26 | 14.2 | 27.9 | 9.8 | 19.1 |
Privacy (%) | 0.3 | 1.6 | 0.2 | 0.4 | 1.9 |
Security (%) | 2.7 | 0.2 | 4.2 | 5.7 | 0.6 |
Spy (%) | 0 | 1.6 | 0.6 | 0 | 7.2 |
Spam (%) | 0.6 | 1.6 | 0.2 | 1.0 | 1.4 |
Malicious (%) | 0 | 0.2 | 0 | 0.2 | 0.6 |
Leaks (%) | 0 | 0 | 0 | 0 | 0 |
Most Helpful Reviews | |||||
Shopping | Travel | Insurance | Finance | News | |
Bug (%) | 9.5 | 8.5 | 13.5 | 10.3 | 7.6 |
Fix (%) | 34.2 | 20.2 | 26.5 | 33.2 | 45.7 |
Problem (%) | 23.6 | 33.2 | 20.6 | 30.6 | 21.4 |
Issue (%) | 23.0 | 32.7 | 27.1 | 34.7 | 22.8 |
Defect (%) | 0.1 | 0.2 | 0 | 0 | 0.3 |
Crash (%) | 26.7 | 11.3 | 25.8 | 7.9 | 23.2 |
Privacy (%) | 0.4 | 2.6 | 0 | 0 | 1.9 |
Security (%) | 2.7 | 0.7 | 3.9 | 4.9 | 0.4 |
Spy (%) | 0 | 0.7 | 0 | 0 | 0.3 |
Spam (%) | 0.6 | 0.5 | 0 | 0.5 | 1.2 |
Malicious (%) | 0 | 0 | 0 | 0 | 0.3 |
Leaks (%) | 0 | 0 | 0 | 0 | 0 |
App Category | Average Ratings and Indirect Trust | Average Ratings and Direct Trust | Average Rating and Google Play Store Rank | E-SERS Rating and Google Play Store Rank |
---|---|---|---|---|
Shopping | 10% | 50% | 40% | 30–50% |
Travel | 0% | 50% | 30% | 30–50% |
Insurance | 40% | 60% | 30% | 40–50% |
Finance | 30% | 50% | 40% | 40–60% |
News | 20% | 30% | 40% | 30–40% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chowdhury, N.; Maharjan, A.; Raje, R.R. E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps. Software 2024, 3, 250-270. https://doi.org/10.3390/software3030013
Chowdhury N, Maharjan A, Raje RR. E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps. Software. 2024; 3(3):250-270. https://doi.org/10.3390/software3030013
Chicago/Turabian StyleChowdhury, Nahida, Ayush Maharjan, and Rajeev R. Raje. 2024. "E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps" Software 3, no. 3: 250-270. https://doi.org/10.3390/software3030013
APA StyleChowdhury, N., Maharjan, A., & Raje, R. R. (2024). E-SERS: An Enhanced Approach to Trust-Based Ranking of Apps. Software, 3(3), 250-270. https://doi.org/10.3390/software3030013