Survey on Fraud Malware Detection in Google Play Store

Total Page:16

File Type:pdf, Size:1020Kb

Survey on Fraud Malware Detection in Google Play Store International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 Survey on Fraud Malware Detection in Google Play Store Yuvaraj S1, Dhinakaran P2, DineshKumar S3, JayaKumar K4 1 Assistant Professor, Department of Computer Science Engineering, Bannari Amman Institute of Technology, Sathyamagalam, India. 2, 3, 4 UG Student, Department of Computer Science Engineering, Bannari Amman Institute of Technology, Sathyamangalam, India ----------------------------------------------------------------------***---------------------------------------------------------------------- ABSTRACT - The use of mobile devices including Tablets, developers use search ranking algorithm to promote their Smart watch, and note books are increasing day by day. apps to the top while searching. After downloading mobile Android has the major share in the mobile application applications from Google play users are asked to give the market. Android mobile applications become an easy target ratings and reviews about that particular downloaded for the attackers because of its open source environment. applications. However fraudulent developers give fake Also user’s ignorance the process of installing and usage of ratings and reviews about their application promote their the apps. To identify fake and malware applications, all the application to the top. There are two typical approaches previous methods focused on getting permission from the used for detecting malware in Google Play. Thus are Static user and executing that particular mobile application. A and Dynamic. The dynamic approach needs apps to be run malware detection framework that discovers and break in a secure environment to detect its benign. The static traces left behind by fraudulent developers, to detect search approach is not used as the need to give all types of attack rank fraud as well as malware in Google Play. The fraud app in early stage itself but that is impossible as everyday is detected by aggregating the three pieces of evidence such attackers find the new way to inject malware on as ranking based, co-review based and rating based applications. evidence. Finally aggregating all the activities of front running apps, it can be achieve certain accuracy in 2. LITERATURE REVIEW classifying benign standard datasets of malware, fraudulent and legitimate apps. Additionally, we apply incremental In paper [3] the author proposes the static method learning approach to characterize a large number of data to detect the malware in mobile applications. In this sets. It combined effectively for all the evidences for fraud system using reverse engineering concept the source code detection. To accurately locate the ranking fraud, there is a for the suspicious APK files. After that using structured need to mining the active period’s namely leading sessions, mapping author builds the structure for the classes. Finally of mobile Apps. using data flow concept several patterns for the different type of threats has been created and use them to detect the KEYWORDS - Mobile applications, Malware, Ranking, malware in applications. Depending upon the number of Rating, Google Play. threading pattern the effectiveness of this method is calculated. 1. INTRODUCTION In paper [1] the author proposed a new method to Google play first releases its app in 2008.Since detect malware in mobile applications by examining the that it distributes applications to all the Android users. In runtime behavior of that particular application in the Google Play Store, it provides services that user can mobile environment. The author proposes that unexpected discover the particular application, purchase those behavior mobile app can vary from one application to applications and install it on their mobile devices. Since other applications. Also, it varies from the environment of Android is open source environment all the detail about that particular application running on different devices. the application users can be easily accessed by the Using Xposed framework user can change the user and application developers through Google play. In Google play system application without modifying the application 1.8 Million mobile applications are available and that is package(APK).Depend upon that user can set particular downloaded by over 25 billion users across the world. This conditions to identify the malware in the mobile leads to greater chance of installing malware to the applications. applications that could affect users mobile devices. Google play store uses its own security system known as Bouncer In paper [2] the author proposes some of modern system [6] to remove the malicious apps from its store. machine learning algorithms to detect malware. For that However, this method is not effective as testing some apps these algorithms are applied to the metadata collected using virus tools many apps are found as malicious which from the Google Play. While all of the existing methods for are not detected by Bouncer system [6]. Fraudulent detecting algorithm focused on inherent characteristics of © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1225 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 the particular mobile app this gives a direct method to as Page Rank and query term frequency. This is different detect the applications. For the setup of the experiments from ranking fraud detection for mobile Apps. They the collected 25k data from Google Play. Developers categorize all existing algorithms into three categories update their applications in particular interval of days based on the type of information they use: content-based whereas fake applications could not be updated since its methods, link-based methods, and methods based on non- upload of the Google Play. All of these works focused on traditional data such as user behavior, clicks, HTTP only linear models Future work may focus on non-liners sessions. In turn, there is a sub categorization of link-based models. category into five groups based on ideas and principles used: labels propagation, link pruning and reweighting, In paper [5] the author aims to protect the review labels refinement, graph regularization, and feature based. spanners or spam reviews. The spammer may target only on the specific protect. After that, they gave fake reviews to S. Paper Title Techniques Advantages Drawbacks that particular mobile app by creating the different no account to review that account. The author proposes a Detecting Static novel based scoring method to detect every single review Mobile approaches of the particular product. The author creates highly Application User can Manually to malware suspicious as a subset. By using web-based spammer Malicious define their should detection evaluation software the fakeness of the review is 1 Behaviors own threat define all based on calculated. After the completion of the evaluation, the Based on Data to identify threat reverse result shows the effective to predict the fake reviews. Flow of malware. patterns. code of the Source application. In paper [8] the authors have studied the problem Code.[3] of detecting hybrid shilling attacks on rating data. The Not Detect any proposed approach is based on the semi-supervised Mobile Working XPosed type of learning and can be used for trustworthy product 2 Malware for all type Framework Unexpected recommendation. This paper presents a Hybrid Shilling Exposed[1] of behavior. Attack Detector, or HySAD for short, to tackle these malicious. problems. In particular, HySAD introduces MCRelief to Android select effective detection metrics, and Semi supervised malware Naive Bayes (SNBλ) to precisely separate Random-Filler detection Detect all model attackers and Average-Filler model attackers from from Google Machine Too Slow type of normal users. 3 Play meta- Learning to detect Threat data: Technique. Malware.. In paper [4], author proposed novel technique for Pattern. Selection of computing a rank aggregation on the basis of matrix important completion to avoid noise and incomplete data. Proposed features.[2] method solves a structured matrix-completion problem A novel over the space of skew-symmetric matrices. The author 4 After scheme to proves a recovery theorem detailing when proposed evaluation detect The approach will work. They also perform a detailed it proves review scoring evaluation of proposed approach with synthetic data and Detecting that spammers methods an anecdotal study with Netflix ratings. To find the product proposed who try to to solutions, they utilized the svp solver for matrix review ranking and influence compute completion. Rank aggregation is combined with the spammers supervised review the degree structure of skew-symmetric matrices. Author applied for using rating methods ratings on of spam latest advances in the theory and algorithms of matrix behaviors. [5] are some target for each completion to skew-symmetric matrices. Author enhanced effective in products or reviewer. existing algorithm for matrix completion to handle skew- discovering product symmetric data. spammers. groups. Hysad: a semi In paper[10], author reported a survey on Web Detect all supervised Based on spam detection, which comprehensively introduces the type of Not 5 hybrid Historical principles and algorithms in the literature. Indeed, the Ranking Effective. shilling attack Ranking. work of Web
Recommended publications
  • Opera Mini Application for Android
    Opera Mini Application For Android Wat theologized his eternities goggling deathy, but quick-frozen Mohammed never hammer so unshakably. Fain and neverfringillid headline Tyrone sonever lambently. reapplied his proles! Tracie meows his bibulousness underdevelop someplace, but unrimed Ephrayim This application lies in early on this one knows of applications stored securely for example by that? Viber account to provide only be deactivated since then. Opera Mini is a super lightweight browser that loads web pages faster than what every other browser available. Opera Mini Browser Latest News Photos Videos on Opera. The Opera Mini for Android lets you do everything you any to online without wasting your fireplace plan It's stand fast safe mobile web browser that saves you tons of. Analysis of tomorrow with a few other. The mini application for opera android open multiple devices. Just with our site on a view flash drives against sim swap scammers? Thanks for better alternative software included in multitasking is passionate about how do you can browse, including sms charges may not part of mail and features. Other download option for opera mini Hospedajes Mirta. Activating it for you are you want. Opera mini 16 beta android app has a now released and before downloading the read or full review covering all the features here. It only you sign into your web page title is better your computer. The Opera Mini works the tender as tide original Opera for Android This app update features a similar appearance and functionality but thrive now displays Facebook. With google pixel exclusive skin smoothing makeover tool uses of your computer in total, control a light.
    [Show full text]
  • Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia
    Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia Growing Innovation ©2014 infoDev / The World Bank | 1818 H Street, NW | Washington DC, 20433 Email: [email protected] | Tel + 1 202 458 8831 | Twitter: @infoDev www.infodev.org Mobile 99066_Mobile_Cover.indd066_Mobile_Cover.indd 1 88/26/14/26/14 110:150:15 AAMM Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia Summary Report Mobile 99066_MobileAtBaseOfPyramid.indd066_MobileAtBaseOfPyramid.indd i 88/26/14/26/14 110:110:11 AAMM © 2014 International Bank for Reconstruction and Development / The World Bank Mailing Address: MSN I9-900 1818 H St. NW, Washington D.C., 20433 USA Telephone: (+1) 202-458-4070 Website: www.infoDev.org Email: [email protected] Twitter: @infoDev Facebook: /infoDevWBG Some rights reserved. This work is a product of the staff of infoDev / World Bank. Note that the World Bank does not necessarily own each component of the content included in the work. The World Bank therefore does not warrant that the use of the content contained in the work will not infringe on the rights of third parties. The risk of claims resulting from such infringement rests solely with you. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of the donors of infoDev, The World Bank, its Board of Executive Directors, or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries.
    [Show full text]
  • Download Opera Mobile for N73
    Download opera mobile for n73 With the award-winning Opera Mobile browser you can surf the same Web sites quickly and easily No hassle just fast browsing for Nokia N73 Free Download. Opera Mini Web Browser - Get the fastest mobile browser with Opera Mini By and gives Opera Mini a sleek modern appearance for Nokia N73 Free Download. Device detected: Nokia - N Download Opera Mobile 12 for Symbian/S60 · Download Opera Mini for Symbian/S60 · Other download options. For more. Found Free Opera Mini Nokia N73 Java Apps. Download Nokia N73 Java Apps for free to your mobile phone or tablet. Why not share and showcase your. Get free browsers & internet downloadable Opera Mini Nokia N73 Java Apps for your mobile device. Free mobile download JAR from our website, mobile site or. Download Opera Mini Nokia N73 Java App to your mobile for free, in jar, uploaded by superchaka in Browsers & Internet. Opera Mini jar. Download Opera Mobile 10 and Opera Mobile , both are full versions! Compatible phones include, N71, N73, N76, N77, N78, N80, N nokia n73 opera mini - Download Free Apps, Games & Videos for mobile and tablet devices from Opera mini for n73 Free Download,Opera mini for n73 Software Collection Opera Mini / Browse the Web quickly with your mobile device. Download Opera mini 7. 1 for Nokia N 73 apps for the Nokia N These apps are free to download and install. The free Opera mini 7. 1 for Nokia N 73 apps. opera mobile n73 Download, opera mobile n73, opera mobile n73 free download, download opera mobile n73 for free software download in the.
    [Show full text]
  • Malicious Android Apps Overview, Status and Dilemmas
    Malicious Android Apps Overview, Status and Dilemmas Federico Maggi - http://maggi.cc 1,260 Samples Analyzed (2012) Manual analysis of samples by Yajin Zhou & Xuxian Jiang 36.7% leverage root-level exploits 90% turn devices into bots 45.3% dial/text premium numbers in background 51.1% harvest user information Other goods encrypted root-level exploit or obfuscated C&C address dynamic, remote updates Attackers Goals Steal Sensitive Data intercept texts or calls steal passwords Turn Devices Into Bots perform malicious actions gain root privileges Direct Financial Gain call or text premium numbers steal online banking credentials ZitMo & SpitMo (2011) ● Companion of the famous ZeuS and SpyEye trojans. ● Steal the mTAN or SMS used for 2-factor authentication. The attack scheme (1) www.yourbank.com username: user password: ************ INFECTED COMPUTER username: user password: ************ $ $ $ $ $ $ $ $ $ $ $ $ $ 2-factors authentication (password + secret code) ONE TIME SECRET CODE ************ GO! The attack scheme (2) www.yourbank.com username: user password: ************ ONE TIME SECRET CODE INFECTED COMPUTER OK TYPE IN THE ONE TIME SECRET CODE EXPIRED TYPE IN THE ONE TIME SECRET CODE The attack scheme (2) www.yourbank.com username: user password: ************ INFECTED COMPUTER inject QR code Luring Users with a QR Code USERNAME user PASSWORD ************ SCAN TO LOGIN Login The attack scheme (3) www.evil.org/fake-login-app.apk The attack scheme (4) www.yourbank.com username: user password: ************ ONE TIME SECRET CODE INFECTED
    [Show full text]
  • Usability of Tablet Computers to Facilitate Instant Written Feedback
    University of Huddersfield Repository Prigmore, Martyn and Gledhill, Duke Usability of tablet computers to facilitate instant written feedback Original Citation Prigmore, Martyn and Gledhill, Duke (2015) Usability of tablet computers to facilitate instant written feedback. Innovation in Teaching and Learning in Information and Computer Sciences (ITALICS). ISSN 1473-7507 This version is available at http://eprints.hud.ac.uk/id/eprint/19904/ The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in any copy; • A hyperlink and/or URL is included for the original metadata page; and • The content is not changed in any way. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. http://eprints.hud.ac.uk/ Usability of tablet computers to facilitate instant written feedback Authors and affiliations: Dr Martyn Prigmore, University of Huddersfield Dr Duke Gledhill, University of Huddersfield Type of Article: Research article Keywords: Feedback; tablet computer; usability; handwriting recognition Word count: 4767 Corresponding author: Dr Martyn Prigmore School of Computing and Engineering University of Huddersfield Queensgate Huddersfield HD1 3DH Tel: 01484 472083 Email: [email protected] Copyright permissions: None required Signed contributors’ agreement sent: Yes Abstract We undertake a usability evaluation of tablet computers and handwriting capture and recognition software for use in the classroom.
    [Show full text]
  • Phillip Parfitt Head of Developer Relations Forum Nokia EMEA [email protected]
    Phillip Parfitt Head of Developer Relations Forum Nokia EMEA [email protected] Main themes for today Delivering global New simplified way New ways to create scale in local for developer to consumer markets all over the design, develop and excitement and world distribute their demand for Ovi apps Store and apps Delivering global scale in local markets all over the world 220 13 1.3 13 devices/sec 1.3 billion users 220 countries Demand for mobile phones Central & Eastern Europe Mobile Phone Forecast 2009-2014(mu) 20 18 16 14 12 10 2009 8 2014 6 4 2 - Czech Republic Hungary Poland Rest of Central & Eastern Europe CAGR (2009-2014) 0,4% 2,4% 5,5% 4,7% Source: Canalys Nokia delivers global scale by covering all device segments and price points 175 45 50 500 Million Million Million Million New simplified way for developer to design, develop and distribute their apps Nokia has introduced new design resources and significantly reduced cost of development and publishing Full services New developer Signing process Several new design resources tools released – now free and improvements introduced with Qt even 70% simplified in QA process http://forum.nokia.com/Desi less code gn Ovi Store is open 24/7 in more that 190 countries About 90% of 85% of the Games and Apps Sales for the daily signed in experience the games and traffic to Ovi visitors to Ovi highest uplift at apps are the Store converts Store are repeat weekends. highest on to downloads. visitors. Sundays. Ovi Store is localized for 90% of mobile consumers in their local language Consumers can 91 operators in Publishers from browse and 27 countries more than 90 purchase support countries are content from Ovi integrated distributing Store in more mobile billing their content than 190 In app through countries advertising and Ovi Store through credit billing card billing introduced Local adaptation is the key to global reach • The most popular global items remain highest in demand.
    [Show full text]
  • Understanding the Security Management of Global Third-Party Android Marketplaces
    Understanding the Security Management of Global Third-Party Android Marketplaces Yuta Ishii†; Takuya Watanabe‡; Fumihiro Kanei‡; Yuta Takata‡; Eitaro Shioji‡ Mitsuaki Akiyama‡; Takeshi Yagi‡; Bo Sun†; Tatsuya Mori† †Waseda University; Tokyo; Japan; ‡NTT Secure Platform Laboratories; Tokyo; Japan {yuta,sunshine,mori}@nsl.cs.waseda.ac.jp,[email protected] ABSTRACT is the openness of the Android ecosystem, which has enabled var- As an open platform, Android enables the introduction of a vari- ious third-party marketplaces to operate independently from the ety of third-party marketplaces in which developers can provide official Android marketplace – Google Play. We also note thatin mobile apps that are not provided in the official marketplace. Since some areas, such as China and Cuba, access to Google Play has the initial release of Android OS in 2008, many third-party app some restrictions [9]. In such areas, Android users need to rely on marketplaces have been launched all over the world. The diversity the third-party markets as their default gateway to acquire apps. of which leads us to the following research question: are these third- As we will show later, third-party markets are operated by vari- party marketplaces securely managed? This work aims to answer ous organizations, including web service providers or hardware this question through a large-scale empirical study. We collected vendors. more than 4.7 million Android apps from 27 third-party market- The diversity of the third-party marketplaces operating globally places, including ones that had not previously been studied in the has made it difficult to assess their security.
    [Show full text]
  • Mobile Megatrends 2009 Knowledge
    Knowledge. Passion. Innovation. VisionMobile Research Mobile Megatrends 2009 Knowledge. Passion. Innovation. Mobile Megatrends 2009 Andreas Constantinou, Ph.D. Research Director, VisionMobile twitter: @andreascon Last updated: 2 June 2009 licensed under a Creative Commons Attribution 3.0 license. Mobile Megatrends Eight Centres of Gravity: the New Rules of Mobile. Market Gravity: The Rise and Fall of Market Value. The Software Industry is Consolidating. Mapping Business Model Innovation: Value Quadrants. Open is the New Closed. The Mobile Application Store Phenomenon. NaaS: Network as a Service. Mobile Service Analytics: the Most Underhyped Opportunity. VisionMobile Research Reports selected analyst reports On-Device Portals: The New Age of MDM Case Study: Five Defining Traits Beyond WAP Handset Motorola of Open Source (ARCchart) Customisation: (Ovum) (Informa) 2006-2011 (ARCchart) High-Capacity SIMs Mobile Operating Firmware OTA: GPLv2 vs GPLv3 (Informa) Systems: The New From Hype to White Paper Generation Market Reality (ARCchart) Mobile Software Activating the Idle Open Source in Mobile Management Screen: Uncharted Mobile: 2007-2012 Megatrends Report Territory (Informa) 2008 (Informa) VisionMobile Market-How Maps Mobile Industry Atlas The 100 million club :a visual map of who's who in the mobile : the watchlist of software companies whose handset industry, showcasing 800+ leading products have been embedded on more than companies across 47 market sectors. 100 million cellular handsets VisionMobile Advisory services selected clients
    [Show full text]
  • Real World Longitudinal Ios App Usage Study at Scale
    Real World Longitudinal iOS App Usage Study at Scale DOHYUN KIM and JOSHUA GLUCK, Carnegie Mellon University, USA MALCOLM HALL, University of Glasgow, UK YUVRAJ AGARWAL, Carnegie Mellon University, USA Given the importance of understanding the interaction between mobile devices and their users, app usage patterns have been studied in various contexts. However, prior work has not fully investigated longitudinal changes to app usage behavior. In this paper, we present a longitudinal, large-scale study of mobile app usage based on a dataset collected from 162; 006 iPhones and iPads over 4 years. We explore multiple dimensions of app usage pattern proving useful insights on how app usage changes over time. Our key findings include (i) app usage pattern changes over time both at the individual applevel and the app category level (i.e. proportion of time a user spends using an app), (ii) users keep a small set of apps frequently launched (90% of iPhone users launch roughly 14-18 apps weekly), (iii) a small number of apps remain popular while some specific kinds of apps (e.g. Games) have a shorter life cycle compared to other apps of different categories. Finally, wediscuss our findings and their implications, for example, a short-term study as an attempt to understand the general needs ofmobile devices may not achieve useful results for the long term. CCS Concepts: • Human-centered computing → Empirical studies in HCI. Additional Key Words and Phrases: smartphone, mobile application usage, user study ACM Reference Format: Dohyun Kim, Joshua Gluck, Malcolm Hall, and Yuvraj Agarwal. 2019. Real World Longitudinal iOS App Usage Study at Scale.
    [Show full text]
  • Mobile Game Arch D3.1 21122011 PU Version: 1.1
    Consortium groups the following Organizat ions: Partner Name Short name Country JCP-CONSULT SAS JCP FR DEUTSCHE TELEKOM AG DTAG D INTERDISCIPLINARY INSTITUTE FOR BROADBAND IBBT B TECHNOLOGY TECHNISCHE UNIVERSITAET MUENCHEN TUM D KUNGLIGA TEKNISKA HOEGSKOLAN KTH S ADVA AG OPTICAL NETWORKING ADVA D ERICSSON AB EA S ERICSSON TELECOMUNICAZIONI TEI I ACREO AB. ACREO S MAGYAR TELEKOM TAVKOZLESI NYILVANOSAN MAGYAR H MUKODO RESZVENYTARSASAG TELEKOM “Mobile Games Architecture: State of theRT Art of the SLOVAK TELEKOM AS SLOVAK SK European Mobile Games IndustryTELEKOM” UNIVERSITY OF ESSEX UESSEX UK D3.1 Abstract: Document to be considerate as Word Template for all deliverables Mobile Game Arch_D3.1_21122011_PU Version: 1.1 Last Update: 21.12.2011 Distribution Level: RE ••• Distribution level PU = Public, RE = Restricted to a group of the specified Consortium, PP = Restricted to other program participants (including Commission Services), CO= Confidential, only for members of the OASE Consortium (including the Commission Services) “The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 249025” Partner Name Short Name Country JCP-CONSULT JCP FR European Game Developers Federation EGDF SW NCC SARL NCC FR NORDIC GAME RESOURCES AB NGR SW Abstract: The authors of this paper have started to compile an accurate overview of the mobile games industry in the fourth quarter of 2011. The facts, observations, and analysis in this document are intended to feed the discussions for the first Mobile Game Arch Workshop, to be held in Paris on December 7, 2011. It is the authors’ intention to continue this work with, hopefully, a growing number of knowledgeable contributors.
    [Show full text]
  • Make Money from Your Mobile Apps
    Make money from your mobile apps White paper Make money from your mobile apps Make money from your mobile apps Introduction 2 The rise of the smartphone 2 Mobile application complexities 3 The value of the mobile applications market 3 App stores 3 Get the most from your mobile applications 4 Make money from your mobile applications and maximize revenue 6 Increase sales with the best payment experience 7 Measure the results 11 What the future holds for mobile apps 11 Conclusion 12 1 Make money from your mobile apps Introduction Key stats from the Bango apps survey: Mobile applications have become hugely popular with downloads predicted to reach 4 billion this year alone, Bango surveyed a wide range of mobile content rising to 21 billion by 2013. This isn’t surprising when providers and application developers to get their you look at the number of smartphones on the market views and plans for the future – here’s what they and worldwide shipments reported to surpass 390 said: million by 2013, growing at a rate of 20.9% per year.* • 45% of developers plan to monetize their apps directly, in other words outside the The good news for application developers is that as app stores the number of smartphone users increase, so too • 48% think that although app stores will does the demand for a wide range of mobile grow in importance in five years time, applications. The only question that remains is how these channels will coexist alongside the do you take advantage of this opportunity when there mobile web are already so many apps out there and more • iPhone tops the list, followed by Android constantly being developed? and BlackBerry, for the most important handset/platform to develop an app for in This white paper provides an overview of the mobile 2010 applications marketplace and how application • Windows Mobile, Palm and Symbian were developers can capitalize on this opportunity.
    [Show full text]
  • FEEDBACK and USER REVIEW ANALYZING TOOLS on the Use of App Store Reviews in Software Industry
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
    [Show full text]