Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2766498.2766510acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

AppWatcher: unveiling the underground market of trading mobile app reviews

Published: 22 June 2015 Publication History

Abstract

Driven by huge monetary reward, some mobile application (app) developers turn to the underground market to buy positive reviews instead of doing legal advertisements. These promotion reviews are either directly posted in app stores like iTunes and Google Play, or published on some popular websites that have many app users. Until now, a clear understanding of this app promotion underground market is still lacking. In this work, we focus on unveiling this underground market and statistically analyzing the promotion incentives, characteristics of promoted apps and suspicious reviewers. To collect promoted apps, we built an automatic data collection system, AppWatcher, which monitored 52 paid review service providers for four months and crawled all the app metadata from their corresponding app stores. Finally, AppWatcher exposes 645 apps promoted in app stores and 29, 680 apps promoted in some popular websites. The current underground market is then reported from various perspectives (e.g., service price, app volume). We identified some interesting features of both promoted apps and suspicious reviewers, which are significantly different from those of randomly chosen apps. Finally, we built a simple tracer to narrow down the suspect list of promoted apps in the underground market.

References

[1]
wiki, http://en.wikipedia.org/wiki/App_Store_(iOS).
[2]
http://en.wikipedia.org/wiki/Google_Play.
[3]
venturebeat, http://venturebeat.com/2014/04/29/mobile-apps-could-hit-70b-in-\\revenues-by-2017-as-non-game-categories-take-off/.
[4]
bestreviewapp, http://www.bestreviewapp.com/.
[5]
dailyappshow, http://www.dailyappshow.com/.
[6]
Apple, https://developer.apple.com/app-store/review/guidelines/.
[7]
Google, https://play.google.com/about/developer-content-policy.html.
[8]
FTC, https://www.ftc.gov/tips-advice/business-center/guidance/ftcs-revised-endorsement-guides-what-people-are-asking.
[9]
R. Chandy and H. Gu, "Identifying spam in the ios app store," WICOW/AIRWeb '12.
[10]
Z. Xie and S. Zhu, "Grouptie: Toward hidden collusion group discovery in app stores," Wisec '14.
[11]
A. J. Smith, http://www.appynation.com/hall-of-infamy/.
[12]
buyklout, http://www.buyklout.com/.
[13]
androidappreviewsource, http://www.androidappreviewsource.com/.
[14]
appiness, http://www.appiness.io/.
[15]
reviewfordev, http://www.reviewfordev.com/.
[16]
apprebates, http://www.apprebates.com/.
[17]
getappreviews, http://www.getappreviews.com/.
[18]
appredeem, http://m.appredeem.com/.
[19]
promodispenser, http://www.promodispenser.com/.
[20]
giftmeapps, http://www.giftmeapps.com/.
[21]
4xn, http://www.4xn.com/.
[22]
Madapp, http://madapp.me/index.html#services.
[23]
Appannie, http://blog.appannie.com/app-annie-index-market-q1-2014/.
[24]
androidheadlines, http://www.androidheadlines.com/.
[25]
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage, "Re: Captchas-understanding captcha-solving services in an economic context." USENIX '10.
[26]
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse." USENIX '13.
[27]
P. G. Ipeirotis, "Demographics of mechanical turk," 2010.
[28]
J. Ross, L. Irani, M. Silberman, A. Zaldivar, and B. Tomlinson, "Who are the crowdworkers?: shifting demographics in mechanical turk," CHI'10.
[29]
W. Mason and S. Suri, "Conducting behavioral research on amazon's mechanical turk," Behavior research methods, vol. 44, no. 1, pp. 1--23, 2012.
[30]
P. G. Ipeirotis, "Analyzing the amazon mechanical turk marketplace," XRDS '10.
[31]
zhubajie, http://www.zhubajie.com.
[32]
zhubajie, http://www.sandaha.com.
[33]
weibo, http://www.weibo.com.
[34]
G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal, H. Zheng, and B. Y. Zhao, "Serf and turf: Crowdturfing for fun and profit," WWW '12.
[35]
N. Jindal and B. Liu, "Opinion spam and analysis," WSDM '08.
[36]
G. Fei, A. Mukherjee, B. Liu, M. Hsu, M. Castellanos, and R. Ghosh, "Exploiting burstiness in reviews for review spammer detection." ICWSM '13.
[37]
F. Li, M. Huang, Y. Yang, and X. Zhu, "Learning to identify review spam," IJCAI '11.
[38]
G. Wang, S. Xie, B. Liu, and P. S. Yu, "Review graph based online store review spammer detection," ICDM '11.
[39]
M. Ott, Y. Choi, C. Cardie, and J. T. Hancock, "Finding deceptive opinion spam by any stretch of the imagination," HLT '11.
[40]
N. Jindal, B. Liu, and E.-P. Lim, "Finding unusual review patterns using unexpected rules," CIKM '10.
[41]
J. Zhang and G. Gu, "Neighborwatcher: A content-agnostic comment spam inference system." NDSS '13.
[42]
P. Kolari, T. Finin, and A. Joshi, "Svms for the blogosphere: Blog identification and splog detection." AAAI '06.
[43]
G. Mishne, D. Carmel, and R. Lempel, "Blocking blog spam with language model disagreement." AIRWeb '05.
[44]
A. Mukherjee, B. Liu, and N. Glance, "Spotting fake reviewer groups in consumer reviews," WWW '12.
[45]
A. Mukherjee, B. Liu, J. Wang, N. Glance, and N. Jindal, "Detecting group review spam," WWW '11.

Cited By

View all
  • (2024)A multiview clustering framework for detecting deceptive reviewsJournal of Computer Security10.3233/JCS-22000132:1(31-52)Online publication date: 2-Feb-2024
  • (2023)Measuring and Understanding Crowdturfing in the App StoreInformation10.3390/info1407039314:7(393)Online publication date: 11-Jul-2023
  • (2022)Comparing user perceptions of anti-stalkerware apps with the technical realityProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563617(135-154)Online publication date: 8-Aug-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
June 2015
256 pages
ISBN:9781450336239
DOI:10.1145/2766498
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. app stores
  2. fake reviews
  3. mobile app reviews
  4. opinion mining
  5. underground market

Qualifiers

  • Research-article

Funding Sources

Conference

WiSec'15
Sponsor:
  • SIGSAC
  • US Army Research Office
  • NSF

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A multiview clustering framework for detecting deceptive reviewsJournal of Computer Security10.3233/JCS-22000132:1(31-52)Online publication date: 2-Feb-2024
  • (2023)Measuring and Understanding Crowdturfing in the App StoreInformation10.3390/info1407039314:7(393)Online publication date: 11-Jul-2023
  • (2022)Comparing user perceptions of anti-stalkerware apps with the technical realityProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563617(135-154)Online publication date: 8-Aug-2022
  • (2021)RacketStoreProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487837(639-657)Online publication date: 2-Nov-2021
  • (2021)Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating ApplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290893918:3(1033-1050)Online publication date: 1-May-2021
  • (2020)Treating Psychological Trauma in the Midst of COVID-19: The Role of Smartphone AppsFrontiers in Public Health10.3389/fpubh.2020.004028Online publication date: 18-Aug-2020
  • (2020)Effectiveness of Using Mental Health Mobile Apps as Digital Antidepressants for Reducing Anxiety and Depression: Protocol for a Multiple Baseline Across-Individuals DesignJMIR Research Protocols10.2196/171599:7(e17159)Online publication date: 5-Jul-2020
  • (2020)Understanding Promotion-as-a-Service on GitHubProceedings of the 36th Annual Computer Security Applications Conference10.1145/3427228.3427258(597-610)Online publication date: 7-Dec-2020
  • (2020)A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play StoreIEEE Transactions on Mobile Computing10.1109/TMC.2020.3007260(1-1)Online publication date: 2020
  • (2020)Design and testing of a mobile health application rating toolnpj Digital Medicine10.1038/s41746-020-0268-93:1Online publication date: 21-May-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media