Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

LLM App Store Analysis: A Vision and Roadmap (2404.12737v2)

Published 19 Apr 2024 in cs.SE

Abstract: The rapid growth and popularity of LLM app stores have created new opportunities and challenges for researchers, developers, users, and app store managers. As the LLM app ecosystem continues to evolve, it is crucial to understand the current landscape and identify potential areas for future research and development. This paper presents a forward-looking analysis of LLM app stores, focusing on key aspects such as data mining, security risk identification, development assistance, and market dynamics. Our comprehensive examination extends to the intricate relationships between various stakeholders and the technological advancements driving the ecosystem's growth. We explore the ethical considerations and potential societal impacts of widespread LLM app adoption, highlighting the need for responsible innovation and governance frameworks. By examining these aspects, we aim to provide a vision for future research directions and highlight the importance of collaboration among stakeholders to address the challenges and opportunities within the LLM app ecosystem. The insights and recommendations provided in this paper serve as a foundation for driving innovation, ensuring responsible development, and creating a thriving, user-centric LLM app landscape.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (103)
  1. Hilmi Abdullah and Subhi RM Zeebaree. 2021. Android mobile applications vulnerabilities and prevention methods: A review. 2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) (2021), 148–153.
  2. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023).
  3. Empirical comparison of text-based mobile apps similarity measurement techniques. Empirical Software Engineering 24 (2019), 3290–3315.
  4. Suad A Alasadi and Wesam S Bhaya. 2017. Review of data preprocessing techniques in data mining. Journal of Engineering and Applied Sciences 12, 16 (2017), 4102–4107.
  5. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. 787–796.
  6. Apple. 2021a. App Store Small Business Program. https://developer.apple.com/app-store/small-business-program/.
  7. Apple. 2021b. Human Interface Guidelines. https://developer.apple.com/design/human-interface-guidelines/.
  8. Apple. 2024a. Apple App Store. https://apps.apple.com/sg/genre/ios/id36.
  9. Apple. 2024b. We’re committed to protecting your data. https://www.apple.com/privacy/features/.
  10. Simon Arvidsson and Johan Axell. 2023. Prompt engineering guidelines for LLMs in Requirements Engineering. (2023).
  11. Taking Android app vetting to the next level with path-sensitive value analysis. (2014).
  12. The privacy and security behaviors of smartphone app developers. In Workshop on Usable Security. Citeseer, 1–10.
  13. Dan M Brown. 2010. Communicating design: developing web site documentation for design and planning. New Riders.
  14. Toward detecting collusive ranking manipulation attackers in mobile app markets. In Proceedings of the 2017 ACM on Asia conference on computer and communications security. 58–70.
  15. Are mobile banking apps secure? what can be improved?. In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 797–802.
  16. Ausera: Automated security vulnerability detection for Android apps. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering. 1–5.
  17. Double Code-signing for Enhanced Android Application Security. International Information Institute (Tokyo). Information 15, 5 (2012), 1913.
  18. Mike Cohn. 2004. User stories applied: For agile software development. Addison-Wesley Professional.
  19. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.. In NDSS, Vol. 17. 10–14722.
  20. Security considerations for code signing. NIST Cybersecurity White Paper (2018).
  21. Bonnie Eisenman. 2015. Learning react native: Building native mobile apps with JavaScript. ” O’Reilly Media, Inc.”.
  22. Don’t accept candy from strangers: An analysis of third-party mobile sdks. Data Protection and Privacy: Data Protection and Artificial Intelligence 13 (2021), 1.
  23. Why people hate your app: Making sense of user feedback in a mobile app store. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. 1276–1284.
  24. Data preprocessing in data mining. Vol. 72. Springer.
  25. In-context autoencoder for context compression in a large language model. arXiv preprint arXiv:2307.06945 (2023).
  26. Necmiye Genc. 2019. Detection of spam review on mobile app stores, evaluation of helpfulness of user reviews and extraction of quality aspects using machine learning techniques. Ph. D. Dissertation. École de technologie supérieure.
  27. Droidkin: Lightweight detection of android apps similarity. In International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I 10. Springer, 436–453.
  28. Google. 2021a. Espresso. https://developer.android.com/training/testing/espresso.
  29. Google. 2021b. Material Design. https://material.io/design.
  30. Google. 2024. Google Play. https://play.google.com/store/app.
  31. GPTStore.AI. 2024. GPTStore.AI. https://gptstore.ai/gpts.
  32. Truth in advertising: The hidden cost of mobile ads for software developers. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. IEEE, 100–110.
  33. Emitza Guzman and Walid Maalej. 2014. How do users like this feature? a fine grained sentiment analysis of app reviews. In 2014 IEEE 22nd international requirements engineering conference (RE). Ieee, 153–162.
  34. MobiAd: private and scalable mobile advertising. In Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture. 33–38.
  35. Mobile app analytics. MIS quarterly 40, 4 (2016), 983–1008.
  36. App store mining and analysis: MSR for app stores. In 2012 9th IEEE working conference on mining software repositories (MSR). IEEE, 108–111.
  37. Diversified third-party library prediction for mobile app development. IEEE Transactions on Software Engineering 48, 1 (2020), 150–165.
  38. GPTs Hunter. 2024. GPTs Hunter. https://www.gptshunter.com/.
  39. Mobile app recommendation with sequential app usage behavior tracking. Journal of Internet Technology 20, 3 (2019), 827–837.
  40. Idoubi. 2024. GPTs Works. https://gpts.works/.
  41. Jesús Téllez Isaac and Sherali Zeadally. 2012. An anonymous secure payment protocol in a payment gateway centric model. Procedia Computer Science 10 (2012), 758–765.
  42. Model-reuse attacks on deep learning systems. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. 349–363.
  43. Smartphone and tablet application (app) life cycle characterization via Apple app store rank. Data and Information Management 4, 1 (2020), 44–67.
  44. Sanadbox: Sandboxing third party advertising libraries in a mobile application. In 2013 IEEE International Conference on Communications (ICC). IEEE, 2150–2154.
  45. Experience of developing a mobile application using flutter. In Information Science and Applications: ICISA 2019. Springer, 571–575.
  46. Mobile app-based health promotion programs: a systematic review of the literature. International journal of environmental research and public health 15, 12 (2018), 2838.
  47. Barry Leiba. 2012. Oauth web authorization protocol. IEEE Internet Computing 16, 1 (2012), 74–77.
  48. Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3216–3225.
  49. You are how you use apps: user profiling based on spatiotemporal app usage behavior. ACM Transactions on Intelligent Systems and Technology 14, 4 (2023), 1–21.
  50. The walkthrough method: An approach to the study of apps. New media & society 20, 3 (2018), 881–900.
  51. Personalized mobile app recommendation: Reconciling app functionality and user privacy preference. In Proceedings of the eighth ACM international conference on web search and data mining. 315–324.
  52. Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help?. In Proceedings of the 23rd international conference on World wide web. 201–212.
  53. Have you been properly notified? automatic compliance analysis of privacy policy text with gdpr article 13. In Proceedings of the Web Conference 2021. 2154–2164.
  54. Daniel Martens and Walid Maalej. 2019. Towards understanding and detecting fake reviews in app stores. Empirical Software Engineering 24, 6 (2019), 3316–3355.
  55. I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware. In 2016 14th Annual conference on privacy, security and trust (PST). IEEE, 129–136.
  56. Privacy and security in mobile health apps: a review and recommendations. Journal of medical systems 39 (2015), 1–8.
  57. User preferences for content, features, and style for an app to reduce harmful drinking in young adults: analysis of user feedback in app stores and focus group interviews. JMIR mHealth and uHealth 4, 2 (2016), e5242.
  58. Roberto Minelli and Michele Lanza. 2013. Software analytics for mobile applications–insights & lessons learned. In 2013 17th European Conference on Software Maintenance and Reengineering. IEEE, 144–153.
  59. New data preprocessing trends based on ensemble of multiple preprocessing techniques. TrAC Trends in Analytical Chemistry 132 (2020), 116045.
  60. A large-scale study of mobile web app security. In Proceedings of the Mobile Security Technologies Workshop (MoST), Vol. 50. Association for Computing Machinery.
  61. Analyzing user perspectives on mobile app privacy at scale. In Proceedings of the 44th International Conference on Software Engineering. 112–124.
  62. PR Newswire. 2024. FlowGPT, The Open Ecosystem AI Platform, Raises $10M. https://www.prnewswire.com/news-releases/flowgpt-the-open-ecosystem-ai-platform-raises-10m-302070574.html.
  63. OpenAI. 2024a. GPT Store. https://chat.openai.com/gpts.
  64. OpenAI. 2024b. Introducing the GPT Store. https://openai.com/blog/introducing-the-gpt-store.
  65. Knockoff nets: Stealing functionality of black-box models. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 4954–4963.
  66. The importance of app store optimization (ASO) for hospitality applications. In Digital and Social Media Marketing: Emerging Applications and Theoretical Development. Springer, 151–161.
  67. Chris Prosser. 2024. GPTs APP. https://gptsapp.io/.
  68. Detection of android malicious apps based on the sensitive behaviors. In 2014 IEEE 13Th international conference on trust, security and privacy in computing and communications. IEEE, 877–883.
  69. Quora. 2024. Poe Explore. https://poe.com/explore.
  70. The art and craft of fraudulent app promotion in google play. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2437–2454.
  71. Fake App Detection Using Sentiment Analysis. 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS) (2023), 1–6.
  72. Paul M Schwartz and Daniel J Solove. 2011. The PII problem: Privacy and a new concept of personally identifiable information. NYUL rev. 86 (2011), 1814.
  73. Early detection of spam mobile apps. In Proceedings of the 24th International Conference on World Wide Web. 949–959.
  74. Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications 38 (2014), 43–53.
  75. Understanding in-app ads and detecting hidden attacks through the mobile app-web interface. IEEE Transactions on Mobile Computing 17, 11 (2018), 2675–2688.
  76. Vulnerability detection in recent Android apps: An empirical study. In 2017 International Conference on Networking, Systems and Security (NSysS). IEEE, 55–63.
  77. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proceedings of the SIGCHI conference on human factors in computing systems. 2347–2356.
  78. A data encryption solution for mobile health apps in cooperation environments. Journal of medical Internet research 15, 4 (2013), e66.
  79. Malicious application detection in android using machine learning. In 2020 International Conference on Communication and Signal Processing (ICCSP). IEEE, 0846–0848.
  80. Factors influencing consumer acceptance of mobile marketing: a two-country study of youth markets. Journal of Interactive Marketing 23, 4 (2009), 308–320.
  81. Llama: Open and efficient foundation language models. arXiv preprint arXiv:2302.13971 (2023).
  82. Stealing machine learning models via prediction {{\{{APIs}}\}}. In 25th USENIX security symposium (USENIX Security 16). 601–618.
  83. Personalized mobile App recommendation by learning user’s interest from social media. IEEE Transactions on Mobile Computing 19, 11 (2019), 2670–2683.
  84. Piotr K Tysowski and M Anwarul Hasan. 2013. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Transactions on Cloud Computing 1, 2 (2013), 172–186.
  85. Privacy rarely considered: Exploring considerations in the adoption of third-party services by websites. arXiv preprint arXiv:2203.11387 (2022).
  86. Nishant Verma. 2017. Mobile Test Automation With Appium. Packt Publishing Ltd.
  87. Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10, 3152676 (2017), 10–5555.
  88. Understanding the evolution of mobile app ecosystems: A longitudinal measurement study of google play. In The World Wide Web Conference. 1988–1999.
  89. Lifan Wang and Jay Dang. 2024. FlowGPT. https://flowgpt.com/.
  90. Software protection on the go: A large-scale empirical study on mobile app obfuscation. In Proceedings of the 40th International Conference on Software Engineering. 26–36.
  91. Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 14–24.
  92. Machine learning-based malicious application detection of android. IEEE Access 5 (2017), 25591–25601.
  93. Profiledroid: Multi-layer profiling of android applications. In Proceedings of the 18th annual international conference on Mobile computing and networking. 137–148.
  94. Autogen: Enabling next-gen llm applications via multi-agent conversation framework. arXiv preprint arXiv:2308.08155 (2023).
  95. Wenhao Wu. 2018. React Native vs Flutter, Cross-platforms mobile application frameworks. (2018).
  96. Hulya Yalcin. 2017. Extracting user profiles from mobile data. In 2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 1–5.
  97. Security analysis of third-party in-app payment in mobile applications. Journal of Information Security and Applications 48 (2019), 102358.
  98. Vetting undesirable behaviors in android apps with permission use analysis. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 611–622.
  99. A First Look at GPT Apps: Landscape and Vulnerability. arXiv:2402.15105 [cs.CR]
  100. Ranking fraud detection for mobile apps: A holistic view. In Proceedings of the 22nd ACM international conference on Information & Knowledge Management. 619–628.
  101. Discovery of ranking fraud for mobile apps. IEEE Transactions on knowledge and data engineering 27, 1 (2014), 74–87.
  102. What is an app store? The software engineering perspective. Empirical Software Engineering 29, 1 (Jan. 2024). https://doi.org/10.1007/s10664-023-10362-3
  103. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Yanjie Zhao (39 papers)
  2. Xinyi Hou (16 papers)
  3. Shenao Wang (15 papers)
  4. Haoyu Wang (309 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com