ing method. In 2015 IEEE 19th INES , pages 153–157, 2015.
[32] Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques
Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric
Bodden, Damien Octeau, and Patrick McDaniel. Iccta: De-
tecting inter-component privacy leaks in android apps. In
2015 IEEE/ACM 37th ICSE, volume 1, pages 280–291, 2015.
[33] Wenjie Li, Yanyan Jiang, Chang Xu, Yepang Liu, Xiaoxing
Ma, and Jian Lü. Characterizing and detecting inefficient im-
age displaying issues in android apps. In 2019 IEEE 26th
SANER, pages 355–365. IEEE, 2019.
[34] Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen.
Droidbot: a lightweight ui-guided test input generator for an-
droid. In 2017 IEEE/ACM 39th ICSE-C, pages 23–26, 2017.
[35] Kaijun Liu, Shengwei Xu, Guoai Xu, Miao Zhang, Dawei
Sun, and Haifeng Liu. A review of android malware detec-
tion approaches based on machine learning. IEEE Access,
8:124579–124607, 2020.
[36] Zhe Liu, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun
Hu, and Qing Wang. Owl eyes: Spotting ui display issues via
visual understanding. In 35th IEEE/ACM ASE, pages 398–
409. IEEE, 2020.
[37] Scott M. Lundberg, Gabriel Erion, Hugh Chen, Alex DeGrave,
Jordan M. Prutkin, Bala Nair, Ronit Katz, Jonathan Himmel-
farb, Nisha Bansal, and Su-In Lee. From local explanations
to global understanding with explainable ai for trees. Nature
Machine Intelligence, 2(1):2522–5839, 2020.
[38] Scott M Lundberg, Bala Nair, Monica S Vavilala, Mayumi
Horibe, Michael J Eisses, Trevor Adams, David E Liston,
Daniel King-Wai Low, Shu-Fang Newman, Jerry Kim, et al.
Explainable machine-learning predictions for the prevention
of hypoxaemia during surgery. Nature Biomedical Engineer-
ing, 2(10):749, 2018.
[39] Alejandro Martín, Héctor D Menéndez, and David Camacho.
Mocdroid: multi-objective evolutionary classifier for android
malware detection. Soft Computing, 21:7405–7415, 2017.
[40] Arunesh Mathur, Mihir Kshirsagar, and Jonathan Mayer.
What makes a dark pattern... dark? design attributes, norma-
tive considerations, and measurement methods. In Proceed-
ings of CHI ’21, New York, NY, USA, 2021. Association for
Computing Machinery.
[41] Niall McLaughlin, Jesus Martinez del Rincon, BooJoong
Kang, Suleiman Yerima, Paul Miller, Sakir Sezer, Yeganeh
Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, et al. Deep
android malware detection. In Proceedings of the seventh
ACM CODASPY, pages 301–308, 2017.
[42] Arvind Narayanan, Arunesh Mathur, Marshini Chetty, and
Mihir Kshirsagar. Dark patterns: Past, present, and future:
The evolution of tricky user interfaces. Queue, 18(2):6792,
may 2020.
[43] Ehsan Noei, Feng Zhang, and Ying Zou. Too many user-
reviews! what should app developers look at first? IEEE
TSE, 47(2):367–378, 2019.
[44] Our website.
https://sites.google.com/view/stud
y-about-subscription-uis/
.
[45] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau,
M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Ma-
chine learning in Python. Journal of Machine Learning Re-
search, 12:2825–2830, 2011.
[46] Google Play. Subscription apps on google play:
User insights to help developers win.
https:
//services.google.com/fh/files/misc/subscrip
tion_apps_on_google_play.pdf
, 2017.
[47] Thomas (TJ) Porter. What to do if youve become the victim of
a subscription scam.
https://www.mybanktracker.com/
money-tips/money/subscription-scam-296704
, 2022.
[48] Alireza Sadeghi, Hamid Bagheri, Joshua Garcia, and Sam
Malek. A taxonomy and qualitative comparison of program
analysis techniques for security assessment of android soft-
ware. IEEE TSE, 43(6):492–530, 2016.
[49] Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-
Pedrero, Javier Nieves, Pablo G Bringas, and Gonzalo Ál-
varez Marañón. Mama: manifest analysis for malware detec-
tion in android. Cybernetics and Systems, 44(6-7):469–488,
2013.
[50] Andriy Slynchuk. How to know you’re being scammed by a
fleeceware app.
https://clario.co/blog/how-to-spo
t-fleeceware-apps/
, 2021.
[51] Ray Smith. An overview of the tesseract ocr engine. In ICDAR
2007, volume 2, pages 629–633. IEEE, 2007.
[52] Sophos. Dissecting fleeceware apps: the million-
dollar money-making machine in android and ios.
https://vb2020.vblocalhost.com/presentations/di
ssecting-fleeceware-apps-the-million-dollar-mon
ey-making-machine-in-android-and-ios/
, 2020.
[53] Android Studio. Ui/application exerciser monkey. developer.
android. com. https://developer. android. com/studio/test/mon-
key (accessed Sep. 3, 2020), 2017.
[54] Feng Tang and Hai Tao. Fast multi-scale template matching
using binary features. In WACV ’07, pages 36–36. Citeseer,
2007.
[55] Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Ste-
fan Kraxberger, and Clemens Orthacker. Malware detection
by applying knowledge discovery processes to application
metadata on the android market (google play). Security and
communication networks, 9(5):389–419, 2016.
[56] Sitalakshmi Venkatraman, Mamoun Alazab, and R Vinayaku-
mar. A hybrid deep learning image-based analysis for effec-
tive malware detection. Journal of Information Security and
Applications, 47:377–389, 2019.
[57] Timothy Vidas and Nicolas Christin. Evading android run-
time analysis via sandbox detection. In Proceedings of the
9th ASIACCS, pages 447–458, 2014.
[58] JAKUB VÁVRA. How fleeceware apps have earned over $400
million on android and ios.
https://blog.avast.com/f
leeceware-apps-on-mobile-app-stores-avast
, 2021.
[59] Zhiqiang Wang, Qian Liu, and Yaping Chi. Review of an-
droid malware detection based on deep learning. IEEE Access,
8:181102–181126, 2020.
[60] Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee,
and Kuo-Ping Wu. Droidmat: Android malware detection
through manifest and api calls tracing. In Seventh Asia joint
conference on information security, pages 62–69. IEEE, 2012.
[61] Ke Xu, Yingjiu Li, Robert H Deng, and Kai Chen. Deepre-
finer: Multi-layer android malware detection system applying
deep neural networks. In EuroSP ’18, pages 473–487. IEEE,
2018.
[62] Yuki Yada, Jiaying Feng, Tsuneo Matsumoto, Nao
Fukushima, Fuyuko Kido, and Hayato Yamana. Dark pat-
terns in e-commerce: a dataset and its baseline evaluations.
In 2022 IEEE International Conference on Big Data, pages
3015–3022, 2022.
[63] Li Yujian and Liu Bo. A normalized levenshtein distance met-
ric. IEEE TPAMI, 29(6):1091–1095, 2007.
[64] Win Zaw Zarni Aung. Permission-based android malware de-
tection. International Journal of Scientific & Technology Re-
search, 2(3):228–234, 2013.
[65] Sergey Zubkov. Subscription prices have increased by 40%,
whats next?
https://adapty.io/blog/subscriptio
n-prices-have-increased-by-40-percent/
, 2022.