• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Android permissions demystified

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [now.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [http.cs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [ecee.colorado.edu]
  • [www.cs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.cse.usf.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Adrienne Porter Felt , Erika Chin , Steve Hanna , Dawn Song , David Wagner
Venue:In CCS’11
Citations:224 - 12 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Felt_androidpermissions,
    author = {Adrienne Porter Felt and Erika Chin and Steve Hanna and Dawn Song and David Wagner},
    title = {Android permissions demystified},
    booktitle = {In CCS’11},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. We study Android applications to determine whether Android developers follow least privilege with their permission requests. We built Stowaway, a tool that detects overprivilege in compiled Android applications. Stowaway determines the set of API calls that an application uses and then maps those API calls to permissions. We used automated testing tools on the Android API in order to build the permission map that is necessary for detecting overprivilege. We apply Stowaway to a set of 940 applications and find that about one-third are overprivileged. We investigate the causes of overprivilege and find evidence that developers are trying to follow least privilege but sometimes fail due to insufficient API documentation.

Keyphrases

android permission    android application    application us    phone hardware    security-relevant part    third-party application    android developer    permission request    install-time application permission system    android api    extensive api    insufficient api documentation    permission map   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University