Have a personal or library account? Click to login
Presenting Risks Introduced by Android Application Permissions in a User-Friendly Way Cover

Presenting Risks Introduced by Android Application Permissions in a User-Friendly Way

By: Juraj Varga and  Peter Muska  
Open Access
|Mar 2015

References

  1. [1] Android and iOS continue to dominate the worldwide smartphone market with Android shipments just shy of 800 million in 2013, According to IDC, http://www.idc.com/getdoc.jsp?containerId=prUS24676414
  2. [2] JOKAY, M.: The design of a steganographic system based on the internal MP4 file structures, Internat. J. Comput. Commun. 5 (2012), 207-214.
  3. [3] JÓKAY, M.-KOˇSDY, M.: Steganographic file system based on JPEG files, Tatra Mt. Math. Publ. 57 (2013), 65-83.
  4. [4] Android security overview, http://source.android.com/tech/security/index.html
  5. [5] SHABTAI, A.-FLEDEL, Y.-KANONOV, U.-ELOVICI, Y.-DOLEV, S.: Google Android: A comprehensive security assessment, Security & Privacy, IEEE 8 (2010), 35-44.
  6. [6] Android permissions overview, http://developer.android.com/reference/android/Manifest.permission.html
  7. [7] FELT, A. P.-HA, E.-EGELMAN, S.-HANEY, A.-CHIN, E.-WAGNER, D.: Android permissions: user attention, comprehension, and behavior, in: Symposium on Usable Privacy and Security-SOUPS ’12, ACM, New York, NY, USA, pp. 1-14.
  8. [8] ANTAL, E.-BARANEC, F.: Techniques of obtaining sensitive data from Apple iOS devices, in: 43. Konference EurOpen.CZ, Vranov, Czech Republik, 2013, Plzeˇn, EurOpen.CZ, 2013, pp. 21-32. (In Slovak)
  9. [9] ZHOU, Y.-JIANG, X.: Dissecting Android malware: characterization and evolution, in: Proc. of the 33rd IEEE Symp. on Security and Privacy, San Francisco, CA, 2012, IEEE Computer Society, Washington, DC, USA, 2012, pp. 95-109.10.1109/SP.2012.16
  10. [10] ENCK, W.: Defending users against smartphone apps: techniques and future directions, in: Proc. of the 7th Internat. Conf. on Information Systems Security-ICISS ’11 (S. Jajodia, C. Mazumdar, eds.), Kolkata, India, 2011, Lecture Notes in Comput. Sci., Vol. 7093, Springer-Verlag, Berlin, pp. 49-70.
  11. [11] FUCHS, A. P.-CHAUDHURI, A.-FOSTER, J. S.: SCanDroid: automated security certification of Android applications, Technical Reports of the Computer Science Department, 2009, 15 pp.
  12. [12] GRACE, M. C.-ZHOU, W.-JIANG, X.-SADEGHI, A.-R.: Unsafe exposure analysis of mobile in-app advertisements, in: Proc. of the 5th ACM Conf. on Security and Privacy in Wireless and Mobile Networks-WISEC ’12, Tucson, AZ, USA, ACM, New York, NY, USA, 2012, pp. 101-112.10.1145/2185448.2185464
  13. [13] FELT, A. P.-SONG, D.-WAGNER, D.-HANNA, S.: Android permissions demystified, in: Proc. of the 18th ACM Conf. on Comput. and Commun. Security-CCS ’11, Chicago, IL, USA, 2011, ACM New York, NY, USA, pp. 627-638.10.1145/2046707.2046779
  14. [14] FELT, A. P.-FINIFTER, M.-CHIN, E.-WAGNER, D.: A survey of mobile malware in the wild, in: Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices-SPSM ’11, Chicago, IL, USA, ACM, New York, NY, USA, 2011, pp. 3-14.10.1145/2046614.2046618
  15. [15] NAUMAN, M.-KHAN, S.-ZHANG, X.: Apex: Extending Android permission model and enforcement with user-defined runtime constraints, in: 5th ACM Symposium on Information, Comput. and Commun. Security-ASIACCS ’10, Beijing, China, 2010, ACM, New York, NY, USA, 2010, pp. 328-332.10.1145/1755688.1755732
  16. [16] ENCK, W.-ONGTANG, M.-MCDANIEL. P.: On lightweight mobile phone application certification, in: Proc. of the 16th ACM Conf. on Comput. and Commun. Security- -CCS ’09, Chicago, IL, USA, 2009, ACM, New York, NY, USA, 2009, pp. 235-24510.1145/1653662.1653691
  17. [17] ZARNI, A.-WIN, Z.: Permission-based Android malware detection, Internat. J. of Sci. and Technology Research (IJSTR) 2 (2013), 228-234.
  18. [18] DAVI, L.-DIMITRENKO, A.-SADEGHI, A.-R.-WINANDY, M.: Privilege escalation attacks on Android, in: Proc. of the 13th Internat. Conf. on Inform. Security-ISC ’10 (M. Burmester et al., eds.), Boca Raton, FL, USA, 2010 Lecture Notes in Comput. Sci., Vol. 6531, Springer-Verlag, Berlin, 2011, pp. 346-360.
  19. [19] BUGIEL, S.-DAVI, L.-DMITRIENKO, A.-FISCHER, T.-SADEGHI, A.-R.: XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, Technical Report TR-2011-04, 2011, 18 pp.
  20. [20] BUGIEL, S.-DAVI, L.-DMITRIENKO, A.-FISCHER, T.-SADEGHI, A.-R.- -SHASTRY, B.: Towards taming privilege-escalation attacks on Android, in: Proc. of the 19th Annual Network & Distributed System Security Symp.-NDSS ’12, San Diego, California, 2012, pp. 1-18.
  21. [21] KENNEDY, K.-GUSTAFSON, E.-CHEN, H.: Quantifying the effects of removing permissions from Android applications, in: IEEE Mobile Security Technologies-MoST ’13, San Francisco, CA, 2013, pp. 11.
  22. [22] HOLAVANALLI, S.-MANUEL, D.-NANJUNDASWAMY, V.-ROSENBERG, B.- -SHEN, F.-KO, S.Y.-ZIAREK, L.: Flow Permissions for Android, in: IEEE/ACM28th Internat. Conf. on Automated Software Engineering-ASE ’13 (E.Denney et al., eds.), Palo Alto, USA, 2013, IEEE, Piscataway, NJ, 2013, pp. 652-658.10.1109/ASE.2013.6693128
  23. [23] F-Secure App Permissions, https://play.google.com/store/apps/details?id=com.fsecure.app.permissions.privacy
  24. [24] S2 Permission Checker, https://play.google.com/store/apps/details?id=com.byte256.permissionchecker
  25. [25] Permission Friendly Apps, https://play.google.com/store/apps/details?id=org.androidsoft.app.permission&hl=sk
  26. [26] Adv Permission Manager, https://play.google.com/store/apps/details?id=com.gmail.heagoo.pmaster.pro
  27. [27] ENCK, W.-GILBERT, P.-CHUN, B.-G.-COX, L. P.-JUNG, J.-MC-DANIEL, P.- -SHETH, A. N.: TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, in: 9th USENIX Symposium on Operating Systems Design and Implementation-OSDI ’10, Vancouver, BC, Canada, 2010, USENIX Association Berkeley, CA, USA, pp. 393-409.
DOI: https://doi.org/10.2478/tmmp-2014-0026 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 85 - 100
Submitted on: Nov 11, 2014
Published on: Mar 11, 2015
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2015 Juraj Varga, Peter Muska, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.