Proceedings of the 17th ACM Conference on Computer and Communications Security 2010
DOI: 10.1145/1866307.1866317
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for empirical analysis of permission-based security models and its application to android

Abstract: Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of granularity in access control. In this work, we present a methodology for the empirical analysis of permission-based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

7
234
0
4

Year Published

2012
2012
2018
2018

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 377 publications
(245 citation statements)
references
References 8 publications
7
234
0
4
Order By: Relevance
“…Others who have looked at Android permissions have attempted to cluster applications that require similar permissions to simplify the current scheme [3] or have attempted a comparison of modern smartphone permission systems [1]. Their work finds that Android permissions provide the most information to users (compared to other modern smartphone OSs such as Symbian, Windows Phone 7, and iOS), however our interviews show that much of the information provided is not understood.…”
Section: Related Workmentioning
confidence: 84%
“…Others who have looked at Android permissions have attempted to cluster applications that require similar permissions to simplify the current scheme [3] or have attempted a comparison of modern smartphone permission systems [1]. Their work finds that Android permissions provide the most information to users (compared to other modern smartphone OSs such as Symbian, Windows Phone 7, and iOS), however our interviews show that much of the information provided is not understood.…”
Section: Related Workmentioning
confidence: 84%
“…With regards to state-of-the-art literature tackled in this work, a significant number of Machine Learning approaches for malware detection [6,29,[36][37][38][39] have been presented to the research community. The feature set that we use in this paper was evaluated in [23] and achieved better performance than those approaches.…”
Section: Related Workmentioning
confidence: 99%
“…There are several studies on how the permissions are used by Android apps. In [13], Barrera et al did an empirical analysis of the permission-based security models by analyzing 1,100 most popular Android apps using the Self-Organizing Map (SOM) algorithm. They found that among the defined permissions only a small portion of them are actively used by developers.…”
Section: Related Workmentioning
confidence: 99%