Proceedings of the 18th ACM Conference on Computer and Communications Security 2011
DOI: 10.1145/2046707.2046779
|View full text |Cite
|
Sign up to set email alerts
|

Android permissions demystified

Abstract: Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy-and security-relevant parts of the API is controlled with an install-time application permission system. We study Android applications to determine whether Android developers follow least privilege with their permission requests. We built Stowaway, a tool that detects overprivilege in compiled Android applications. Stowaway determines the set of API calls that an ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

10
654
1
6

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,034 publications
(671 citation statements)
references
References 12 publications
10
654
1
6
Order By: Relevance
“…Felt et al, in their Android Permissions Demystified work, attempt to further explain permissions to developers [5]. However, neither of these papers explore end-users understanding of permissions.…”
Section: Related Workmentioning
confidence: 99%
“…Felt et al, in their Android Permissions Demystified work, attempt to further explain permissions to developers [5]. However, neither of these papers explore end-users understanding of permissions.…”
Section: Related Workmentioning
confidence: 99%
“…They also built a tool called Stowaway that can detect whether a compiled Android app requests more permissions than necessary, i.e. overprivileged [18]. Among the apps they investigated, about one-third were actually overprivileged.…”
Section: Related Workmentioning
confidence: 99%
“…We randomly selected 50 popular apps from both the third party Android market, mumayi, and Google Play. We used the Stowaway [18] to detect unnecessary permissions in each app. Table 1 shows the statistics of the collected apps due to the overprivilege problem.…”
Section: Overprivilege Problemmentioning
confidence: 99%
“…For an application to access other components of the system it must require, and be granted, the corresponding access permission. The sandbox mechanism is implemented at kernel level and relies on the correct application of a Mandatory Access Control policy which is enforced by a reference monitor using a user identifier (UID) [30] assigned to each installed application. Interaction among applications is achieved through Inter Process Communication (IPC) mechanisms [14].…”
Section: Introductionmentioning
confidence: 99%