“…Users of mobile OSs can utilize the permission mechanism to fine-tune the available resources on a perapplication basis. In the security research community, many studies have been conducted on permission mechanisms in mobile OSs, including large-scale measurements [4], [5], [6], user perception [7], [8], [9], [10], unauthorized privilege acquisition [11], [12], and the proposals of new permission mechanisms [13], [14], [15], [16]. While mobile OS permission mechanisms have been studied by many researchers, to the best of our knowledge, no studies have systematically analyzed the permission mechanisms of web browsers.…”