Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems 2015
DOI: 10.1145/2702123.2702370
|View full text |Cite
|
Sign up to set email alerts
|

Crowdsourced Exploration of Security Configurations

Abstract: Smartphone apps today request permission to access a multitude of sensitive resources, which users must accept completely during installation (e.g., on Android) or selectively configure after installation (e.g., on iOS, but also planned for Android). Everyday users, however, do not have the ability to make informed decisions about which permissions are essential for their usage. For enhanced privacy, we seek to leverage crowdsourcing to find minimal sets of permissions that will preserve the usability of the a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
24
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 31 publications
(26 citation statements)
references
References 14 publications
2
24
0
Order By: Relevance
“…We can see that whenever a node is less usable due to below-average usability, all of its successors in the upper levels are also less usable (with only one exception in Figure 4c). This validates the pruning strategy proposed in our prior study [24] for efficiently exploring the lattice and provides further support for H2. That is, whenever we find a less usable node, we stop exploring its successors above it in the lattice because they are also expected to be less usable.…”
Section: Versions With Below-average Usabilitysupporting
confidence: 83%
See 4 more Smart Citations
“…We can see that whenever a node is less usable due to below-average usability, all of its successors in the upper levels are also less usable (with only one exception in Figure 4c). This validates the pruning strategy proposed in our prior study [24] for efficiently exploring the lattice and provides further support for H2. That is, whenever we find a less usable node, we stop exploring its successors above it in the lattice because they are also expected to be less usable.…”
Section: Versions With Below-average Usabilitysupporting
confidence: 83%
“…Moreover, the first four rows of Table 1 show that for Instagram and Facebook Messenger, whenever the usability drops significantly, removing more permissions also results in significant drops in usability. The lattice relationship [24] holds, and we accept our hypothesis H2.…”
Section: How Usability Changes Through the Latticesupporting
confidence: 74%
See 3 more Smart Citations