Android and Facebook provide third-party applications with access to users ’ private data and the ability to perform potentially sensitive operations (e.g., post to a user’s wall or place phone calls). As a security measure, these platforms restrict applications’ privileges with permission systems: users must approve the permissions requested by applications before the applications can make privacy- or security-relevant API calls. However, recent studies have shown that users often do not understand permission re-quests and lack a notion of typicality of requests. As a first step towards simplifying permission systems, we cluster a corpus of 188,389 Android applications and 27,029 Face-book applications to find patterns in permission reques...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Understanding the purpose of why sensitive data is used could help improve privacy as well as enable...
Smartphone apps today request permission to access a mul-titude of sensitive resources, which users ...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
An Android application uses a permission system to regulate the access to system resources and users...
This thesis investigates the permissions requested by Android applications, and the possibility of i...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
To protect the privacy of end users from intended or unintended malicious behaviour, the Android ope...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Developers continuously update their Android apps to keep up with competitors in the market. Such co...
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the ...
We instrumented the Android platform to collect data re-garding how often and under what circumstanc...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Understanding the purpose of why sensitive data is used could help improve privacy as well as enable...
Smartphone apps today request permission to access a mul-titude of sensitive resources, which users ...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
An Android application uses a permission system to regulate the access to system resources and users...
This thesis investigates the permissions requested by Android applications, and the possibility of i...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
To protect the privacy of end users from intended or unintended malicious behaviour, the Android ope...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
Android security is built upon a permission-based mechanism, which restricts access of third-party A...
Developers continuously update their Android apps to keep up with competitors in the market. Such co...
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the ...
We instrumented the Android platform to collect data re-garding how often and under what circumstanc...
The continuously increasing amount of data input on mobile devices has made collating and monitoring...
Understanding the purpose of why sensitive data is used could help improve privacy as well as enable...
Smartphone apps today request permission to access a mul-titude of sensitive resources, which users ...