Understanding the purpose of why sensitive data is used could help improve privacy as well as enable new kinds of access control. In this paper, we introduce a new technique for inferring the purpose of sensitive data usage in the context of Android smartphone apps. We extract multiple kinds of features from decompiled code, focusing on app-specific features and text-based features. These features are then used to train a machine learning classifier. We have evaluated our approach in the context of two sensitive permissions, namely ACCESS FINE LOCATION and READ CONTACT LIST, and achieved an accuracy of about 85% and 94% respectively in inferring purposes. We have also found that text-based features alone are highly effective in inferring pu...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Android applications or apps are taking the smart phones industry to a new level. Smart phone users ...
An Android application uses a permission system to regulate the access to system resources and users...
Mobile apps frequently request access to sensitive data, such as location and contacts. Understandin...
In this paper, we propose a novel automated approach to predict the potential privacy sensitive perm...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of ...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
Privacy has become a key concern for smartphone users as many apps tend to access and share sensitiv...
Abstract. Android applies a permission-based model to regulate applications (apps). When users grant...
Android and Facebook provide third-party applications with access to users ’ private data and the ab...
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive an...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Android applications or apps are taking the smart phones industry to a new level. Smart phone users ...
An Android application uses a permission system to regulate the access to system resources and users...
Mobile apps frequently request access to sensitive data, such as location and contacts. Understandin...
In this paper, we propose a novel automated approach to predict the potential privacy sensitive perm...
Several studies have examined Android apps’ use of permissions from a security point-of-view. Howeve...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to ru...
The Android Market is the official (and primary) storefor Android applications. The Market provides ...
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of ...
Current smartphone operating systems employ permission systems to regulate how apps access sensitive...
Click on the DOI link to access the article (may not be free).Permission mechanisms play a crucial r...
Privacy has become a key concern for smartphone users as many apps tend to access and share sensitiv...
Abstract. Android applies a permission-based model to regulate applications (apps). When users grant...
Android and Facebook provide third-party applications with access to users ’ private data and the ab...
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive an...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Android applications or apps are taking the smart phones industry to a new level. Smart phone users ...
An Android application uses a permission system to regulate the access to system resources and users...