On mobile operating systems, apps may access resources that are not be needed for their primary functionality. Which are the resources an app actually needs for its core functionality? And what happens if we deny access to other resources? Using a test generator for user interaction, we systematically explore app behavior under varied resource constraints and determine the impact of access restrictions, yielding a minimal set of required privileges for each app and functionality. In our proof of concept on Android apps, our TIARA prototype could block up to 69% of resource accesses while retaining all previously explored functionality
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and priva...
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly any interactive...
We instrumented the Android platform to collect data re-garding how often and under what circumstanc...
Since Android apps receive white-card access through permissions, users struggle to understand the a...
Current resource policies for mobile phone apps are based on permissions that unconditionally grant...
Smartphones play irreplaceable role in our daily life. When users enjoy the functions, convenience, ...
Android's app ecosystem relies heavily on third-party libraries as they facilitate code development ...
Today's phone could be described as a charismatic tool that has the ability to keep human beings cap...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Millions of apps available to smartphone owners request various permissions to resources on the devi...
We analyze the data collection strategies of 65,000 developers in the market for mobile applications...
Many smartphone apps collect personal information used for a va-riety of purposes. Users, however, a...
Mobile apps frequently request access to sensitive data, such as location and contacts. Understandin...
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and priva...
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly any interactive...
We instrumented the Android platform to collect data re-garding how often and under what circumstanc...
Since Android apps receive white-card access through permissions, users struggle to understand the a...
Current resource policies for mobile phone apps are based on permissions that unconditionally grant...
Smartphones play irreplaceable role in our daily life. When users enjoy the functions, convenience, ...
Android's app ecosystem relies heavily on third-party libraries as they facilitate code development ...
Today's phone could be described as a charismatic tool that has the ability to keep human beings cap...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Millions of apps available to smartphone owners request various permissions to resources on the devi...
We analyze the data collection strategies of 65,000 developers in the market for mobile applications...
Many smartphone apps collect personal information used for a va-riety of purposes. Users, however, a...
Mobile apps frequently request access to sensitive data, such as location and contacts. Understandin...
Android's permission model is used to regulate access to the Application Program Interfaces (APIs) w...
Modern smartphone platforms implement permission-based models to protect access to sensitive data an...
© 2018 Elsevier Ltd The advent of the sixth Android version brought a significant security and priva...