Analyzing Unnecessary Permissions Requested by Android Apps Based on Users’ Opinions

作者: Jina Kang , Daehyun Kim , Hyoungshick Kim , Jun Ho Huh

DOI: 10.1007/978-3-319-15087-1_6

关键词:

摘要: Many existing mobile apps request for unnecessary permissions knowing that users often ignore permission warning messages. We conducted an online user study to investigate how feel about being requested by both free and paid Android apps. Results show tend more compared Users also felt older (those are previously released have gone through several updates) than those newly released. Based on observation, we surmise many developers initially publish require a small set of (so not discouraged from installing app), gradually add their updates.

参考文章(11)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Joseph Bonneau, Mike Just, Greg Matthews, What's in a name? Evaluating statistical attacks on personal knowledge questions financial cryptography. pp. 98- 113 ,(2010) , 10.1007/978-3-642-14577-3_10
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan, Jin Teng, Stealthy video capturer Proceedings of the second ACM conference on Wireless network security - WiSec '09. pp. 69- 78 ,(2009) , 10.1145/1514274.1514285
Patrick Gage Kelley, Lorrie Faith Cranor, Norman Sadeh, Privacy as part of the app decision-making process human factors in computing systems. pp. 3393- 3402 ,(2013) , 10.1145/2470654.2466466
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Serge Egelman, Janice Tsai, Lorrie Faith Cranor, Alessandro Acquisti, Timing is everything?: the effects of timing and placement of online privacy indicators human factors in computing systems. pp. 319- 328 ,(2009) , 10.1145/1518701.1518752
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems Proceedings of the IEEE. ,vol. 63, pp. 1278- 1308 ,(1975) , 10.1109/PROC.1975.9939
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, David Wetherall, A Conundrum of Permissions: Installing Applications on an Android Smartphone Financial Cryptography and Data Security. pp. 68- 79 ,(2012) , 10.1007/978-3-642-34638-5_6
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779