An Investigation into Android Run-time Permissions from the End Users' Perspective

被引:23
|
作者
Scoccia, Gian Luca [1 ]
Ruberto, Stefano [1 ]
Malavolta, Ivano [2 ]
Autili, Marco [3 ]
Inverardi, Paola [3 ]
机构
[1] Gran Sasso Sci Inst, Laquila, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] Univ Aquila, Laquila, Italy
关键词
Android; Permissions; Apps; Opinion Mining; Review Analysis; Privacy; Security;
D O I
10.1145/3197231.3197236
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To protect the privacy of end users from intended or unintended malicious behaviour, the Android operating system provides a permissions-based security model that restricts access to privacy-relevant parts of the platform. Starting with Android 6, the permission system has been revamped, moving to a run-time model. Users are now prompted for confirmation when an app attempts to access a restricted part of the platform. We conducted a large-scale empirical study to investigate how end users perceive the new run-time permission system of Android, collecting and inspecting over 4.3 million user reviews about 5,572 apps published in the Google Play Store. Among them, we identified, classified, and analyzed 3,574 permission-related reviews, employing machine learning and Natural Language Processing techniques. Out of the permission-related reviews, we determined recurring points made by users about the new permission system and classified them into a taxonomy. Results of our analysis suggest that, even with the new system, permission-related issues are widespread, with 8% of collected apps having user reviews with negative comments about permissions. We identify a number of points for improvement in the Android run-time permission system, and provide recommendations for future research.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [1] Studying users' adaptation to Android's run-time fine-grained access control system
    Andriotis, Panagiotis
    Stringhini, Gianluca
    Sasse, Martina Angela
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 31 - 43
  • [2] Hybrid specifications: looking at workflows from a run-time perspective
    Desel, J
    Erwin, T
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2000, 15 (05): : 291 - 302
  • [3] SMALL BATTERIES WILL ALERT USERS TO REMAINING RUN-TIME
    CHIN, S
    [J]. ELECTRONIC PRODUCTS MAGAZINE, 1994, 37 (01): : 17 - 18
  • [4] Raindroid - A System for Run-time Mitigation of Android Intent Vulnerabilities
    Schmerl, Bradley
    Gennari, Jeffrey
    Camara, Javier
    Garlan, David
    [J]. SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 115 - 117
  • [5] Model-Based Run-Time Checking of Security Permissions Using Guarded Objects
    Jurjens, Jan
    [J]. RUNTIME VERIFICATION, 2008, 5289 : 36 - 50
  • [6] Run-time cohesion metrics: An empirical investigation
    Mitchell, A
    Power, JF
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 532 - 537
  • [7] Meeting IoT Users' Preferences by Emerging Behavior at Run-Time
    Flores-Martin, Daniel
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS, 2018, 10797 : 333 - 338
  • [8] Android Run-time Permission Exploitation User Awareness by Means of Formal Methods
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 804 - 814
  • [9] A study of run-time behavioral evolution of benign versus malicious apps in android
    Cai, Haipeng
    Fu, Xiaoqin
    Hamou-Lhadj, Abdelwahab
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 122
  • [10] How does Migrating to Kotlin Impact the Run-time Efficiency of Android Apps?
    Peters, Michael
    Scoccia, Gian Luca
    Malavolta, Ivano
    [J]. IEEE 21ST INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2021), 2021, : 36 - 46