An Investigation into Android Run-time Permissions from the End Users' Perspective

被引:23
|
作者
Scoccia, Gian Luca [1 ]
Ruberto, Stefano [1 ]
Malavolta, Ivano [2 ]
Autili, Marco [3 ]
Inverardi, Paola [3 ]
机构
[1] Gran Sasso Sci Inst, Laquila, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] Univ Aquila, Laquila, Italy
关键词
Android; Permissions; Apps; Opinion Mining; Review Analysis; Privacy; Security;
D O I
10.1145/3197231.3197236
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To protect the privacy of end users from intended or unintended malicious behaviour, the Android operating system provides a permissions-based security model that restricts access to privacy-relevant parts of the platform. Starting with Android 6, the permission system has been revamped, moving to a run-time model. Users are now prompted for confirmation when an app attempts to access a restricted part of the platform. We conducted a large-scale empirical study to investigate how end users perceive the new run-time permission system of Android, collecting and inspecting over 4.3 million user reviews about 5,572 apps published in the Google Play Store. Among them, we identified, classified, and analyzed 3,574 permission-related reviews, employing machine learning and Natural Language Processing techniques. Out of the permission-related reviews, we determined recurring points made by users about the new permission system and classified them into a taxonomy. Results of our analysis suggest that, even with the new system, permission-related issues are widespread, with 8% of collected apps having user reviews with negative comments about permissions. We identify a number of points for improvement in the Android run-time permission system, and provide recommendations for future research.
引用
收藏
页码:45 / 55
页数:11
相关论文
共 50 条
  • [21] RUN-TIME PARTIAL RECONFIGURATION SPEED INVESTIGATION AND ARCHITECTURAL DESIGN SPACE EXPLORATION
    Liu, Ming
    Kuehn, Wolfgang
    Lu, Zhonghai
    Jantsch, Axel
    [J]. FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2009, : 498 - +
  • [22] Investigation of feature run-time conflicts on goal model-based reuse
    Mustafa Berk Duran
    Gunter Mussbacher
    [J]. Information Systems Frontiers, 2016, 18 : 855 - 875
  • [23] Rule Systems for Run-time Monitoring: from EAGLE to RULER
    Barringer, Howard
    Rydeheard, David
    Havelund, Klaus
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (03) : 675 - 706
  • [24] Investigation of feature run-time conflicts on goal model-based reuse
    Duran, Mustafa Berk
    Mussbacher, Gunter
    [J]. INFORMATION SYSTEMS FRONTIERS, 2016, 18 (05) : 855 - 875
  • [25] PROTECTING INFRASTRUCTURE ASSETS FROM REAL-TIME AND RUN-TIME THREATS
    Jenkins, Jonathan
    Burmester, Mike
    [J]. CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 97 - 110
  • [26] SherLog: Error Diagnosis by Connecting Clues from Run-time Logs
    Yuan, Ding
    Mai, Haohui
    Xiong, Weiwei
    Tan, Lin
    Zhou, Yuanyuan
    Pasupathy, Shankar
    [J]. ASPLOS XV: FIFTEENTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2010, : 143 - 154
  • [27] Quality compost from the end users' perspective
    Block, D
    [J]. BIOCYCLE, 1999, 40 (11) : 56 - +
  • [28] Affine Parallelization of Loops with Run-Time Dependent Bounds from Binaries
    Kotha, Aparna
    Anand, Kapil
    Creech, Timothy
    ElWazeer, Khaled
    Smithson, Matthew
    Barua, Rajeev
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 8410 : 554 - 574
  • [29] SherLog: Error Diagnosis by Connecting Clues from Run-time Logs
    Yuan, Ding
    Mai, Haohui
    Xiong, Weiwei
    Tan, Lin
    Zhou, Yuanyuan
    Pasupathy, Shankar
    [J]. ACM SIGPLAN NOTICES, 2010, 45 (03) : 143 - 154
  • [30] MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence
    Liu, Chen
    Li, Bo
    Zhao, Jun
    Liu, Xudong
    Li, Chunpei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1951 - 1966