Detecting Wearable App Permission Mismatches: A Case Study on Android Wear

被引:4
|
作者
Mujahid, Suhaib [1 ]
机构
[1] Concordia Univ, Dept Comp Sci & Software Engn, Data Driven Anal Software DAS Lab, Montreal, PQ, Canada
来源
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING | 2017年
关键词
Android Wear; Permissions; Empirical Study; Wearable;
D O I
10.1145/3106237.3121279
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wearable devices are becoming increasingly popular. These wearable devices run what is known as wearable apps. Wearable apps are packaged with handheld apps, that must be installed on the accompanying handheld device (e.g., phone). Given that wearable apps are tightly coupled with the handheld apps, any wearable permission must also be requested in the handheld version of the app on the Android Wear platform. However, in some cases, the wearable apps may request permissions that do not exist in the handheld app, resulting in a permission mismatch, and causing the wearable app to error or crash. In this paper, we propose a technique to detect wear app permission mismatches. We perform a case study on 2,409 free Android Wear apps and find that 73 released wearable apps suffer from the permission mismatch problem.
引用
收藏
页码:1065 / 1067
页数:3
相关论文
共 50 条
  • [1] Android App Permission and Users' Adoption: A Case Study of Mental Health Application
    Huang, Hsiao-Ying
    Bashir, Masooda
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 110 - 122
  • [2] Detecting and Defending against Inter-App Permission Leaks in Android Apps
    He, Yi
    Li, Qi
    2016 IEEE 35TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2016,
  • [3] DETECTING MALWARE AND EVALUATING RISK OF APP USING ANDROID PERMISSION-API SYSTEM
    Zeng, Huan
    Ren, Yan
    Wang, Qing-Xian
    He, Neng-Qiang
    Ding, Xu-Yang
    2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, : 440 - 443
  • [4] Is the data on your wearable device secure? An Android Wear smartwatch case study
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (03): : 391 - 403
  • [5] Detecting Stubborn Permission Requests in Android Applications
    Huang, Jianmeng
    Huang, Wenchao
    Miao, Fuyou
    Xiong, Yan
    2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018), 2018, : 84 - 89
  • [6] Studying Permission Related Issues in Android Wearable Apps
    Mujahid, Suhaib
    Abdalkareem, Rabe
    Shihab, Emad
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 345 - 356
  • [7] Android App Classification and Permission Usage Risk Assessment
    Shen, Yidong
    Xu, Ming
    Zheng, Ning
    Xu, Jian
    Xia, Wenjing
    Wu, Yiming
    Qiao, Tong
    Yang, Tao
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 567 - 577
  • [8] Mining Android App Descriptions for Permission Requirements Recommendation
    Liu, Xueqing
    Leng, Yue
    Yang, Wei
    Zhai, Chengxiang
    Xie, Tao
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 147 - 158
  • [9] Malevolent App Pairs: An Android Permission Overpassing Scheme
    Dimitriadis, Antonios
    Efraimidis, Pavlos S.
    Katos, Vasilios
    PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 431 - 436
  • [10] App „Permission Watcher“ für Android-Smartphones
    Helmut Reimer
    Datenschutz und Datensicherheit - DuD, 2012, 36 (3) : 218 - 218