Detecting Wearable App Permission Mismatches: A Case Study on Android Wear

被引:4
|
作者
Mujahid, Suhaib [1 ]
机构
[1] Concordia Univ, Dept Comp Sci & Software Engn, Data Driven Anal Software DAS Lab, Montreal, PQ, Canada
来源
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING | 2017年
关键词
Android Wear; Permissions; Empirical Study; Wearable;
D O I
10.1145/3106237.3121279
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wearable devices are becoming increasingly popular. These wearable devices run what is known as wearable apps. Wearable apps are packaged with handheld apps, that must be installed on the accompanying handheld device (e.g., phone). Given that wearable apps are tightly coupled with the handheld apps, any wearable permission must also be requested in the handheld version of the app on the Android Wear platform. However, in some cases, the wearable apps may request permissions that do not exist in the handheld app, resulting in a permission mismatch, and causing the wearable app to error or crash. In this paper, we propose a technique to detect wear app permission mismatches. We perform a case study on 2,409 free Android Wear apps and find that 73 released wearable apps suffer from the permission mismatch problem.
引用
收藏
页码:1065 / 1067
页数:3
相关论文
共 50 条
  • [11] HifoCap: An Android App for Wearable Health Devices
    Cheon, Yoonsik
    Romero, Rodrigo
    Garcia, Javier
    ADVANCES IN DIGITAL TECHNOLOGIES, 2017, 295 : 178 - 192
  • [12] A Comprehensive Study of Permission Usage on Android
    Lu, Yemian
    Li, Qi
    Su, Purui
    Pan, Juan
    Yan, Jia
    Zhan, Pengyi
    Guo, Wei
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 64 - 79
  • [13] Permission-Educator: App for Educating Users About Android Permissions
    Mathur, Akshay
    Ewoldt, Ethan
    Niyaz, Quamar
    Javaid, Ahmad
    Yang, Xiaoli
    INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2021, 2022, 13184 : 361 - 371
  • [14] COVERT: Compositional Analysis of Android Inter-App Permission Leakage
    Bagheri, Hamid
    Sadeghi, Alireza
    Garcia, Joshua
    Malek, Sam
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2015, 41 (09) : 866 - 886
  • [15] Detecting Energy Leaks in Android App with POEM
    Ferrari, Alan
    Gallucci, Dario
    Puccinelli, Daniele
    Giordano, Silvia
    2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2015, : 421 - 426
  • [16] Permission-based Risk Signals for App Behaviour Characterization in Android Apps
    Olukoya, Oluwafemi
    Mackenzie, Lewis
    Omoronyia, Inah
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 183 - 192
  • [17] REAPER: Real-time App Analysis for Augmenting the Android Permission System
    Diamantaris, Michalis
    Papadopoulos, Elias P.
    Markatos, Evangelos P.
    Ioannidis, Sotiris
    Polakis, Jason
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 37 - 48
  • [18] MalDetector-Using Permission Combinations to Evaluate Malicious Features of Android App
    Guo, Chenkai
    Xu, Jing
    Liu, Lei
    Xu, Sihan
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 157 - 160
  • [19] Detecting Permission Crashes of Android Apps using Crawling and Revoke Operation Injections
    Liu, Chien-Hung
    Liu, Chen-Tzung
    Li, Hsiu-Hao
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW 2021), 2021, : 47 - 51
  • [20] Android Repository Mining for Detecting Publicly Accessible Functions Missing Permission Checks
    Nguyen, Hoang H.
    Jiang, Lingxiao
    Tho Quan
    2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2017, : 324 - 327