Detecting Wearable App Permission Mismatches: A Case Study on Android Wear

被引:4
|
作者
Mujahid, Suhaib [1 ]
机构
[1] Concordia Univ, Dept Comp Sci & Software Engn, Data Driven Anal Software DAS Lab, Montreal, PQ, Canada
来源
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING | 2017年
关键词
Android Wear; Permissions; Empirical Study; Wearable;
D O I
10.1145/3106237.3121279
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wearable devices are becoming increasingly popular. These wearable devices run what is known as wearable apps. Wearable apps are packaged with handheld apps, that must be installed on the accompanying handheld device (e.g., phone). Given that wearable apps are tightly coupled with the handheld apps, any wearable permission must also be requested in the handheld version of the app on the Android Wear platform. However, in some cases, the wearable apps may request permissions that do not exist in the handheld app, resulting in a permission mismatch, and causing the wearable app to error or crash. In this paper, we propose a technique to detect wear app permission mismatches. We perform a case study on 2,409 free Android Wear apps and find that 73 released wearable apps suffer from the permission mismatch problem.
引用
收藏
页码:1065 / 1067
页数:3
相关论文
共 50 条
  • [21] Detecting over-claim permissions and recognising dangerous permission in Android apps
    Shah, Monika
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 204 - 218
  • [22] Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories
    Namrud, Zakeya
    Kpodjedo, Segla
    Bali, Ahmed
    Talhi, Chamseddine
    IEEE ACCESS, 2022, 10 : 24240 - 24254
  • [23] Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories
    Namrud, Zakeya
    Kpodjedo, Segla
    Bali, Ahmed
    Talhi, Chamseddine
    IEEE Access, 2022, 10 : 24240 - 24254
  • [24] How much does a zero-permission Android app know about us?
    Dimitriadis, Antonios
    Drosatos, George
    Efraimidis, Pavlos S.
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [25] A Tale of Four Gates Privilege Escalation and Permission Bypasses on Android Through App Components
    Aldoseri, Abdulla
    Oswald, David
    Chiper, Robert
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 233 - 251
  • [26] ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph
    Yude BAI
    Sen CHEN
    Zhenchang XING
    Xiaohong LI
    ScienceChina(InformationSciences), 2023, 66 (09) : 115 - 133
  • [27] ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph
    Bai, Yude
    Chen, Sen
    Xing, Zhenchang
    Li, Xiaohong
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (09)
  • [28] ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph
    Yude Bai
    Sen Chen
    Zhenchang Xing
    Xiaohong Li
    Science China Information Sciences, 2023, 66
  • [29] Practical Static Analysis of Detecting Intent-based Permission Leakage in Android Application
    Wu, Songyang
    Zhang, Yong
    Jin, Bo
    Cao, Wei
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1953 - 1957
  • [30] Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach
    Tang, Junwei
    Li, Ruixuan
    Han, Hongmu
    Zhang, Heng
    Gu, Xiwu
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 706 - 713