Papilio: Visualizing Android Application Permissions

被引:9
|
作者
Loorak, M. Hosseinkhani [1 ]
Fong, P. W. L. [1 ]
Carpendale, S. [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
CONCEPT LATTICES; INFORMATION; SYSTEM;
D O I
10.1111/cgf.12395
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce Papilio, a new visualization technique for visualizing permissions of real-world Android applications. We explore the development of layouts that exploit the directed acyclic nature of Android application permission data to develop a new explicit layout technique that incorporates aspects of set membership, node-link diagrams and matrix layouts. By grouping applications based on sets of requested permissions, a structure can be formed with partially ordered relations. The Papilio layout shows sets of applications centrally, the relations among applications on one side and application permissions, as the reason behind the existence of the partial order, on the other side. Using Papilio to explore a set of Android applications as a case study has led to new security findings regarding permission usage by Android applications.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 50 条
  • [1] Privacy issues of android application permissions: A literature review
    Shrivastava, Gulshan
    Kumar, Prabhat
    Gupta, Deepak
    Rodrigues, Joel J. P. C.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12):
  • [2] Attention: there is an inconsistency between android permissions and application metadata!
    Huseyin Alecakir
    Burcu Can
    Sevil Sen
    International Journal of Information Security, 2021, 20 : 797 - 815
  • [3] Attention: there is an inconsistency between android permissions and application metadata!
    Alecakir, Huseyin
    Can, Burcu
    Sen, Sevil
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 797 - 815
  • [4] Android Permissions Unleashed
    Armando, Alessandro
    Carbone, Roberto
    Costa, Gabriele
    Merlo, Alessio
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 320 - 333
  • [5] Flow Permissions for Android
    Holavanalli, Shashank
    Manuel, Don
    Nanjundaswamy, Vishwas
    Rosenberg, Brian
    Shen, Feng
    Ko, Steven Y.
    Ziarek, Lukasz
    2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 652 - 657
  • [6] Android Permissions Demystified
    Felt, Adrienne Porter
    Chin, Erika
    Hanna, Steve
    Song, Dawn
    Wagner, David
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 627 - 637
  • [7] Personal Information Classification on Aggregated Android Application's Permissions
    Onik, Md Mehedi Hassan
    Kim, Chul-Soo
    Lee, Nam-Yong
    Yang, Jinhong
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [8] Comparing Android App Permissions
    MacDuffie, Jason K.
    Morreale, Patricia A.
    DESIGN, USER EXPERIENCE, AND USABILITY: TECHNOLOGICAL CONTEXTS, PT III, 2016, 9748 : 57 - 64
  • [9] Leveraging application permissions and network traffic attributes for Android ransomware detection
    Jeremiah, Sekione Reward
    Chen, Haotian
    Gritzalis, Stefanos
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [10] Cybersecurity for Android Applications: Permissions in Android 5 and 6
    Moore, Scott R.
    Ge, Huangyi
    Li, Ninghui
    Proctor, Robert W.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2019, 35 (07) : 630 - 640