Papilio: Visualizing Android Application Permissions

被引:9
|
作者
Loorak, M. Hosseinkhani [1 ]
Fong, P. W. L. [1 ]
Carpendale, S. [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
CONCEPT LATTICES; INFORMATION; SYSTEM;
D O I
10.1111/cgf.12395
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce Papilio, a new visualization technique for visualizing permissions of real-world Android applications. We explore the development of layouts that exploit the directed acyclic nature of Android application permission data to develop a new explicit layout technique that incorporates aspects of set membership, node-link diagrams and matrix layouts. By grouping applications based on sets of requested permissions, a structure can be formed with partially ordered relations. The Papilio layout shows sets of applications centrally, the relations among applications on one side and application permissions, as the reason behind the existence of the partial order, on the other side. Using Papilio to explore a set of Android applications as a case study has led to new security findings regarding permission usage by Android applications.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 50 条
  • [21] Enforcing File System Permissions on Android External Storage Android File System Permissions (AFP) Prototype and ownCloud
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 949 - 954
  • [22] Android Permissions: Evolution, Attacks, and Best Practices
    Tuncay, Guliz Seray
    IEEE Security and Privacy, 2024, 22 (06): : 40 - 49
  • [23] Understanding and Granting Android Permissions: a User Survey
    Ramachandran, Selvakumar
    Dimitri, Andrea
    Galinium, Maulahikmah
    Tahir, Muhammad
    Ananth, Indirajith Viji
    Schunck, Christian H.
    Talamo, Maurizio
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [24] What Permissions Should This Android App Request?
    Bao, Lingfeng
    Lo, David
    Xia, Xin
    Li, Shanping
    2016 INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, TESTING AND EVOLUTION (SATE 2016), 2016, : 36 - 41
  • [25] Android Malicious Application Detection Based on Ontology Technology Integrated with Permissions and System Calls
    Chen, Da
    Zhang, Hongmei
    Zhang, Xiangli
    Wang, Demin
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 481 - 484
  • [26] Attacking Android Smartphone Systems without Permissions
    Kywe, Su Mon
    Li, Yingjiu
    Petal, Kunal
    Grace, Michael
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [27] Unravelling Security Issues of Runtime Permissions in Android
    Efthimios Alepis
    Constantinos Patsakis
    Journal of Hardware and Systems Security, 2019, 3 (1) : 45 - 63
  • [28] Investigating the Android Intents and Permissions for Malware detection
    Idrees, Fauzia
    Rajarajan, Muttukrishnan
    2014 IEEE 10TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2014, : 354 - 358
  • [29] An Automatically Verified Prototype of the Android Permissions System
    Cristia, Maximiliano
    De Luca, Guido
    Luna, Carlos
    JOURNAL OF AUTOMATED REASONING, 2023, 67 (02)
  • [30] Asking for (and about) Permissions Used by Android Apps
    Stevens, Ryan
    Ganz, Jonathan
    Filkov, Vladimir
    Devanbu, Premkumar
    Chen, Hao
    2013 10TH IEEE WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2013, : 31 - 40