Mining Permission Request Patterns from Android and Facebook Applications (extended author version)

10/08/2012
by   Mario Frank, et al.
0

Android and Facebook provide third-party applications with access to users' private data and the ability to perform potentially sensitive operations (e.g., post to a user's wall or place phone calls). As a security measure, these platforms restrict applications' privileges with permission systems: users must approve the permissions requested by applications before the applications can make privacy- or security-relevant API calls. However, recent studies have shown that users often do not understand permission requests and lack a notion of typicality of requests. As a first step towards simplifying permission systems, we cluster a corpus of 188,389 Android applications and 27,029 Facebook applications to find patterns in permission requests. Using a method for Boolean matrix factorization for finding overlapping clusters, we find that Facebook permission requests follow a clear structure that exhibits high stability when fitted with only five clusters, whereas Android applications demonstrate more complex permission requests. We also find that low-reputation applications often deviate from the permission request patterns that we identified for high-reputation applications suggesting that permission request patterns are indicative for user satisfaction or application quality.

READ FULL TEXT

page 9

page 10

research
02/14/2022

Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps

As data privacy continues to be a crucial human-right concern as recogni...
research
08/23/2022

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Android is a widely used operating system that employs a permission-base...
research
06/15/2021

ARTA: Collection and Classification of Ambiguous Requests and Thoughtful Actions

Human-assisting systems such as dialogue systems must take thoughtful, a...
research
07/31/2020

Using Context and Interactions to Verify User-Intended Network Requests

Client-side malware can attack users by tampering with applications or u...
research
07/18/2019

Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications

The actor model is popular for many types of server applications. Effici...
research
02/28/2021

They'll Know It When They See It: Analyzing Post-Release Feedback from the Android Community

It is known that user involvement and user-centered design enhance syste...
research
03/12/2021

On Satisfying the Android OS Community: User Feedback Still Central to Developers' Portfolios

End-users play an integral role in identifying requirements, validating ...

Please sign up or login with your details

Forgot password? Click here to reset