Users Comprehension and Behaviour Study on Android Permissions
DOI:
https://doi.org/10.31436/ijpcc.v2i2.29Abstract
The Android Market has become the main source of applications (apps) download for Android based devices. The majority of users trust that the apps that they downloaded are safe and trustworthy. However, it is not always the case since a large numbers of apps contain several unnecessary permissions that will potentially provide threats to the users’ privacy and security by stealing their important data, and also offer services that will cost money to the users. The main objective of this paper is to investigate the level of knowledge, understanding and behaviour of the users towards these permissions. The results obtained show that the awareness regarding these permissions among the users is still low and they need to be warned against the potential threats of these permissions to ensure that they can make a more informed decisions whether to install the apps or not.References
[1] http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/
[2] M. Butler, “Android: Changing the Mobile Landscapeâ€, Pervasive Computing, January-March 2011, pp. 4-7.
[3] A. Felt, E. Ha, S. Egelman, A. Hanet, E. Chin and D. Wagner, “Android permissions: User attention, comprehension and behaviourâ€, Technical Report No. UCB/EECS-2012-26, 2012. University of California at Berkeley.
[4] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, D. Wetherall, “A conundrum of permissions: Installing applications on an Android smartphoneâ€, LC 2012 Workshops, LNCS 7398, pp. 68-79, 2012.
[5] A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. “Android permissions demystifiedâ€. In CCS '11, pages 627-638, New York, NY, USA, 2011.
[6] R. Stevens, J. Ganz, V. Filkov, P. Devanbu and H. Chen, “Asking for (and about) permissions used by Android appsâ€, Mining Software Repositories (MSR) 2013, San Francisco, California, May 2013.
[7] T. Vidas, N. Christin and L. F. Cranor, “Curbing Android permission creepâ€, Proccedings of the 2011 Web 2.0 Security and Privacy Workshop. Oakland, California, May 2011.
[8] J.Kang, S.Seo, J.W.-K Hong, "Usage pattern analysis of smartphones," Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, Vol., no., pp.1-8, 21-23 Sept. 2011.
[9] N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, “Stealthy video capturer: a new video-based spyware in 3G smartphones.†Proceedings of the second ACM conference on Wireless network security (WiSec '09). ACM, New York, NY, USA, 69-78, 2009.
[10] J. Sellwood and J. Crampton, “Sleeping Android: The Danger of Dormant Permissionsâ€, SPSM’13, Berlin, Germany, 55-66, November 8, 2013.
[11] L. Kraus, I. Wechsung and S. Möller, “Using Statistical Information to Communicate Android Permission Risks to Usersâ€, 4th Workshop on Socio-Technical Aspects in Security and Trust, Vienna, Austria, 49-55, 2014.
[12] D. Bornstein, Dalvik vm internals (2008), http://goo.gl/knN9n (accessed May 25, 2016)
[13] C. Gibler, J. Crussell, J. Erickson and H. Chen, “AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scaleâ€, TRUST 2012, LNCS 7344, pp. 291-307, 2012.
[14] Android developer reference, http://d.android.com/ (accessed April 10, 2016)
[2] M. Butler, “Android: Changing the Mobile Landscapeâ€, Pervasive Computing, January-March 2011, pp. 4-7.
[3] A. Felt, E. Ha, S. Egelman, A. Hanet, E. Chin and D. Wagner, “Android permissions: User attention, comprehension and behaviourâ€, Technical Report No. UCB/EECS-2012-26, 2012. University of California at Berkeley.
[4] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, D. Wetherall, “A conundrum of permissions: Installing applications on an Android smartphoneâ€, LC 2012 Workshops, LNCS 7398, pp. 68-79, 2012.
[5] A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. “Android permissions demystifiedâ€. In CCS '11, pages 627-638, New York, NY, USA, 2011.
[6] R. Stevens, J. Ganz, V. Filkov, P. Devanbu and H. Chen, “Asking for (and about) permissions used by Android appsâ€, Mining Software Repositories (MSR) 2013, San Francisco, California, May 2013.
[7] T. Vidas, N. Christin and L. F. Cranor, “Curbing Android permission creepâ€, Proccedings of the 2011 Web 2.0 Security and Privacy Workshop. Oakland, California, May 2011.
[8] J.Kang, S.Seo, J.W.-K Hong, "Usage pattern analysis of smartphones," Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, Vol., no., pp.1-8, 21-23 Sept. 2011.
[9] N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, “Stealthy video capturer: a new video-based spyware in 3G smartphones.†Proceedings of the second ACM conference on Wireless network security (WiSec '09). ACM, New York, NY, USA, 69-78, 2009.
[10] J. Sellwood and J. Crampton, “Sleeping Android: The Danger of Dormant Permissionsâ€, SPSM’13, Berlin, Germany, 55-66, November 8, 2013.
[11] L. Kraus, I. Wechsung and S. Möller, “Using Statistical Information to Communicate Android Permission Risks to Usersâ€, 4th Workshop on Socio-Technical Aspects in Security and Trust, Vienna, Austria, 49-55, 2014.
[12] D. Bornstein, Dalvik vm internals (2008), http://goo.gl/knN9n (accessed May 25, 2016)
[13] C. Gibler, J. Crussell, J. Erickson and H. Chen, “AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scaleâ€, TRUST 2012, LNCS 7344, pp. 291-307, 2012.
[14] Android developer reference, http://d.android.com/ (accessed April 10, 2016)
Downloads
Published
27-10-2016
How to Cite
AWANG ABU BAKAR, N. S. (2016). Users Comprehension and Behaviour Study on Android Permissions. International Journal on Perceptive and Cognitive Computing, 2(2). https://doi.org/10.31436/ijpcc.v2i2.29
Issue
Section
Articles