android permissions - creating web pages in your...

42
Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps u Android Permissions C. Capps November 28, 2012 Charles Capps Android Permissions

Upload: hoangnhi

Post on 26-Aug-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android PermissionsC. Capps

November 28, 2012

Charles Capps Android Permissions

Page 2: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Contents

1 Overview of Permission System

2 User Understanding of Permissions

3 Developer overprivilege of appsAndroid Permissions Demystified

4 How to detect malicious apps using privilegesMining Permission Request PatternsVarious Approaches in Analyzing Android ApplicationsAndroid Permissions: A Perspective Combining Risks andBenefits

Charles Capps Android Permissions

Page 3: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Contents

1 Overview of Permission System

2 User Understanding of Permissions

3 Developer overprivilege of appsAndroid Permissions Demystified

4 How to detect malicious apps using privilegesMining Permission Request PatternsVarious Approaches in Analyzing Android ApplicationsAndroid Permissions: A Perspective Combining Risks andBenefits

Charles Capps Android Permissions

Page 4: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

What are Android Permissions?

I Apps statically request permissions in theAndroidManifest.xml file

I No support for dynamically granting apps permissions atrun-time.

I The user sees a dialog at install time, and can choose tocancel installing the app based on the requested permissions

I Relies on the user’s understanding of the various permissions

Charles Capps Android Permissions

Page 5: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Permission Categories

Permissions are organized into 3 categories:

I Normal - API calls that could annoy but not harm the user,e.g. SET WALLPAPER

I Dangerous - API calls that could be used to charge the usermoney or leak private information such asREAD CONTACTS

I Signature / System - ability to delete application packages,control backup. Only allowed by apps signed by themanufacturer.

Charles Capps Android Permissions

Page 6: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

According to Felt, et al. [4] the most commonly checkedpermissions by the Android API are the following (number ofmethods that check these permissions):

Charles Capps Android Permissions

Page 7: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Permission System

An app makes calls to the public API (and possibly hidden classesby using reflection.) This then communicates with a systemprocess running in a Dalvik Virtual Machine. Apps can includenative C code, but the native code can’t directly make API calls(need a Java wrapper.)

Diagram from Felt et al. [4].

Charles Capps Android Permissions

Page 8: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Permission System

I Since permissions are checked in the system process, behavioris undefined if an app attempts to use an unauthorizedpermission

I Might throw a SecurityException

I Might crash the app

I Prevent a broadcast from being sent or received

I Users can create custom permissions

Charles Capps Android Permissions

Page 9: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Contents

1 Overview of Permission System

2 User Understanding of Permissions

3 Developer overprivilege of appsAndroid Permissions Demystified

4 How to detect malicious apps using privilegesMining Permission Request PatternsVarious Approaches in Analyzing Android ApplicationsAndroid Permissions: A Perspective Combining Risks andBenefits

Charles Capps Android Permissions

Page 10: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Study by Felt, et al.

I Not too surprisingly, users generally click past permissionswarning without understanding them

I Study done by Felt et al. [5] from U.C. Berkeley, AndroidPermissions: User Attention, Comprehension, and Behavior

I Surveyed 308 Android users, and asked questions of 25 in alab environment.

I 17% paid attentions to permissions at install-time

I 42% were completely unaware of permissions

Charles Capps Android Permissions

Page 11: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Effective warnings

I In a paper by Baskar Sarma, et al. some guidelines for a goodwarning system are proposed

1. Simple semantic meaning for users and developers2. Triggered by a small percentage of apps3. Triggered by many malicious apps

I Current system triggers too many warnings (93% of free appshave “dangerous” permissions)

Charles Capps Android Permissions

Page 12: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Contents

1 Overview of Permission System

2 User Understanding of Permissions

3 Developer overprivilege of appsAndroid Permissions Demystified

4 How to detect malicious apps using privilegesMining Permission Request PatternsVarious Approaches in Analyzing Android ApplicationsAndroid Permissions: A Perspective Combining Risks andBenefits

Charles Capps Android Permissions

Page 13: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Consequences of Overprivilege

I Overprivilege conditions users to accept unnecessary privileges

I Violates principle of least privilege

I Make applications more vulnerable

I More difficult to detect malicious apps with unusualpermission patterns

Charles Capps Android Permissions

Page 14: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions Demystified

Android Permissions Demystified

I Android Permissions Demystified [4]I Experimentally determine which API calls require what

permissionsI Include private classes that developers can call using reflection

I Statically analyze Android APK files to detect overprivilegedapps

Charles Capps Android Permissions

Page 15: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions Demystified

Randoop

I First, they used Randoop to try calling all possible methodsfrom a list of classes

I Modified Android kernel to log all permission checks

I Pool of input sequences, initially just primitive valuesI Difficulty: generate correct input so that an exception is not

thrownI Exception may prevent permission checks from being

performed

I Difficult to get instance of every input type, seed pool ofinputs with common values obtained from API

I e.g. android.content.Context.getSystemService(“wifi”)

Charles Capps Android Permissions

Page 16: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions Demystified

Results

I 85% coverage of API methods

I 1,259 API calls check permissions

I The API documentation only lists 78 (more at the top ofclasses, but very unclear)

I 6 methods are documented incorrectly

Charles Capps Android Permissions

Page 17: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions Demystified

Stowaway

I Statically analyze an app, determine set of requiredpermissions

I Examine methods that are invoked, directly or throughreflection

I Many challenges, e.g. using a WebView requires theINTERNET permissions

I android-permissions.org

Charles Capps Android Permissions

Page 18: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions Demystified

Results

I 35.8% of applications are overprivileged

I 56% of overprivileged applications use 1 extra permissions

I 94% use 4 or fewer extra permissions

I Most common unnecessary privileges:

Charles Capps Android Permissions

Page 19: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Contents

1 Overview of Permission System

2 User Understanding of Permissions

3 Developer overprivilege of appsAndroid Permissions Demystified

4 How to detect malicious apps using privilegesMining Permission Request PatternsVarious Approaches in Analyzing Android ApplicationsAndroid Permissions: A Perspective Combining Risks andBenefits

Charles Capps Android Permissions

Page 20: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Permission Patterns

I Mining Permission Request Patterns from Android andFacebook Applications

I Paper by Mario Frank, et al. at U.C. Berkeley, rigorousstatistical analysis of permission patterns [1]

I Android and Facebook permission patterns

I Determine riskiness of an app based solely on permissions used

Charles Capps Android Permissions

Page 21: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Permission Patterns

I Statistically find permission patterns used by high reputationapps

I Whitelist apps with ordinary patterns, warn users aboutunusual patterns

I Used 188,389 apps for analysis

I Web-crawled the web version of the Android market, parsedHTML to get permissions used, number of ratings, averagerating, cost, etc.

Charles Capps Android Permissions

Page 22: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Most commonly requested permissions

15 most requested Android permissions (Mario Frank, et al.) [1]

Charles Capps Android Permissions

Page 23: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Boolean Matrix Factorization

I Goal: find statistically significant permission request patterns

I Input: binary matrix x where xid = 1 means app i requestspermission d .

I Output: number of statistically significant patterns, K

I Matrix z — the permission patterns in each app

I Matrix u — the statistically significant permission requestpatterns

Charles Capps Android Permissions

Page 24: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Boolean Matrix Factorization

I Define boolean product c = a⊗ b of 2 matrices by:

I cid =∨K

k=1(aik ∧ bkd)

I Want to find z,u such that x ≈ z⊗ u

I If app i has pattern k and pattern k has permission d , thenapp i has permission d

Charles Capps Android Permissions

Page 25: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

Results

I They trained this model on high reputation apps (averagerating of 4 or higher, at least 100 user ratings)

I K = 30 significant permission patterns

I Note that Permission Request Patterns are not disjoint: appscan request multiple patterns (subsets of its permissions.)

I A PRP with 1 permission indicates that a permission isrequested a lot, but not always together with the samepermissions

Charles Capps Android Permissions

Page 26: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

More results

Most common permission request patterns:

Charles Capps Android Permissions

Page 27: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Mining Permission Request Patterns

More results

I If an app has a permission request pattern that is not amongthese whitelisted patterns, then it is risky

I Can be used to predict likely reputation of new apps

I Good for detecting risky or buggy apps, but not a malwaredetector

I Did not analyze categories of apps in Google Play store

Charles Capps Android Permissions

Page 28: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Various Approaches in Analyzing Android Applications

Network Visualization

I Various Approaches in Analyzing Android Applications with itsPermission-Based Security Models

I Paper by Ittipon Rassameeroj and Yuzuru Tanahashi (U.C.Davis) [2]

I Visualizing related permissions per-category

I Create a network visualization based on permission data

Charles Capps Android Permissions

Page 29: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Various Approaches in Analyzing Android Applications

Network Visualization

I Dataset 1: Adjacency matrix of permission concurrenceI Mij = no. of apps where permission i and permission j are

both requested

I Dataset 2: Adjacency matrix of distance between appsI Represent permissions of an app as a bit-vectorI Distance between 2 apps is the Euclidean distanceI Adjacency matrix of the resulting graph

Charles Capps Android Permissions

Page 30: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Various Approaches in Analyzing Android Applications

Concurrent Permissions over All Apps

I Roughly divides permissions into large functional categories

Charles Capps Android Permissions

Page 31: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Various Approaches in Analyzing Android Applications

APK Network

I Network of similar apps in Travel category

Charles Capps Android Permissions

Page 32: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Various Approaches in Analyzing Android Applications

Results

I Suggests a method for manually finding suspicious apps

I For example, a tipping program that appears in the cluster forapps related to checking exchange rates

I Likely overprivileged or malicious

I Rank clusters by dangerous combinations of permissions

Charles Capps Android Permissions

Page 33: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Risk Signals

I Android Permissions: A Perspective Combining Risks andBenefits

I Explore various techniques for giving a warning to the user

I Minimize warnings while maximizing detection of malware

I By category and sub-category

Charles Capps Android Permissions

Page 34: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Risk Signals

I Choose 26 critical permissions, a subset of the “dangerous”permissions

I Category-based rare critical permission signal (CRCP)

I CRCP(θ) means an app uses a permission that is used by lessthan θ percent of the apps in the same category (theta can bean arbitrary threshold, not just percentage of apps)

I Allow user to select category for app other than its assignedcategory for purpose of checking if signal is raised

I Tell user what percent of apps in the category trigger signalfor any permission

Charles Capps Android Permissions

Page 35: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Rare Pairs of Critical Permissions

I A pair of permissions triggers RPCP(y) if:

I The individual permission’s frequency is greater than y, butthe frequency of the 2 permissions together is below y

I i.e. the permissions are relatively common, but they are notseen together frequently

I Trigger warning if RPCP(y) ≥ θ

Charles Capps Android Permissions

Page 36: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Results

Charles Capps Android Permissions

Page 37: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

I The SVM performed the best

I However, trained only on specific set of apps

I Linear combination of RPCP (pair-wise) and RCP (all apps)performed second-best

I CRCP (by category) performed better than RCP

Charles Capps Android Permissions

Page 38: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Frank, M. and Dong, B. et al. 2012Mining Permission Request Patterns from Android andFacebook Applications. arxiv.org, submitted 8 October2012.

Rassameeroj, I. and Tanahashi, Y. 2011Various Approaches in Analyzing Android Applications with itsPermission-Based Security Models. IEEE InternationalConference on Electro/Information Technology.

Sarma, B. and Li, N. et al. 2012Android Permissions: A Perspective Combining Risks andBenefits. SACMAT ’12: Proceedings of the 17th ACMsymposium on Access Control Models and Technologies

Felt, A. and Chin, E. et al. 2011

Charles Capps Android Permissions

Page 39: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Android Permissions Demystified. CCS ’11: Proceedings of the18th ACM conference on Computer and communicationssecurity

Felt, A. and Ha, E. et al.Android Permissions: User Attention, Comprehension, andBehavior. Symposium on Usable Privacy and Security(SOUPS) 2012, July 11-13

Chia, P., Yamamoto, Y., and Asokan, N.Is this App Safe? A Large Scale Study on ApplicationPermissions and Risk Signals. International World Wide WebConference April 16-20 2012.

Bartel, A. and Klein, J. et al. 2012Automatically Securing Permission-Based Software byReducing the Attack Surface: An Application to Android. ASE2012 Proceedings of the 27th IEEE/ACM InternationalConference on Automated Software Engineering Pages 274-277

Charles Capps Android Permissions

Page 40: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Sarma, Baskar et al. 2012.Android Permissions: A Perspective Combining Risks andBenefits. SACMAT ’12: Proceedings of the 17th ACMsymposium on Access Control Models and Technologies

Yang, N. and Boushehrinejadmoradi, N et al. 2012Enhancing Users Comprehension of Android Permissions.SPSM ’12: Proceedings of the second ACM workshop onSecurity and privacy in smartphones and mobile devices

Mann, C. and Starostin, A. 2012A Framework for Static Detection of Privacy Leaks in AndroidApplications. SAC ’12: Proceedings of the 27th Annual ACMSymposium on Applied Computing

Grace, M. and Zhao, Y. et al. 2012

Charles Capps Android Permissions

Page 41: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

RiskRanker: Scalable and Accurate Zero-day Android MalwareDetection. MobiSys ’12: Proceedings of the 10th internationalconference on Mobile systems, applications, and services

Kelley, Patrick et al. 2012. A conundrum of permissions:Installing applications on an Android smartphone. UbiComp’12: Proceedings of the 2012 ACM Conference on UbiquitousComputing

Gold, Steve. 2012Android: A Secure Future at Last?. Engineering & TechnologyMagazine, March 2012.

Shabtai, Asaf., Fledel, Yuval et al. 2010Google Android: A Comprehensive Security Assessment.Security & Privacy, IEEE. March-April 2010

Pieterse, Heloise and Olivier, Martin. 2012.

Charles Capps Android Permissions

Page 42: Android Permissions - Creating Web Pages in your …web.cecs.pdx.edu/~apt/cs491/capps_presentation.pdf · Charles Capps Android Permissions. Overview of Permission SystemUser Understanding

Overview of Permission System User Understanding of Permissions Developer overprivilege of apps How to detect malicious apps using privileges

Android Permissions: A Perspective Combining Risks and Benefits

Android Botnets on the Rise: Trends and Characteristics.Information Security for South Africa (ISSA), 2012

Wikipedia Article. Google Play

Charles Capps Android Permissions