Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012 IEEE Sixth International Conference on Software Security and Reliability Companion 2012
DOI: 10.1109/sere-c.2012.44
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Android Applications' Permissions

Abstract: Abstract-We developed an architecture that automatically searches for and downloads Android applications from the Android Market. Furthermore, we created a detailed mapping of Android application programming interface (API) calls to the required permission(s), if any, for each call. We then performed an analysis of 141,372 Android applications to determine if they have the appropriate set of permissions based on the static analysis of the APK bytecode of each application. Our findings indicate that the majorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 5 publications
0
23
0
Order By: Relevance
“…When the user confirms the access, the app will have the requested permissions at all times (until the app is uninstalled). If an application requests the resource without having the appropriate permission, then the Android OS may throw a Security Exception or simply not grant the requested resource [20]. These permission-protected resources are accessed through the Android API and other classes resident on the phone.…”
Section: A Permissions In Android Applicationmentioning
confidence: 99%
“…When the user confirms the access, the app will have the requested permissions at all times (until the app is uninstalled). If an application requests the resource without having the appropriate permission, then the Android OS may throw a Security Exception or simply not grant the requested resource [20]. These permission-protected resources are accessed through the Android API and other classes resident on the phone.…”
Section: A Permissions In Android Applicationmentioning
confidence: 99%
“…In [12], researchers downloaded mobile applications by crawling the Android Market; they used a statistical analysis on the byte-code level and matched the method calls in the Android API to the permissions in the manifest file. Although the study does not provide a userfocused security solution, it reveals which applications use too many or incomplete permissions.…”
Section: A2 Permission-based Solutionsmentioning
confidence: 99%
“…al. [16] proposed architecture for automatic downloading of android applications from the android market. Different algorithms employed for searching of applications such as downloading applications by application category.…”
Section: Permission-based Analysismentioning
confidence: 99%