2018
DOI: 10.1080/10447318.2018.1489580
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity for Android Applications: Permissions in Android 5 and 6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…are not expected to actively search for potential threats. Fortunately, the Android system changed permission requests when it updated from version five ("lollipop") to version six ("marshmallow") in both presentation and allowance (Moore, Ge, Li, & Proctor, 2019). Whereas the fifth version required users to allow apps to access all permissions, version six allowed users to choose which permissions were accessed.…”
Section: Importance Of Risk Communication For Mobile Applicationsmentioning
confidence: 99%
“…are not expected to actively search for potential threats. Fortunately, the Android system changed permission requests when it updated from version five ("lollipop") to version six ("marshmallow") in both presentation and allowance (Moore, Ge, Li, & Proctor, 2019). Whereas the fifth version required users to allow apps to access all permissions, version six allowed users to choose which permissions were accessed.…”
Section: Importance Of Risk Communication For Mobile Applicationsmentioning
confidence: 99%
“…As classification helps to differentiate attack surfaces and prepare accordingly [64], studies [7,9,10,17,65] have already analyzed app permissions for privacy threat modeling [66][67][68]. A study [69] states five ways of privacy breaching through the app permission system.…”
Section: Android Application Permission Associated Privacy Riskmentioning
confidence: 99%
“…Usually, apps collect user consent to access sensitive personal data in lieu of app usage. However, identity profiling by app producing companies via 'app permissions' is nothing new [7,9,17,18], rather personal data collected via app permissions' permissions' are frequently breaching user's PII [14,19]. As today's mobile device are facilitated with advanced sensors, apps are allowed to collect diverse personal data [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, inclines in the approach can be easily integrated to improve the consistency of quality and sufficiency. To examine the relative usefulness of the two permissions interfaces was presented in the study [2]. People were recruited through Amazon Mechanical Turk for online research.…”
Section: Introductionmentioning
confidence: 99%