2016
DOI: 10.5120/ijca2016911130
|View full text |Cite
|
Sign up to set email alerts
|

Effective Risk Analysis and Risk Detection for Android Apps

Abstract: The features and functionality of the different mobile devices has made them attractive targets for malicious applications. There are different types of risks are present in recent apps. Android's permission system is intended to inform users about the risks in installing apps. Whenever a user installs an application, he or she has the chance to review the application's permission requests and cancel the installation if the permissions are imprudent or unacceptable. Basically previous research focus on relianc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Additionally, obfuscating techniques may not be effective at protecting user privacy (Shokri et al, 2010), and denying access to certain permissions can render the app unusable. Therefore, a method for communicating risk at the point of sale is still needed to support risk-aware decision-making (Patil et al, 2016). Specifically, it is important to communicate the aggregate privacy risk arising from different sources like permission requests and data usage practices and communicate it to the user at the time of app selection.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, obfuscating techniques may not be effective at protecting user privacy (Shokri et al, 2010), and denying access to certain permissions can render the app unusable. Therefore, a method for communicating risk at the point of sale is still needed to support risk-aware decision-making (Patil et al, 2016). Specifically, it is important to communicate the aggregate privacy risk arising from different sources like permission requests and data usage practices and communicate it to the user at the time of app selection.…”
Section: Introductionmentioning
confidence: 99%