2021
DOI: 10.48550/arxiv.2106.02483
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

You can't always get what you want: towards user-controlled privacy on Android

Davide Caputo,
Francesco Pagano,
Giovanni Bottino
et al.

Abstract: Mobile applications (hereafter, apps) collect a plethora of information regarding the user behavior and his device through third-party analytics libraries. However, the collection and usage of such data raised several privacy concerns, mainly because the end-user -i.e., the actual owner of the data -is out of the loop in this collection process. Also, the existing privacy-enhanced solutions that emerged in the last years follow an "all or nothing" approach, leaving the user the sole option to accept or complet… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 23 publications
(34 reference statements)
0
2
0
Order By: Relevance
“…Several studies have explored the introduction of fine controls over permissions at the framework, the middle layer, or the operating system-level using different strategies (Beresford et al, 2011;Zhou et al, 2011;Brutschy et al, 2015;Nauman et al, 2010;Jeon et al, 2012;Liu et al, 2016b;Caputo et al, 2021). Proposed techniques such as Mockdroid (Beresford et al, 2011), and TISSA (Zhou et al, 2011) facilitate users to control access whenever access to the resource is attempted by providing dummy information instead of the real one.…”
Section: Low-level Modificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies have explored the introduction of fine controls over permissions at the framework, the middle layer, or the operating system-level using different strategies (Beresford et al, 2011;Zhou et al, 2011;Brutschy et al, 2015;Nauman et al, 2010;Jeon et al, 2012;Liu et al, 2016b;Caputo et al, 2021). Proposed techniques such as Mockdroid (Beresford et al, 2011), and TISSA (Zhou et al, 2011) facilitate users to control access whenever access to the resource is attempted by providing dummy information instead of the real one.…”
Section: Low-level Modificationmentioning
confidence: 99%
“…FlaskDroid (Bugiel et al, 2013) on the other hand, provides compulsory access control on Android's middleware and kernel layers to avert unwanted information disclosure. Some recent solutions, such as (Caputo et al, 2021) focused on anonymization of data to preserve the privacy of the user. In (Qu et al, 2020), authors introduce an automatic permission management model, which collectively considers the risk of the permission, functionalities of the app, and user's privacy requirement.…”
Section: Low-level Modificationmentioning
confidence: 99%