作者
David Barrera, Hilmi Günes Kayacik, Paul C van Oorschot, Anil Somayaji
发表日期
2010/10/4
研讨会论文
ACM CCS 2010: Conf. on Computer and Communications Security
页码范围
73-84
出版商
ACM
简介
Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of granularity in access control. In this work, we present a methodology for the empirical analysis of permission-based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android applications as a case study. Our methodology is of independent interest for visualization of permission-based systems beyond our present Android-specific empirical analysis. We offer some discussion identifying potential points of improvement for the Android permission model attempting to increase expressiveness where needed without increasing the total number of permissions or overall complexity.
引用总数
200920102011201220132014201520162017201820192020202120222023202423246075929780695847362224149
学术搜索中的文章
D Barrera, HG Kayacik, PC Van Oorschot, A Somayaji - Proceedings of the 17th ACM conference on Computer …, 2010