A comprehensive analysis of the android permissions system
IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
… Finally, a discussion of the permission-based security … component of the Android security
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …
Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy
… We thus statically analyze the bytecode of the application to detect uses of an automatically
… do not use), we perform a reachability analysis of such statements. Starting from the method …
… do not use), we perform a reachability analysis of such statements. Starting from the method …
Android custom permissions demystified: A comprehensive security evaluation
… Various previous work studied the design of the permission-based security model. Barrera …
A methodology for empirical analysis of permission-based security models and its application …
A methodology for empirical analysis of permission-based security models and its application …
An empirical history of permission requests and mistakes in open source android apps
GL Scoccia, A Peruma, V Pujols… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
… and researchers from empirically studying and constructing a … a dataset of permission-based
changes and permission-issues … of apps in its catalog and for its use in prior research works […
changes and permission-issues … of apps in its catalog and for its use in prior research works […
… Application Permission Model with Risk Assess-Allow & Reassess-Revoke Approach: Assess-Allow & Reassess-Revoke (AARR) Android App-permission Model
M Tufail, FK Hamdani - International Journal of Information …, 2023 - journals.cfrit.com
… Android uses a permission-based model for applications that … approach is adopted in designing
such a secure Model … by a developer for an android application by employing the assess-…
such a secure Model … by a developer for an android application by employing the assess-…
Android custom permissions demystified: From privilege escalation to design shortcomings
… have been blocked, custom permission based attacks can still be … Therefore, we empirically
limited that a test case only can … design of the permission-based security model. Barrera et al. …
limited that a test case only can … design of the permission-based security model. Barrera et al. …
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
… is the use of state-of-the-art distributed word embedding models that … permission-based
malware detection, where informative features are required to describe the behaviour of an …
malware detection, where informative features are required to describe the behaviour of an …
Component‐based permission management of Android applications
J Fu, Y Zhou, X Wang - Software: Practice and Experience, 2019 - Wiley Online Library
… Android system checks an app's permission based on its UID, … complete mediation of
security-relevant methods based on … In this paper, our empirical studies verify that 3PL-apps are …
security-relevant methods based on … In this paper, our empirical studies verify that 3PL-apps are …
Puredroid: Permission usage and risk estimation for android applications
A Alshehri, P Marcinek, A Alzahrani… - Proceedings of the …, 2019 - dl.acm.org
… weight to each requested permission based on the permission threat … any empirical evaluation
and analysis of their proposed … model to evaluate the risk of permissions requested by an …
and analysis of their proposed … model to evaluate the risk of permissions requested by an …
ARANAC: a bring-your-own-permissions network access control methodology for android devices
JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
… Section III describes the overall operation of the permission-based … model adopted by
Android is a central part of the Android security model that governs the access of applications (…
Android is a central part of the Android security model that governs the access of applications (…