A comprehensive analysis of the android permissions system

IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
… Finally, a discussion of the permission-based security … component of the Android security
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …

Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy

P Calciati, K Kuznetsov, A Gorla, A Zeller - Proceedings of the 17th …, 2020 - dl.acm.org
… We thus statically analyze the bytecode of the application to detect uses of an automatically
… do not use), we perform a reachability analysis of such statements. Starting from the method

Android custom permissions demystified: A comprehensive security evaluation

R Li, W Diao, Z Li, S Yang, S Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Various previous work studied the design of the permission-based security model. Barrera …
A methodology for empirical analysis of permission-based security models and its application

An empirical history of permission requests and mistakes in open source android apps

GL Scoccia, A Peruma, V Pujols… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
… and researchers from empirically studying and constructing a … a dataset of permission-based
changes and permission-issues … of apps in its catalog and for its use in prior research works […

… Application Permission Model with Risk Assess-Allow & Reassess-Revoke Approach: Assess-Allow & Reassess-Revoke (AARR) Android App-permission Model

M Tufail, FK Hamdani - International Journal of Information …, 2023 - journals.cfrit.com
… Android uses a permission-based model for applications that … approach is adopted in designing
such a secure Model … by a developer for an android application by employing the assess-…

Android custom permissions demystified: From privilege escalation to design shortcomings

R Li, W Diao, Z Li, J Du, S Guo - … IEEE Symposium on Security …, 2021 - ieeexplore.ieee.org
… have been blocked, custom permission based attacks can still be … Therefore, we empirically
limited that a test case only can … design of the permission-based security model. Barrera et al. …

Security-oriented view of app behaviour using textual descriptions and user-granted permission requests

O Olukoya, L Mackenzie, I Omoronyia - Computers & Security, 2020 - Elsevier
… is the use of state-of-the-art distributed word embedding models that … permission-based
malware detection, where informative features are required to describe the behaviour of an

Component‐based permission management of Android applications

J Fu, Y Zhou, X Wang - Software: Practice and Experience, 2019 - Wiley Online Library
… Android system checks an app's permission based on its UID, … complete mediation of
security-relevant methods based on … In this paper, our empirical studies verify that 3PL-apps are …

Puredroid: Permission usage and risk estimation for android applications

A Alshehri, P Marcinek, A Alzahrani… - Proceedings of the …, 2019 - dl.acm.org
… weight to each requested permission based on the permission threat … any empirical evaluation
and analysis of their proposed … model to evaluate the risk of permissions requested by an

ARANAC: a bring-your-own-permissions network access control methodology for android devices

JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
… Section III describes the overall operation of the permission-basedmodel adopted by
Android is a central part of the Android security model that governs the access of applications (…