A comprehensive analysis of the android permissions system

IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
… Finally, a discussion of the permission-based security … component of the Android security
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …

Android custom permissions demystified: A comprehensive security evaluation

R Li, W Diao, Z Li, S Yang, S Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Various previous work studied the design of the permission-based security model. Barrera …
A methodology for empirical analysis of permission-based security models and its application

Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy

P Calciati, K Kuznetsov, A Gorla, A Zeller - Proceedings of the 17th …, 2020 - dl.acm.org
… We thus statically analyze the bytecode of the application to detect uses of an automatically
… do not use), we perform a reachability analysis of such statements. Starting from the method

… Application Permission Model with Risk Assess-Allow & Reassess-Revoke Approach: Assess-Allow & Reassess-Revoke (AARR) Android App-permission Model

M Tufail, FK Hamdani - International Journal of Information …, 2023 - journals.cfrit.com
… Android uses a permission-based model for applications that … approach is adopted in designing
such a secure Model … by a developer for an android application by employing the assess-…

Android custom permissions demystified: From privilege escalation to design shortcomings

R Li, W Diao, Z Li, J Du, S Guo - … IEEE Symposium on Security …, 2021 - ieeexplore.ieee.org
… have been blocked, custom permission based attacks can still be … Therefore, we empirically
limited that a test case only can … design of the permission-based security model. Barrera et al. …

Security-oriented view of app behaviour using textual descriptions and user-granted permission requests

O Olukoya, L Mackenzie, I Omoronyia - Computers & Security, 2020 - Elsevier
… is the use of state-of-the-art distributed word embedding models that … permission-based
malware detection, where informative features are required to describe the behaviour of an

An empirical study on secure usage of mobile health apps: The attack simulation approach

B Aljedaani, A Ahmad, M Zahedi, MA Babar - Information and Software …, 2023 - Elsevier
… We use the term attack to refer to the social engineering attacks that aim to exploit human
vulnerabilities, as conducted in [14,33]. The term also include the threats, and the actions that …

HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods

A Mahindru, AL Sangal - The Journal of Supercomputing, 2021 - Springer
… Android apps work on the permission-based model [7]. Android operating system provides
protection … We apply the cross-validation technique to compute the optimal value of \(\alpha \). …

ARANAC: a bring-your-own-permissions network access control methodology for android devices

JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
… Section III describes the overall operation of the permission-basedmodel adopted by
Android is a central part of the Android security model that governs the access of applications (…

Assisting developers in preventing permissions related security issues in android applications

MEA Tebib, P André, OEK Aktouf, M Graa - Dependable Computing-EDCC …, 2021 - Springer
model transformation process, we obtain the Android security model used for the analysis
mistakes in writing Android manifests: an empirical study of configuration errors. In: 2017 IEEE/…