A comprehensive analysis of the android permissions system
IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
… Finally, a discussion of the permission-based security … component of the Android security
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …
model [8]. Consequently, the … Krutz, “An empirical history of permission requests and mistakes …
Android custom permissions demystified: A comprehensive security evaluation
… Various previous work studied the design of the permission-based security model. Barrera …
A methodology for empirical analysis of permission-based security models and its application …
A methodology for empirical analysis of permission-based security models and its application …
Automatically granted permissions in Android apps: An empirical study on their prevalence and on the potential threats for privacy
… We thus statically analyze the bytecode of the application to detect uses of an automatically
… do not use), we perform a reachability analysis of such statements. Starting from the method …
… do not use), we perform a reachability analysis of such statements. Starting from the method …
… Application Permission Model with Risk Assess-Allow & Reassess-Revoke Approach: Assess-Allow & Reassess-Revoke (AARR) Android App-permission Model
M Tufail, FK Hamdani - International Journal of Information …, 2023 - journals.cfrit.com
… Android uses a permission-based model for applications that … approach is adopted in designing
such a secure Model … by a developer for an android application by employing the assess-…
such a secure Model … by a developer for an android application by employing the assess-…
Android custom permissions demystified: From privilege escalation to design shortcomings
… have been blocked, custom permission based attacks can still be … Therefore, we empirically
limited that a test case only can … design of the permission-based security model. Barrera et al. …
limited that a test case only can … design of the permission-based security model. Barrera et al. …
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
… is the use of state-of-the-art distributed word embedding models that … permission-based
malware detection, where informative features are required to describe the behaviour of an …
malware detection, where informative features are required to describe the behaviour of an …
An empirical study on secure usage of mobile health apps: The attack simulation approach
… We use the term attack to refer to the social engineering attacks that aim to exploit human
vulnerabilities, as conducted in [14,33]. The term also include the threats, and the actions that …
vulnerabilities, as conducted in [14,33]. The term also include the threats, and the actions that …
HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods
A Mahindru, AL Sangal - The Journal of Supercomputing, 2021 - Springer
… Android apps work on the permission-based model [7]. Android operating system provides
protection … We apply the cross-validation technique to compute the optimal value of \(\alpha \). …
protection … We apply the cross-validation technique to compute the optimal value of \(\alpha \). …
ARANAC: a bring-your-own-permissions network access control methodology for android devices
JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
… Section III describes the overall operation of the permission-based … model adopted by
Android is a central part of the Android security model that governs the access of applications (…
Android is a central part of the Android security model that governs the access of applications (…
Assisting developers in preventing permissions related security issues in android applications
… model transformation process, we obtain the Android security model used for the analysis …
mistakes in writing Android manifests: an empirical study of configuration errors. In: 2017 IEEE/…
mistakes in writing Android manifests: an empirical study of configuration errors. In: 2017 IEEE/…