A methodology for empirical analysis of permission-based security models and its application to android

D Barrera, HG Kayacik, PC Van Oorschot… - Proceedings of the 17th …, 2010 - dl.acm.org
Permission-based security models provide controlled access to various system resources.
The expressiveness of the permission set plays an important role in providing the right level …

Permission evolution in the android ecosystem

X Wei, L Gomez, I Neamtiu, M Faloutsos - Proceedings of the 28th …, 2012 - dl.acm.org
Android uses a system of permissions to control how apps access sensitive devices and
data stores. Unfortunately, we have little understanding of the evolution of Android …

A formal approach for detection of security flaws in the android permission system

H Bagheri, E Kang, S Malek, D Jackson - Formal Aspects of Computing, 2018 - Springer
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …

Modeling and enhancing android's permission system

E Fragkaki, L Bauer, L Jia, D Swasey - … , Pisa, Italy, September 10-12, 2012 …, 2012 - Springer
Several works have recently shown that Android's security architecture cannot prevent many
undesired behaviors that compromise the integrity of applications and the privacy of their …

A comprehensive analysis of the android permissions system

IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
Android is one of the most essential and highly used operating systems. Android
permissions system is a core security component that offers an access-control mechanism to …

Android security framework: Extensible multi-layered access control on android

M Backes, S Bugiel, S Gerling… - Proceedings of the 30th …, 2014 - dl.acm.org
We introduce the Android Security Framework (ASF), a generic, extensible security
framework for Android that enables the development and integration of a wide spectrum of …

Pscout: analyzing the android permission specification

KWY Au, YF Zhou, Z Huang, D Lie - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …

A formal model to analyze the permission authorization and enforcement in the android framework

W Shin, S Kiyomoto, K Fukushima… - 2010 IEEE Second …, 2010 - ieeexplore.ieee.org
This paper proposes a formal model of the Android permission scheme. We describe the
scheme specifying entities and relationships, and provide a state-based model which …

Apex: extending android permission model and enforcement with user-defined runtime constraints

M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …

Asking for (and about) permissions used by android apps

R Stevens, J Ganz, V Filkov… - 2013 10th Working …, 2013 - ieeexplore.ieee.org
Security policies, which specify what applications are allowed to do, are notoriously difficult
to specify correctly. Many applications were found to request over-liberal permissions. On …