Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2046707.2046779acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Android permissions demystified

Published: 17 October 2011 Publication History

Abstract

Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. We study Android applications to determine whether Android developers follow least privilege with their permission requests. We built Stowaway, a tool that detects overprivilege in compiled Android applications. Stowaway determines the set of API calls that an application uses and then maps those API calls to permissions. We used automated testing tools on the Android API in order to build the permission map that is necessary for detecting overprivilege. We apply Stowaway to a set of 940 applications and find that about one-third are overprivileged. We investigate the causes of overprivilege and find evidence that developers are trying to follow least privilege but sometimes fail due to insufficient API documentation.

References

[1]
Amazon Appstore for Android. http://www.amazon.com/mobile-apps/b?ie=UTF8&node=2350149011.
[2]
Android Developers Reference. http://developer.android.com/reference/.
[3]
Android Market. http://www.android.com/market/.
[4]
Artzi, S., Ernst, M., Kiezun, A., Pacheco, C., and Perkins, J. Finding the needles in the haystack: Generating legal test inputs for object-oriented programs. In Workshop on Model-Based Testing and Object-Oriented Systems (2006).
[5]
Barrera, D., Kayacik, H., van Oorschot, P., and Somayaji, A. A methodology for empirical analysis of permission-based security models and its application to android. In Proc. of the ACM conference on Computer and Communications Security (2010).
[6]
Bodden, E., Sewe, A., Sinschek, J., and Mezini, M. Taming reflection: Static analysis in the presence of reflection and custom class loaders. Tech. Rep. TUD-CS-2010-0066, CASED, Mar. 2010.
[7]
Boyapati, C., Khurshid, S., and Marinov, D. Korat: Automated testing based on Java predicates. In Proc. of the 2002 ACM SIGSOFT International Symposium on Software Testing and Analysis (2002).
[8]
Chin, E., Felt, A. P., Greenwood, K., and Wagner, D. Analyzing Inter-Application Communication in Android. In Proc. of the Annual International Conference on Mobile Systems, Applications, and Services (2011).
[9]
Csallner, C., and Smaragdakis, Y. JCrasher: an automatic robustness tester for Java. Software: Practice and Experience 34, 11 (2004).
[10]
Distimo. The battle for the most content and the emerging tablet market. http://www.distimo.com/blog/2011_04_the-battle-for-the-most-content-and-the-emerging-tablet-market.
[11]
Enck, W., Octeau, D., McDaniel, P., and Chaudhuri, S. A Study of Android Application Security. In USENIX Security (2011).
[12]
Enck, W., Ongtang, M., and McDaniel, P. On lightweight mobile phone application certification. In Proc. of the ACM conference on Computer and Communications Security (2009).
[13]
Enck, W., Ongtang, M., and McDaniel, P. Understanding Android security. IEEE Security and Privacy 7, 1 (2009).
[14]
Enhanced JUnit. http://www.silvermark.com/Product/java/enhancedjunit/index.html.
[15]
Felt, A. P., Greenwood, K., and Wagner, D. The Effectiveness of Application Permissions. In Proc. of the USENIX Conference on Web Application Development (2011).
[16]
Gibler, C., Crussell, J., Erickson, J., and Chen, H. AndroidLeaks: Detecting Privacy Leaks in Android Applications. Tech. rep., UC Davis, 2011.
[17]
Hackborn, D. Re: List of private / hidden / system APIs? http://groups.google.com/group/android-developers/msg/a9248b18cba59f5a.
[18]
Livshits, B., Whaley, J., and Lam, M. S. Reflection Analysis for Java. In Asian Symposium on Programming Languages and Systems (2005).
[19]
McCluskey, G. Using Java Reflection. http://java.sun.com/developer/technicalArticles/ALT/Reflection/, 1998.
[20]
Pacheco, C., and Ernst, M. Randoop. http://code.google.com/p/randoop/.
[21]
Pacheco, C., and Ernst, M. Eclat: Automatic generation and classification of test inputs. European Conference on Object-Oriented Programming (2005).
[22]
Pacheco, C., Lahiri, S., Ernst, M., and Ball, T. Feedback-directed random test generation. In Proc. of the International Conference on Software Engineering (2007).
[23]
Paller, G. Dedexer. http://dedexer.sourceforge.net.
[24]
Sawin, J., and Rountev, A. Improving static resolution of dynamic class loading in java using dynamically gathered environment information. Automated Software Eng. 16 (June 2009), 357--381.
[25]
Stack Overflow. Broadcast Intent when network state has changend. http://stackoverflow.com/questions/2676044/broadcast-intent-when-network-state-has-changend.
[26]
Vennon, T., and Stroop, D. Threat Analysis of the Android Market. Tech. rep., SMobile Systems, 2010.
[27]
Vidas, T., Christin, N., and Cranor, L. Curbing Android Permission Creep. In W2SP (2011).

Cited By

View all
  • (2025)Handling Identity and Fraud in the MetaverseIEEE Security & Privacy10.1109/MSEC.2024.339969923:1(27-37)Online publication date: Jan-2025
  • (2025)Permissions: Access Control FundamentalsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_786(1796-1800)Online publication date: 8-Jan-2025
  • (2024)A decade of privacy-relevant android app reviewsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699185(5089-5106)Online publication date: 14-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
October 2011
742 pages
ISBN:9781450309486
DOI:10.1145/2046707
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. android
  2. least privilege
  3. permissions

Qualifiers

  • Research-article

Conference

CCS'11
Sponsor:

Acceptance Rates

CCS '11 Paper Acceptance Rate 60 of 429 submissions, 14%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)224
  • Downloads (Last 6 weeks)14
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Handling Identity and Fraud in the MetaverseIEEE Security & Privacy10.1109/MSEC.2024.339969923:1(27-37)Online publication date: Jan-2025
  • (2025)Permissions: Access Control FundamentalsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_786(1796-1800)Online publication date: 8-Jan-2025
  • (2024)A decade of privacy-relevant android app reviewsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699185(5089-5106)Online publication date: 14-Aug-2024
  • (2024)Peep with a mirrorProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699019(2119-2135)Online publication date: 14-Aug-2024
  • (2024)IoT Privacy Risks RevealedEntropy10.3390/e2607056126:7(561)Online publication date: 29-Jun-2024
  • (2024)DETECTION OF MALICIOUS ACTIVITY USING A NEURAL NETWORK FOR CONTINUOUS OPERATIONCybersecurity: Education, Science, Technique10.28925/2663-4023.2024.23.2132243:23(213-224)Online publication date: 2024
  • (2024)Improving mobile security: A study on android malware detection using LOFInternational Journal of Mathematics and Computer in Engineering10.2478/ijmce-2025-0018Online publication date: 18-Sep-2024
  • (2024)Static analysis framework for permission-based dataset generation and android malware detection using machine learningEURASIP Journal on Information Security10.1186/s13635-024-00182-32024:1Online publication date: 23-Oct-2024
  • (2024)A Longitudinal Analysis Of Replicas in the Wild Wild AndroidProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695546(1821-1833)Online publication date: 27-Oct-2024
  • (2024)MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695534(1667-1679)Online publication date: 27-Oct-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media