Skip to main content

Malicious Intentions: Android Internet Permission Security Risks

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Abstract

Many Android applications access internet networks to query, retrieve or transmit digital resources. The current version of the Android Operating System (OS) fails to provide sufficient control to the user over the amount of internet access an application has. This raises concerns for data security. Significant user data vulnerability is introduced when applications can perform unsolicited data collection in the background without user knowledge. This paper analyzes the permissions of a cross-section of android applications. We focus on the INTERNET permission, and how its classification introduces significant vulnerability onto a user’s device. Subsequently, we create a proof of concept app that exploits private user data using social engineering. Our findings conclude that the INTERNET permission is a critical permission, prone to exploitation and lacks sufficient user control in the Android OS. We propose methods for the control and protection of data by the Android system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mobile operating system market share worldwide. http://gs.statcounter.com/os-market-share/mobile/worldwide. Accessed 06 Aug 2019

  2. Global mobile OS market share in sales to end users from 1st quarter 2009 to 2nd quarter 2018. https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/. Accessed 06 Aug 2019

  3. Number of available applications in the Google Play Store from December 2009 to December 2018. https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/. Accessed 06 Aug 2019

  4. Demetriou, S., Merrill, W., Yang, W., Zhang, A., Gunter, C.A.: Free for all! Assessing user data exposure to advertising libraries on Android. In: NDSS (2016)

    Google Scholar 

  5. Yadav, S., Apurva, A., Ranakoti, P., Tomer, S., Roy, N.R.: Android vulnerabilities and security. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 204–208. IEEE (2017)

    Google Scholar 

  6. Rangwala, M., Zhang, P., Zou, X., Li, F.: A taxonomy of privilege escalation attacks in Android applications. Int. J. Secur. Netw. 9(1), 40–55 (2014)

    Article  Google Scholar 

  7. Armando, A., Merlo, A., Verderame, L.: An empirical evaluation of the android security framework. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 176–189. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39218-4_14

    Chapter  Google Scholar 

  8. Permissions overview. https://developer.android.com/guide/topics/permissions/overview. Accessed 06 Aug 2019

  9. Schlegel, R., Zhang, K., Zhou, X.-Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: NDSS, vol. 11, pp. 17–33 (2011)

    Google Scholar 

  10. Runtime permissions. https://source.android.com/devices/tech/config/runtime_perms. Accessed 06 Aug 2019

  11. Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30921-2_17

    Chapter  Google Scholar 

  12. Fang, Z., Han, W., Li, Y.: Permission based Android security: issues and countermeasures. Comput. Secur. 43, 205–218 (2014)

    Article  Google Scholar 

  13. Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84. ACM (2010)

    Google Scholar 

  14. Watanabe, T., et al.: Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 14–24. IEEE Press (2017)

    Google Scholar 

  15. App manifest overview. https://developer.android.com/guide/topics/manifest/manifest-intro. Accessed 06 Aug 2019

  16. Alshehri, A., Hewins, A., McCulley, M., Alshahrani, H., Fu, H., Zhu, Y.: Risks behind device information permissions in Android OS. Commun. Netw. 9, 219–234 (2017)

    Article  Google Scholar 

  17. AdMob. https://en.wikipedia.org/wiki/AdMob. Accessed 06 Aug 2019

Download references

Acknowledgement

This study was funded by the National Natural Science Foundation of China (NSFC grant number: U1836116).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinfu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Andah, J.M., Chen, J. (2019). Malicious Intentions: Android Internet Permission Security Risks. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics