Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
As Android is one of the most popular mobile open-source platforms, it is very important to ensure the security and privacy of Android apps. Android has an authorization system that allows developers to announce their applications requiring essential services, and when running such applications, users need to comply with these requirements. Users frequently download applications, giving them infinite permissions easily without thinking about the impact on their privacy. In this paper, we analyze 222 applications manually to grant these permissions to see how they are compatible with user privacy depending on many criteria.
- Qasaimeh, Malik; Al-Qassas, Raad S.; Mohammad, Fida; Aljawarneh, Shadi, A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science),13(3), 2020, pp. 435-445 DOI: https://doi.org/10.2174/2213275912666181214152207Google Scholar
- Global mobile OS market share (January, 2020) https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/Google Scholar
- Smartphone Security (January, 2020) https://www.kaspersky.com/resource-center/threats/smartphonesGoogle Scholar
- Fake WhatsApp Application (December, 2019) https://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-app-android-messaging-apps-fake-google-play-a8039806.htmlGoogle Scholar
- Android vs IOS Market Share (January, 2020) https://leftronic.com/android-vs-ios-market-share/Google Scholar
- Sowndarajan, Karthick & Binu, Sumitra. (2017). Static Analysis Tool for Identification of Permission Misuse by Android Applications. International Journal of Applied Engineering Research. 12. 15169-15178.Google Scholar
- Lingfeng Bao, David Lo, Xin Xia and Shanping Li (2016) What Permissions Should This Android App RequestGoogle Scholar
- Asma Hamed, Hella Ayed and Dorra Machfar (2017) A Proactive Approach toward Privacy Risk Assessment for Android Apps PermissionsGoogle Scholar
- jinxin zhang, xiaohui yang, Tao Li and Jiamin Bao (2014) A detection system of android application based on permission analysisGoogle Scholar
- Danyang Jiang, Xiangling Fu, Maoqiang Song and Yidong Cui (2012) A security assessment method for Android applications based on permission modelGoogle Scholar
- Karthick Sowndarajan and Sumitra Binu (2017) Static Analysis Tool for Identification of Permission Misuse by Android ApplicationsGoogle Scholar
- Hamidreza Alimardani and Mohammed Nazeh (2019) Permission-based Analysis of Android Applications Using Categorization and Deep Learning SchemeGoogle Scholar
- Introduction to Android Development (January, 2020) https://www.geeksforgeeks.org/introduction-to-android-development/Google Scholar
- App Manifest Overview (January, 2020) https://developer.android.com/guide/topics/manifest/manifest-introGoogle Scholar
- Android Permissions (January 2020) https://www.pewresearch.org/internet/interactives/apps-permissions/Google Scholar
Recommendations
Android permissions demystified
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityAndroid provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. ...
Side-Effects of Permissions Requested by Mobile Banking on Android Platform: A Case Study of Morocco
ICEEG '17: Proceedings of the 1st International Conference on E-commerce, E-Business and E-GovernmentNo one among us can deny that Android has become in the last years one of the most popular mobile operating systems worldwide, as the price of this popularity, Android becomes the favorite destination of hackers and the main target of various attacks, ...
MAPPER: Mapping Application Description to Permissions
Risks and Security of Internet and SystemsAbstractAndroid operating system has seen phenomenal growth, and Android Applications (Apps) have proliferated into mainstream usage across the globe. Are users informed by the developers about everything an App does when they consent to install an App ...
Comments