skip to main content
10.1145/3460620.3460764acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Analysis of Android Applications Permissions

Published:04 June 2021Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

As Android is one of the most popular mobile open-source platforms, it is very important to ensure the security and privacy of Android apps. Android has an authorization system that allows developers to announce their applications requiring essential services, and when running such applications, users need to comply with these requirements. Users frequently download applications, giving them infinite permissions easily without thinking about the impact on their privacy. In this paper, we analyze 222 applications manually to grant these permissions to see how they are compatible with user privacy depending on many criteria.

References

  1. Qasaimeh, Malik; Al-Qassas, Raad S.; Mohammad, Fida; Aljawarneh, Shadi, A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science),13(3), 2020, pp. 435-445 DOI: https://doi.org/10.2174/2213275912666181214152207Google ScholarGoogle Scholar
  2. Global mobile OS market share (January, 2020) https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/Google ScholarGoogle Scholar
  3. Smartphone Security (January, 2020) https://www.kaspersky.com/resource-center/threats/smartphonesGoogle ScholarGoogle Scholar
  4. Fake WhatsApp Application (December, 2019) https://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-app-android-messaging-apps-fake-google-play-a8039806.htmlGoogle ScholarGoogle Scholar
  5. Android vs IOS Market Share (January, 2020) https://leftronic.com/android-vs-ios-market-share/Google ScholarGoogle Scholar
  6. Sowndarajan, Karthick & Binu, Sumitra. (2017). Static Analysis Tool for Identification of Permission Misuse by Android Applications. International Journal of Applied Engineering Research. 12. 15169-15178.Google ScholarGoogle Scholar
  7. Lingfeng Bao, David Lo, Xin Xia and Shanping Li (2016) What Permissions Should This Android App RequestGoogle ScholarGoogle Scholar
  8. Asma Hamed, Hella Ayed and Dorra Machfar (2017) A Proactive Approach toward Privacy Risk Assessment for Android Apps PermissionsGoogle ScholarGoogle Scholar
  9. jinxin zhang, xiaohui yang, Tao Li and Jiamin Bao (2014) A detection system of android application based on permission analysisGoogle ScholarGoogle Scholar
  10. Danyang Jiang, Xiangling Fu, Maoqiang Song and Yidong Cui (2012) A security assessment method for Android applications based on permission modelGoogle ScholarGoogle Scholar
  11. Karthick Sowndarajan and Sumitra Binu (2017) Static Analysis Tool for Identification of Permission Misuse by Android ApplicationsGoogle ScholarGoogle Scholar
  12. Hamidreza Alimardani and Mohammed Nazeh (2019) Permission-based Analysis of Android Applications Using Categorization and Deep Learning SchemeGoogle ScholarGoogle Scholar
  13. Introduction to Android Development (January, 2020) https://www.geeksforgeeks.org/introduction-to-android-development/Google ScholarGoogle Scholar
  14. App Manifest Overview (January, 2020) https://developer.android.com/guide/topics/manifest/manifest-introGoogle ScholarGoogle Scholar
  15. Android Permissions (January 2020) https://www.pewresearch.org/internet/interactives/apps-permissions/Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    DATA'21: International Conference on Data Science, E-learning and Information Systems 2021
    April 2021
    277 pages
    ISBN:9781450388382
    DOI:10.1145/3460620

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 June 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate74of167submissions,44%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format