scholarly journals An Empirical Analysis of Android Permission System Based on User Activities

2018 ◽  
Vol 14 (3) ◽  
pp. 324-333
Author(s):  
Ankur Rameshbhai Khunt ◽  
P. Prabu
2013 ◽  
Vol 4 (1) ◽  
pp. 16-27 ◽  
Author(s):  
Kyoung Soo Han ◽  
Yeoreum Lee ◽  
Biao Jiang ◽  
Eul Gyu Im

Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users.


Author(s):  
Prachi ◽  
Arushi Jain

In recent times, Android phones are the most popular among the users. According to a survey by International Data Corporation (IDC), it is reported that in 2015 Android dominates the smartphone market with 82.8% share, leaving its competitor iOS, Windows and others far behind. This popularity makes it prime target among the malware developers. According to a survey by the F-Secure it has been reported that 99% of new malwares are targeting the Android OS. This is majorly due to coarse grained permissions defined in the Android permission system. Additionally, some malicious applications ask for more than required permissions to exploit the personal and sensitive data of user. The objective of this chapter is twofold: getting familiar with Permission based attacks in Android, applying Reverse Engineering technique on the malicious apk file for controlling permission attacks and removing malicious code from the source code of Android apk file.


2017 ◽  
Vol 30 (5) ◽  
pp. 525-544 ◽  
Author(s):  
Hamid Bagheri ◽  
Eunsuk Kang ◽  
Sam Malek ◽  
Daniel Jackson

2007 ◽  
Vol 23 (4) ◽  
pp. 248-257 ◽  
Author(s):  
Matthias R. Mehl ◽  
Shannon E. Holleran

Abstract. In this article, the authors provide an empirical analysis of the obtrusiveness of and participants' compliance with a relatively new psychological ambulatory assessment method, called the electronically activated recorder or EAR. The EAR is a modified portable audio-recorder that periodically records snippets of ambient sounds from participants' daily environments. In tracking moment-to-moment ambient sounds, the EAR yields an acoustic log of a person's day as it unfolds. As a naturalistic observation sampling method, it provides an observer's account of daily life and is optimized for the assessment of audible aspects of participants' naturally-occurring social behaviors and interactions. Measures of self-reported and behaviorally-assessed EAR obtrusiveness and compliance were analyzed in two samples. After an initial 2-h period of relative obtrusiveness, participants habituated to wearing the EAR and perceived it as fairly unobtrusive both in a short-term (2 days, N = 96) and a longer-term (10-11 days, N = 11) monitoring. Compliance with the method was high both during the short-term and longer-term monitoring. Somewhat reduced compliance was identified over the weekend; this effect appears to be specific to student populations. Important privacy and data confidentiality considerations around the EAR method are discussed.


Sign in / Sign up

Export Citation Format

Share Document