Permission Issues in Open-source Android Apps: An Exploratory Study

被引:17
作者
Scoccia, Gian Luca [1 ]
Peruma, Anthony [2 ]
Pujols, Virginia [2 ]
Malavolta, Ivano [3 ]
Krutz, Daniel E. [2 ]
机构
[1] Gran Sasso Sci Inst, Laquila, Italy
[2] Rochester Inst Technol, Rochester, NY 14623 USA
[3] Vrije Univ, Amsterdam, Netherlands
来源
2019 19TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM) | 2019年
关键词
Mobile Permissions; Android; Mobile Software Engineering; Software Repository Mining;
D O I
10.1109/SCAM.2019.00034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Permissions are one of the most fundamental components for protecting an Android user's privacy and security. Unfortunately, developers frequently misuse permissions by requiring too many or too few permissions, or by not adhering to permission best practices. These permission-related issues can negatively impact users in a variety of ways, ranging from creating a poor user experience to severe privacy and security implications. To advance the understanding permission-related issues during the app's development process, we conducted an empirical study of 574 GitHub repositories of open-source Android apps. We analyzed the occurrences of four types of permission-related issues across the lifetime of the apps. Our findings reveal that (i) permission-related issues are a frequent phenomenon in Android apps, (ii) the majority of issues are fixed within a few days after their introduction, (iii) permission-related issues can frequently linger inside an app for an extended period of time, which can be as high as several years, before being fixed, and (iv) both project newcomers and regular contributors exhibit the same behaviour in terms of number of introduced and fixed permission-related issues per commit.
引用
收藏
页码:238 / 249
页数:12
相关论文
共 56 条
[1]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[2]  
[Anonymous], 2011, CATEGORICAL DATA ANA
[3]  
[Anonymous], 2019, P 41 INT C SOFTW ENG
[4]  
[Anonymous], 2018, PERM
[5]  
[Anonymous], 2017, LONG DOES IT TAKE BU
[6]  
[Anonymous], 2012, P 5 ACM C SEC PRIV W
[7]  
Au Y. F., 2012, P 2012 ACM C COMP CO, P217, DOI 10.1145/2382196.2382222
[8]  
Bird Christian, 2011, 13 FSE, P4, DOI DOI 10.1145/2025113.2025119
[9]  
Boussaa Mohamed, 2013, Search Based Software Engineering. 5th International Symposium, SSBSE 2013. Proceedings: LNCS 8084, P50, DOI 10.1007/978-3-642-39742-4_6
[10]   How do Apps Evolve in Their Permission Requests? A Preliminary Study [J].
Calciati, Paolo ;
Gorla, Alessandra .
2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017), 2017, :37-41