Mining Android Apps to Recommend Permissions

被引:20
作者
Karim, Md Yasser [1 ]
Kagdi, Huzefa [1 ]
Di Penta, Massimiliano [2 ]
机构
[1] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
[2] Univ Sannio, Dept Engn, Benevento, Italy
来源
2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1 | 2016年
关键词
D O I
10.1109/SANER.2016.74
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Permission mechanisms play a crucial role for ensuring privacy and security of Android mobile applications (apps). An Android app that requires access to the device resources must be granted specific permissions for its correct operation. Oftentimes, the requested permissions depend on the APIs being used, e.g., a location-based service API may need a specific permission to access the device's GPS or an API supporting data persistence may need another permission to write to the device's external storage. App developers need to be aware of this API from/to permission traceability, which is not necessarily explicitly documented, for the proper functioning of the desired app feature. This paper presents an approach, named ApMiner, which relies on association rule discovery to identify co-occurrence patterns of Android APIs and permissions. Based on the usage of APIs and permissions in other apps published in a marketplace, the approach is able to learn and help a developer of a new app to recommend the permissions to be added given the APIs being used. ApMiner has been empirically evaluated on 600 apps from F-Droid, a marketplace for free and open source apps. We compared ApMiner with the state-of-the-art approaches Androguard and PScout, which rely on traditional static and dynamic analyses to recommend permissions. Results show that ApMiner has substantial precision gains (about 1.5 to 2 times) over the compared approaches, while keeping a similar and slightly better level of recall. Overall, our findings suggest that a mining based approach could offer much improved effectiveness in automatically recommending permissions in developing (new) Android apps.
引用
收藏
页码:427 / 437
页数:11
相关论文
共 37 条
[1]  
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[2]  
[Anonymous], 2011, USENIX SEC S
[3]  
[Anonymous], 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, DOI 10.1145/2335356.2335360
[4]  
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[5]  
[Anonymous], 2011, P BLACK HAT AB DHAB
[6]  
[Anonymous], 2012, Proceedings of the fth ACM conference on Security and Privacy in Wireless and Mobile Networks
[7]  
[Anonymous], 2012, NDSS
[8]  
[Anonymous], POLICY 2010
[9]  
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[10]  
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640