Mining Android Apps to Recommend Permissions

被引:20
作者
Karim, Md Yasser [1 ]
Kagdi, Huzefa [1 ]
Di Penta, Massimiliano [2 ]
机构
[1] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
[2] Univ Sannio, Dept Engn, Benevento, Italy
来源
2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1 | 2016年
关键词
D O I
10.1109/SANER.2016.74
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Permission mechanisms play a crucial role for ensuring privacy and security of Android mobile applications (apps). An Android app that requires access to the device resources must be granted specific permissions for its correct operation. Oftentimes, the requested permissions depend on the APIs being used, e.g., a location-based service API may need a specific permission to access the device's GPS or an API supporting data persistence may need another permission to write to the device's external storage. App developers need to be aware of this API from/to permission traceability, which is not necessarily explicitly documented, for the proper functioning of the desired app feature. This paper presents an approach, named ApMiner, which relies on association rule discovery to identify co-occurrence patterns of Android APIs and permissions. Based on the usage of APIs and permissions in other apps published in a marketplace, the approach is able to learn and help a developer of a new app to recommend the permissions to be added given the APIs being used. ApMiner has been empirically evaluated on 600 apps from F-Droid, a marketplace for free and open source apps. We compared ApMiner with the state-of-the-art approaches Androguard and PScout, which rely on traditional static and dynamic analyses to recommend permissions. Results show that ApMiner has substantial precision gains (about 1.5 to 2 times) over the compared approaches, while keeping a similar and slightly better level of recall. Overall, our findings suggest that a mining based approach could offer much improved effectiveness in automatically recommending permissions in developing (new) Android apps.
引用
收藏
页码:427 / 437
页数:11
相关论文
共 37 条
[21]  
Grace M. C., 2012, 5 ACM C SEC PRIV WIR, P101
[22]  
Grissom R.J., 2005, Effect sizes for research: A broad practical approach
[23]  
Holavanalli S, 2013, IEEE INT CONF AUTOM, P652, DOI 10.1109/ASE.2013.6693128
[24]  
HOLM S, 1979, SCAND J STAT, V6, P65
[25]   AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction [J].
Huang, Jianjun ;
Zhang, Xiangyu ;
Tan, Lin ;
Wang, Peng ;
Liang, Bin .
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, :1036-1046
[26]  
Kim J., 2012, MOST
[27]  
Mahmood R., 2012, 2012 Proceedings of 7th International Workshop on Automation of Software Test (AST 2012), P22, DOI 10.1109/IWAST.2012.6228986
[28]   EvoDroid: Segmented Evolutionary Testing of Android Apps [J].
Mahmood, Riyadh ;
Mirzaei, Nariman ;
Malek, Sam .
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, :599-609
[29]   When and How Using Structural Information to Improve IR-based Traceability Recovery [J].
Panichella, Annibale ;
McMillan, Collin ;
Moritz, Evan ;
Palmieri, Davide ;
Oliveto, Rocco ;
Poshyvanyk, Denys ;
De Lucia, Andrea .
PROCEEDINGS OF THE 17TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2013), 2013, :199-208
[30]  
Schmidt AD, 2009, 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), P1, DOI 10.1109/MALWARE.2009.5403026