Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era

被引:17
作者
Alepis, Efthimios [1 ]
Patsakis, Constantinos [1 ]
机构
[1] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou, Piraeus 18534, Greece
来源
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017 | 2017年 / 10662卷
基金
欧盟地平线“2020”;
关键词
Android; Security; Permissions; Privacy;
D O I
10.1007/978-3-319-71501-8_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Billions of hand-held devices are used globally in daily basis. The main reasons for their wide adoption can be considered the introduction of various sensors that have completely reshaped user interaction standards as well as the development of myriads of applications that provide various services to the users. Due to the daily usage of these applications and the wide information that can be deduced from the sensors, a lot of private and sensitive information can be leaked unless access control is applied to the installed applications. In Android, this control was applied upon installation of each application, when the user would be asked to grant the requested permissions. However, this policy has changed in the last versions, allowing users to revoke permissions and grant "dangerous" permissions on demand. In this work we illustrate several flaws in the new permission architecture that can be exploited to gain more access to sensitive user data than what the user considers to have granted.
引用
收藏
页码:53 / 73
页数:21
相关论文
共 33 条
[1]  
Achara J.P., 2014, 7th ACM Conference on Security Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014, WISEC'14, P231
[2]   Trapped by the UI: The Android Case [J].
Alepis, Efthimios ;
Patsakis, Constantinos .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 :334-354
[3]   Monkey Says, Monkey Does: Security and Privacy on Voice Assistants [J].
Alepis, Efthimios ;
Patsakis, Constantinos .
IEEE ACCESS, 2017, 5 :17841-17851
[4]   There's Wally! Location Tracking in Android without Permissions [J].
Alepis, Efthimios ;
Patsakis, Constantinos .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :278-284
[5]  
[Anonymous], 2012, Financial cryptography and data security
[6]  
[Anonymous], 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, DOI 10.1145/2335356.2335360
[7]  
[Anonymous], 2015, BEWARE ADS USE INAUD
[8]  
[Anonymous], 2013, WORKSHOP SECURITY PR, DOI [DOI 10.1145/2516760.2516762, 10.1145/2516760.2516762]
[9]  
[Anonymous], 2014, 21 ANN NETW DISTR SY
[10]  
[Anonymous], 2013, P 9 S US PRIV SEC AS, DOI [DOI 10.1145/2501604.2501616, 10.1145/2501604.2501616]