Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward
نویسندگان
چکیده
Android introduces a new permission model that allows apps to request permissions at runtime rather than the installation time since 6.0 (Marshmallow, API level 23). While this provides users with greater flexibility in controlling an app's access sensitive data and system features, it brings challenges app development. First, as may grant or revoke any while they are using app, developers need ensure properly checks requests required before invoking permission-protected APIs. Second, Android's mechanism keeps evolving getting customized by device manufacturers. Developers expected comprehensively test their on different versions models make sure requested all situations. Unfortunately, these requirements often impractical for developers. In practice, many suffer from various issues (ARP issues). existing studies have explored ARP issues, understanding of such is still preliminary. To better characterize we performed empirical study 135 Stack Overflow posts discuss 199 real archived popular open-source projects GitHub. Via analyzing data, observed 11 types commonly occur apps. For each type systematically studied: (1) how can be manifested, (2) pervasive serious real-world apps, (3) fixed. We also analyzed evolution trend 2015 2020 understand impact ecosystem. Furthermore, conducted field survey in-depth interviews among practitioners community industry, gain insights practitioners’ practices learn tools help combat issues. Finally, strengths weaknesses detect built ARPBench , open benchmark consisting 94 evaluated performance three available tools. The experimental results indicate very limited supports detecting our issue report large number false alarms. further tools’ limitations summarized designing effective detection technique. hope findings shed light future research provide useful guidance practitioners.
منابع مشابه
Forensic Taxonomy of Popular Android mHealth Apps
Mobile health applications (or mHealth apps, as they are commonly known) are increasingly popular with both individual end users and user groups such as physicians. Due to their ability to access, store and transmit personally identifiable and sensitive information (e.g. geolocation information and personal details), they are potentially an important source of evidentiary materials in digital i...
متن کاملAn Android Cloud Storage Apps Forensic Taxonomy
Mobile phones have been playing a very significant role in our daily activities for the last decade. With the increase need for these devices, people are now more reliant on their smartphone applications for their daily tasks and many prefer to save their mobile data on a cloud platform to access them anywhere on any device. Cloud technology is the new way for better data storage, as it offers ...
متن کاملPermission based Android security: Issues and countermeasures
Android security has been a hot spot recently in both academic research and public concerns due to numerous instances of security attacks and privacy leakage on Android platform. Android security has been built upon a permission based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. Such permission based mechanism is widely criti...
متن کاملDPerm: Assisting the Migration of Android Apps to Runtime Permissions
Android apps require permissions when accessing resources related to privacy or system integrity. Starting from Android 6, these permissions have to be asked at runtime. However, migrating to the new permission model poses multiple challenges for developers. First, developers have to discover where the app uses permissions, which requires a permission specification. To date several such specifi...
متن کاملAndroid Permission Model
The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2023
ISSN: ['0098-5589', '1939-3520', '2326-3881']
DOI: https://doi.org/10.1109/tse.2022.3148258