Enforcing Least Privilege with Android Permissions in Mobile App Development
نویسندگان
چکیده
Though there is evidence that presenting Android app permission information to the user in a clear, more contextdependent way can influence mobile phone users in choosing apps that request fewer permissions [4], ultimately users still tend to make poor privacy and security decisions, especially when warnings are unclear or inhibitive [1]. As a result, we believe that code developers should take some responsibility in safeguarding users’ privacy and preventing data leakage. One way to do this is by enforcing the concept of “least privilege” [5] in application development. Within this context, we are addressing the permission model in Android applications. Fewer permissions means a more effective permission system, so developers should apply this concept to the permission model. We propose PermitMe, which is a tool built as a plugin for the Eclipse IDE for static analysis on Android applications. It enforces “least privilege” by providing feedback to developers on missing or extraneous Android permissions.
منابع مشابه
DELDroid: An Automated Approach for Determination and Enforcement of Least-Privilege Architecture in Android
Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Android relies on a permission model to secure the system’s resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inhe...
متن کاملA Permission verification approach for android mobile applications
Mobile applications build part of their security and privacy on a declarative permission model. In this approach mobile applications, to get access to sensitive resources, have to define the corresponding permissions in a manifest. However, mobile applications may request access to permissions that they do not require for their execution (over-privileges) and offer opportunities to malicious so...
متن کاملParty Pooper: Third-Party Libraries in Android
Third-party libraries (3PLs), such as advertising networks, gaming networks, and analytics engines, are an integral part of modern mobile platforms. If Android developers want to integrate functionality provided by 3PLs, they must bundle opaque binary code into their applications. Unfortunately, developers must in essence overprivilege their Android applications by requesting dangerous permissi...
متن کاملA Permission verification approach for android mobile applications
Mobile applications build part of their security and privacy on a declarative permission model. In this approach mobile applications, to get access to sensitive resources, have to define the corresponding permissions in a manifest. However, mobile applications may request access to permissions that they do not require for their execution (over-privileges) and offer opportunities to malicious so...
متن کاملCOVERT: Compositional Analysis of Android Inter-App Vulnerabilities
Android is the most popular platform for mobile devices. It facilitates sharing of data and services among applications using a rich inter-app communication system. While access to resources can be controlled by the Android permission system, enforcing permissions is not sufficient to prevent security violations, as permissions may be mismanaged, intentionally or unintentionally. Android’s enfo...
متن کامل