Enforcing Least Privilege with Android Permissions in Mobile App Development

نویسندگان

  • Emmanuel Bello-Ogunu
  • Mohamed Shehab
چکیده

Though there is evidence that presenting Android app permission information to the user in a clear, more contextdependent way can influence mobile phone users in choosing apps that request fewer permissions [4], ultimately users still tend to make poor privacy and security decisions, especially when warnings are unclear or inhibitive [1]. As a result, we believe that code developers should take some responsibility in safeguarding users’ privacy and preventing data leakage. One way to do this is by enforcing the concept of “least privilege” [5] in application development. Within this context, we are addressing the permission model in Android applications. Fewer permissions means a more effective permission system, so developers should apply this concept to the permission model. We propose PermitMe, which is a tool built as a plugin for the Eclipse IDE for static analysis on Android applications. It enforces “least privilege” by providing feedback to developers on missing or extraneous Android permissions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DELDroid: An Automated Approach for Determination and Enforcement of Least-Privilege Architecture in Android

Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Android relies on a permission model to secure the system’s resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inhe...

متن کامل

A Permission verification approach for android mobile applications

Mobile applications build part of their security and privacy on a declarative permission model. In this approach mobile applications, to get access to sensitive resources, have to define the corresponding permissions in a manifest. However, mobile applications may request access to permissions that they do not require for their execution (over-privileges) and offer opportunities to malicious so...

متن کامل

Party Pooper: Third-Party Libraries in Android

Third-party libraries (3PLs), such as advertising networks, gaming networks, and analytics engines, are an integral part of modern mobile platforms. If Android developers want to integrate functionality provided by 3PLs, they must bundle opaque binary code into their applications. Unfortunately, developers must in essence overprivilege their Android applications by requesting dangerous permissi...

متن کامل

A Permission verification approach for android mobile applications

Mobile applications build part of their security and privacy on a declarative permission model. In this approach mobile applications, to get access to sensitive resources, have to define the corresponding permissions in a manifest. However, mobile applications may request access to permissions that they do not require for their execution (over-privileges) and offer opportunities to malicious so...

متن کامل

COVERT: Compositional Analysis of Android Inter-App Vulnerabilities

Android is the most popular platform for mobile devices. It facilitates sharing of data and services among applications using a rich inter-app communication system. While access to resources can be controlled by the Android permission system, enforcing permissions is not sufficient to prevent security violations, as permissions may be mismanaged, intentionally or unintentionally. Android’s enfo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014