Security

Mining Permission Request Patterns from Android and Facebook Applications

Download Now Free registration required

Executive Summary

Android and Facebook provide third-party applications with access to users' private data and the ability to perform potentially sensitive operations (e.g., post to a user's wall or place phone calls). As a security measure, these platforms restrict applications' privileges with permission systems: users must approve the permissions requested by applications before the applications can make privacy- or security-relevant API calls. However, recent studies have shown that users often do not understand permission requests and lack a notion of typicality of requests. As a first step towards simplifying permission systems, the authors cluster a corpus of 188,389 Android applications and 27,029 Facebook applications to find patterns in permission requests.

  • Format: PDF
  • Size: 575.52 KB