Journal of Theoretical and Applied Information Technology
Today Smartphones are the closest user assistants since they offer a wide range of functionalities to users. Although there are many applications developed in the market which facilitate the day-to-day user activities and provide a comprehensive means to entertain users, the number of malicious applications which misuse the users' personal data or overcharge them are increased accordingly. These applications are granted privileges legitimately while they may not use them in a proper way. The aim of this paper is to address attacks related to the shortcomings of Android permission framework, which further are categorize to attacks result from applications with excessive privileges, confused deputy, and collusion attacks.