Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Atsuhiro Takasu
The Android ecosystem is dynamic and diverse. Controls have been set in place to allow mobile device users to regulate exchanged data and restrict apps from accessing sensitive personal information and system resources. Modern versions of the operating system implement the run-time permission model which prompts users to allow access to protected resources the moment an app attempts to utilize them. It is assumed that, in general, the run-time permission model, compared to its predecessor, enhances users' security awareness. In this paper we show that installed apps on Android devices are able to employ the systems' public assets and extract users' permission settings. Then we utilize permission data from 71 Android devices to create privacy profiles based on users' interaction with permission dialogues initiated by the system during run-time. Therefore, we demonstrate that any installed app that runs on the foreground can perform an endemic live digital forensic analysis on the device and derive similar privacy profiles of the user. Moreover, focusing on the human factors of security, we show that although in theory users can control the resources they make accessible to apps, they eventually fail to successfully recall these settings, even for the apps that they regularly use. Finally, we briefly discuss our findings derived from a pen-and-paper exercise showcasing that users are more likely to allow apps to access their location data on contemporary mobile devices (running version Android 10).
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 22nd International Conference on Human-Computer Interaction |
Start Date | Jul 19, 2020 |
End Date | Jul 24, 2020 |
Acceptance Date | Nov 25, 2019 |
Online Publication Date | Jul 10, 2020 |
Publication Date | Jul 10, 2020 |
Deposit Date | Jan 31, 2020 |
Publicly Available Date | Jul 11, 2021 |
Publisher | Springer Verlag |
Volume | 12210 LNCS |
Pages | 287-304 |
Series Title | Lecture Notes in Computer Science |
Book Title | HCI for Cybersecurity, Privacy and Trust |
ISBN | 9783030503086 |
DOI | https://doi.org/10.1007/978-3-030-50309-3_20 |
Keywords | Human factors, Live analysis, Mobile computing, User profiling, Location, Android 10 |
Public URL | https://uwe-repository.worktribe.com/output/5297505 |
Aord
(1.4 Mb)
PDF
Licence
http://www.rioxx.net/licenses/all-rights-reserved
Publisher Licence URL
http://www.rioxx.net/licenses/all-rights-reserved
Copyright Statement
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-030-50309-3_20
Smartphone message sentiment analysis
(2014)
Book Chapter
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
Multilevel visualization using enhanced social network analysis with smartphone data
(2013)
Journal Article
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search