Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
To allow, or deny? That is the question
Andriotis, Panagiotis; Takasu, Atsuhiro
Authors
Atsuhiro Takasu
Abstract
The Android ecosystem is dynamic and diverse. Controls have been set in place to allow mobile device users to regulate exchanged data and restrict apps from accessing sensitive personal information and system resources. Modern versions of the operating system implement the run-time permission model which prompts users to allow access to protected resources the moment an app attempts to utilize them. It is assumed that, in general, the run-time permission model, compared to its predecessor, enhances users' security awareness. In this paper we show that installed apps on Android devices are able to employ the systems' public assets and extract users' permission settings. Then we utilize permission data from 71 Android devices to create privacy profiles based on users' interaction with permission dialogues initiated by the system during run-time. Therefore, we demonstrate that any installed app that runs on the foreground can perform an endemic live digital forensic analysis on the device and derive similar privacy profiles of the user. Moreover, focusing on the human factors of security, we show that although in theory users can control the resources they make accessible to apps, they eventually fail to successfully recall these settings, even for the apps that they regularly use. Finally, we briefly discuss our findings derived from a pen-and-paper exercise showcasing that users are more likely to allow apps to access their location data on contemporary mobile devices (running version Android 10).
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 22nd International Conference on Human-Computer Interaction |
Start Date | Jul 19, 2020 |
End Date | Jul 24, 2020 |
Acceptance Date | Nov 25, 2019 |
Online Publication Date | Jul 10, 2020 |
Publication Date | Jul 10, 2020 |
Deposit Date | Jan 31, 2020 |
Publicly Available Date | Jul 11, 2021 |
Publisher | Springer Verlag |
Volume | 12210 LNCS |
Pages | 287-304 |
Series Title | Lecture Notes in Computer Science |
Book Title | HCI for Cybersecurity, Privacy and Trust |
ISBN | 9783030503086 |
DOI | https://doi.org/10.1007/978-3-030-50309-3_20 |
Keywords | Human factors, Live analysis, Mobile computing, User profiling, Location, Android 10 |
Public URL | https://uwe-repository.worktribe.com/output/5297505 |
Files
Aord
(1.4 Mb)
PDF
Licence
http://www.rioxx.net/licenses/all-rights-reserved
Publisher Licence URL
http://www.rioxx.net/licenses/all-rights-reserved
Copyright Statement
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-030-50309-3_20
You might also like
Smartphone message sentiment analysis
(2014)
Book Chapter
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
Multilevel visualization using enhanced social network analysis with smartphone data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search