Skip to main content

Research Repository

Advanced Search

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model

Andriotis, Panagiotis; Sasse, Martina Angela; Stringhini, Gianluca

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model Thumbnail


Authors

Profile image of Panos Andriotis

Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security

Martina Angela Sasse

Gianluca Stringhini



Abstract

© 2016 IEEE. The Android operating system changed its security-and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the traditional coarse-grained permission system was anticipated for a long time by privacy-Aware users. This paper presents the first study that analyzes Android users' adaptation to the fine-grained runtime permission model, regarding their security and privacy controls. We gathered anonymous data from 50 participants who downloaded our application and answered questions related to the new permission model. The results indicate that the majority of users prefer the new model. We also collected data that demonstrate users' security controls at the given time. Our analysis shows that individuals make consistent choices regarding the resources they allow to various applications to access.

Presentation Conference Type Conference Paper (published)
Conference Name 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016
Start Date Dec 4, 2016
End Date Dec 7, 2016
Acceptance Date Oct 4, 2016
Publication Date Jan 18, 2017
Deposit Date Oct 19, 2016
Publicly Available Date Jan 24, 2017
DOI https://doi.org/10.1109/WIFS.2016.7823922
Keywords Android, permissions, smartphone
Public URL https://uwe-repository.worktribe.com/output/899709
Publisher URL http://dx.doi.org/10.1109/WIFS.2016.7823922
Additional Information Title of Conference or Conference Proceedings : 2016 IEEE International Workshop on Information Forensics and Security (WIFS)

Files






You might also like



Downloadable Citations