Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Martina Angela Sasse
Gianluca Stringhini
© 2016 IEEE. The Android operating system changed its security-and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the traditional coarse-grained permission system was anticipated for a long time by privacy-Aware users. This paper presents the first study that analyzes Android users' adaptation to the fine-grained runtime permission model, regarding their security and privacy controls. We gathered anonymous data from 50 participants who downloaded our application and answered questions related to the new permission model. The results indicate that the majority of users prefer the new model. We also collected data that demonstrate users' security controls at the given time. Our analysis shows that individuals make consistent choices regarding the resources they allow to various applications to access.
Andriotis, P., Sasse, M. A., & Stringhini, G. (2017). Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. https://doi.org/10.1109/WIFS.2016.7823922
Conference Name | 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016 |
---|---|
Start Date | Dec 4, 2016 |
End Date | Dec 7, 2016 |
Acceptance Date | Oct 4, 2016 |
Publication Date | Jan 18, 2017 |
Deposit Date | Oct 19, 2016 |
DOI | https://doi.org/10.1109/WIFS.2016.7823922 |
Keywords | Android, permissions, smartphone |
Public URL | https://uwe-repository.worktribe.com/output/899709 |
Publisher URL | http://dx.doi.org/10.1109/WIFS.2016.7823922 |
Additional Information | Title of Conference or Conference Proceedings : 2016 IEEE International Workshop on Information Forensics and Security (WIFS) |
wifs2016_template.pdf
(178 Kb)
PDF
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models
(2017)
Presentation / Conference
Privacy decision-making in the digital era: A game theoretic review
(2017)
Journal Article
A comparative study of android users’ privacy preferences under the runtime permission model
(2017)
Journal Article
A study on usability and security features of the Android pattern lock screen
(2016)
Journal Article
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search