识别Android应用程序中可能存在的过度权限需求

P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T
{"title":"识别Android应用程序中可能存在的过度权限需求","authors":"P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T","doi":"10.1109/iciptm54933.2022.9753830","DOIUrl":null,"url":null,"abstract":"There are millions of android applications being developed for smartphones and tablets. These apps are collecting enormous amounts of private data, compromising user's privacy. Researchers have tried to identify the difference between 'requested permissions' and 'used permissions' as some apps ask for a permission but may use it for stealing the user data. Android has put the system of asking user's consent for certain permissions but users have been found negligent in granting those permissions. For example, a note taking app may take the user's location data and send it to its server. As long as the app has requested the user's consent and the user has granted the permission, the state of art system will consider it benign. In this paper, we will try to identify and answer the question, 'are these permissions really necessary for the app?‘. There are thousands of applications hosted on playstore providing the same functionality. And for providing the same facility, different apps ask for a different set of permissions. It is not easy to understand whether the permissions are really used in the application. We are going to utilize a different approach by comparing and comprehending the app from its peers in the playstore. We will analyze the peer app in the same category and with similar functionality for the permission difference. If the same functionality is achieved with a lesser number of permissions, the app is considered to be malicious and will require further investigation. With this approach, we designed a statistical approach to evaluate an app for excessive permission requests. Experimental results and case studies have shown that this approach is effective in identifying malicious apps.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"76 1","pages":"101-106"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Identification of Possibly Intemperate Permission Demands in Android Apps\",\"authors\":\"P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T\",\"doi\":\"10.1109/iciptm54933.2022.9753830\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are millions of android applications being developed for smartphones and tablets. These apps are collecting enormous amounts of private data, compromising user's privacy. Researchers have tried to identify the difference between 'requested permissions' and 'used permissions' as some apps ask for a permission but may use it for stealing the user data. Android has put the system of asking user's consent for certain permissions but users have been found negligent in granting those permissions. For example, a note taking app may take the user's location data and send it to its server. As long as the app has requested the user's consent and the user has granted the permission, the state of art system will consider it benign. In this paper, we will try to identify and answer the question, 'are these permissions really necessary for the app?‘. There are thousands of applications hosted on playstore providing the same functionality. And for providing the same facility, different apps ask for a different set of permissions. It is not easy to understand whether the permissions are really used in the application. We are going to utilize a different approach by comparing and comprehending the app from its peers in the playstore. We will analyze the peer app in the same category and with similar functionality for the permission difference. If the same functionality is achieved with a lesser number of permissions, the app is considered to be malicious and will require further investigation. With this approach, we designed a statistical approach to evaluate an app for excessive permission requests. Experimental results and case studies have shown that this approach is effective in identifying malicious apps.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"76 1\",\"pages\":\"101-106\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9753830\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9753830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

智能手机和平板电脑上正在开发数以百万计的android应用程序。这些应用程序收集了大量的私人数据,损害了用户的隐私。研究人员试图识别“请求权限”和“使用权限”之间的区别,因为一些应用程序请求权限,但可能会使用它来窃取用户数据。Android在某些权限上设置了征求用户同意的系统,但用户在授予这些权限时被发现存在疏忽。例如,笔记应用程序可能会获取用户的位置数据并将其发送到服务器。只要应用程序征求了用户的同意,并且用户已经授予了许可,最先进的系统就会认为它是良性的。在本文中,我们将尝试识别并回答这个问题,“这些权限对应用来说真的是必要的吗?”有成千上万的应用程序托管在playstore提供相同的功能。为了提供相同的功能,不同的应用程序需要不同的权限。要理解是否在应用程序中真正使用了权限并不容易。我们将使用一种不同的方法,通过与playstore中的同类应用进行比较和理解。我们将分析相同类别和功能相似的对等应用程序的权限差异。如果使用较少的权限实现相同的功能,则认为该应用程序是恶意的,需要进一步调查。通过这种方法,我们设计了一种统计方法来评估应用程序是否有过多的权限请求。实验结果和案例研究表明,这种方法在识别恶意应用程序方面是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Identification of Possibly Intemperate Permission Demands in Android Apps
There are millions of android applications being developed for smartphones and tablets. These apps are collecting enormous amounts of private data, compromising user's privacy. Researchers have tried to identify the difference between 'requested permissions' and 'used permissions' as some apps ask for a permission but may use it for stealing the user data. Android has put the system of asking user's consent for certain permissions but users have been found negligent in granting those permissions. For example, a note taking app may take the user's location data and send it to its server. As long as the app has requested the user's consent and the user has granted the permission, the state of art system will consider it benign. In this paper, we will try to identify and answer the question, 'are these permissions really necessary for the app?‘. There are thousands of applications hosted on playstore providing the same functionality. And for providing the same facility, different apps ask for a different set of permissions. It is not easy to understand whether the permissions are really used in the application. We are going to utilize a different approach by comparing and comprehending the app from its peers in the playstore. We will analyze the peer app in the same category and with similar functionality for the permission difference. If the same functionality is achieved with a lesser number of permissions, the app is considered to be malicious and will require further investigation. With this approach, we designed a statistical approach to evaluate an app for excessive permission requests. Experimental results and case studies have shown that this approach is effective in identifying malicious apps.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信