Empirical analysis of android apps permissions

Android applications or apps are taking the smart phones industry to a new level. Smart phone users can do most of their everyday tasks using the various types of applications offered in the Android Play Store. Generally, prior to installation of the apps, users need to agree on the permissions requ...

Full description

Bibliographic Details
Main Authors: Awang Abu Bakar, Normi Sham, Mahmud, Iqram
Format: Conference or Workshop Item
Language:English
English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/37951/
http://irep.iium.edu.my/37951/
http://irep.iium.edu.my/37951/1/Empirical_Analysis_of_Android_Apps_Permissions.pdf
http://irep.iium.edu.my/37951/4/37951_Empirical%20analysis%20of%20android_Scopus.pdf
Description
Summary:Android applications or apps are taking the smart phones industry to a new level. Smart phone users can do most of their everyday tasks using the various types of applications offered in the Android Play Store. Generally, prior to installation of the apps, users need to agree on the permissions requested by the apps, they are not given any other option. Essentially, users may not aware on some security issues that may arise from the permissions. Some apps request the right to manipulate sensitive data, such as GPS location, photos, calendar, contact, email and files. In this paper, we explain the sources of sensitive data, what the malicious apps can do to the data, and apply the empirical software engineering analysis to find the factors that could potentially influence the permissions in Android apps. In addition, we also highlight top ten most implemented permissions in Android apps.