Affiliation:
1. G. L. Bajaj Institute of Technology and Management, Greater Noida, India
Abstract
Android applications require necessary permissions to perform the right function, but at the same time, there are other permissions that may affect the user privacy that need to be retrieved and revoked. Each step forward in digitization is also leading to an increase in the number of malware attacks by the malicious applications with the use of permissions. To solve the problem of APK app user data privacy and security, the authors created a system that searches for and downloads Android apps from the Android Market automatically. In addition, they produced a thorough mapping of Android application programming interface (API) calls to the needed permission(s) for each call, if any were required. Based on a static examination of each application's APK bytecode, they next ran an analysis of 141,372 Android applications to see if they had the right set of permissions. According to the research, most mobile app developers do not use the proper permission set and either over-specify or under-specify their security requirements.
Reference36 articles.
1. Abusing Android permissions: A security perspective
2. android-market-api. (n.d.). Android Market for all Developers!http://code.google.com/p/android-market-api/
3. COVERT: Compositional Analysis of Android Inter-App Permission Leakage
4. What Permissions Should This Android App Request?
5. Location-based services for mobile telephony: a study of users’ privacy concerns.;L.Barkhuus;Proceedings of the International Conference on Human-Computer Interaction,2003