Skip to main content

PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems

  • Conference paper
Ambient Intelligence (AmI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7683))

Included in the following conference series:

Abstract

Permission systems control access of mobile applications to other applications, data, and resources on a smartphone. Both from a technical and a social point of view, they are based on the assumption that users actually understand these permissions and hence they can make an informed decision about which permission to grant to which piece of software. Results of a survey conducted for this article seriously challenges this assumption. For instance, over a third of participating Android users were not able to correctly identify the meaning of the permission Full Internet Access. We developed PermissionWatcher, an Android application which provides users with awareness information about other applications and allows to check on the permission set granted to individual applications. In a field study with 1000+ Android users, we collected data that provides evidence that users are willing to follow security principles if security awareness is created and information is presented in a clear and comprehensive way. Therefore, we argue that it is essential for security policies to take the abilities of the target audience into account.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amer, T.S., Maris, J.B.: Signal words and signal icons in application control and information technology exception messages – hazard matching and habituation effects. Working Paper Series 06-05, Norther Arizona University (2006)

    Google Scholar 

  2. Anderson, J., Bonneau, J., Stajano, F.: Inglorious installers: Security in the application marketplace (2010)

    Google Scholar 

  3. Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: CCS 2010, pp. 73–84. ACM (2010)

    Google Scholar 

  4. Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In: SP 2011, pp. 96–111. IEEE, Washington, DC (2011)

    Google Scholar 

  5. Egelman, S., Cranor, L.F., Hong, J.I.: You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI 2008, pp. 1065–1074. ACM (2008)

    Google Scholar 

  6. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: 20th USENIX Security Symposium (2011)

    Google Scholar 

  7. Enck, W., Ongtang, M., McDaniel, P.: Mitigating android software misuse before it happens. Technical report, Pennsylvania State University (2008)

    Google Scholar 

  8. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, pp. 235–245. ACM, New York (2009)

    Chapter  Google Scholar 

  9. Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security and Privacy 7, 50–57 (2009)

    Article  Google Scholar 

  10. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: CCS 2011, pp. 627–638. ACM (2011)

    Google Scholar 

  11. Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: WebApps 2011, p. 7. USENIX Association, Berkeley (2011)

    Google Scholar 

  12. Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. Technical Report UCB/EECS-2012-26, University of California at Berkeley (2012)

    Google Scholar 

  13. Google Inc. Security and permissions (2011), http://developer.android.com/guide/topics/security/security.html (last access June 20, 2012)

  14. Hogben, G., Dekker, M.: Smartphones: Information security risks, opportunities and recommendations for users. Technical report, ENISA (2010)

    Google Scholar 

  15. Li, B., Im, E.G.: Smartphone, promising battlefield for hackers. Journal of Security Engineering 8, 89–110 (2011) ISSN : 1738-7531

    Google Scholar 

  16. Microsoft Corporation. Microsoft security intelligence report, vol. 11 (2011), http://www.microsoft.com/security/sir/default.aspx (last access June 20, 2012)

  17. Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: NDSS 2011, San Diego, CA, pp. 17–33 (February 2011)

    Google Scholar 

  18. Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: Towards formal analysis of the permission-based security model for android. In: ICWMC 2009, pp. 87–92. IEEE, Washington, DC (2009)

    Google Scholar 

  19. Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the android framework. In: SOCIALCOM 2010, pp. 944–951. IEEE, Washington, DC (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Struse, E., Seifert, J., Üllenbeck, S., Rukzio, E., Wolf, C. (2012). PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems. In: Paternò, F., de Ruyter, B., Markopoulos, P., Santoro, C., van Loenen, E., Luyten, K. (eds) Ambient Intelligence. AmI 2012. Lecture Notes in Computer Science, vol 7683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34898-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34898-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34897-6

  • Online ISBN: 978-3-642-34898-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics