Andriotis, P;
Sasse, MA;
Stringhini, G;
(2016)
Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model.
In:
2016 IEEE International Workshop on Information Forensics and Security (WIFS).
Institute of Electrical and Electronics Engineers (IEEE): Abu Dhabi, UAE.
Preview |
Text
permissions-WIFS16.pdf - Accepted Version Download (178kB) | Preview |
Abstract
The Android operating system changed its security and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the traditional coarse-grained permission system was anticipated for a long time by privacy-aware users. This paper presents the first study that analyzes Android users' adaptation to the fine-grained runtime permission model, regarding their security and privacy controls. We gathered anonymous data from 50 participants who downloaded our application and answered questions related to the new permission model. The results indicate that the majority of users prefer the new model. We also collected data that demonstrate users' security controls at the given time. Our analysis shows that individuals make consistent choices regarding the resources they allow to various applications to access.
Type: | Proceedings paper |
---|---|
Title: | Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model |
Event: | 8th IEEE International Workshop on Information Forensics and Security (WIFS) |
Location: | Abu Dhabi, UAE |
Dates: | 07 December 2016 - 09 December 2016 |
ISBN-13: | 978150901138-4 |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1109/WIFS.2016.7823922 |
Publisher version: | https://doi.org/10.1109/WIFS.2016.7823922 |
Language: | English |
Additional information: | Copyright © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Androids, Humanoid robots, Security, Privacy, Runtime, Adaptation models, Operating systems |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/1522061 |
Archive Staff Only
View Item |