File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2897845.2897914
- Scopus: eid_2-s2.0-84979664045
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps
Title | RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps |
---|---|
Authors | |
Keywords | Android Security Permission Over-claim Permission Revocation RevDroid |
Issue Date | 2016 |
Citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 747-758 How to Cite? |
Abstract | Dynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhan-dled permission revocations during development time and greatly improve the application quality. |
Persistent Identifier | http://hdl.handle.net/10722/346592 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fang, Zheran | - |
dc.contributor.author | Han, Weili | - |
dc.contributor.author | Li, Dong | - |
dc.contributor.author | Guo, Zeqing | - |
dc.contributor.author | Guo, Danhao | - |
dc.contributor.author | Wang, Xiaoyang Sean | - |
dc.contributor.author | Qian, Zhiyun | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:54Z | - |
dc.date.available | 2024-09-17T04:11:54Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 747-758 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346592 | - |
dc.description.abstract | Dynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhan-dled permission revocations during development time and greatly improve the application quality. | - |
dc.language | eng | - |
dc.relation.ispartof | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | - |
dc.subject | Android Security | - |
dc.subject | Permission Over-claim | - |
dc.subject | Permission Revocation | - |
dc.subject | RevDroid | - |
dc.title | RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/2897845.2897914 | - |
dc.identifier.scopus | eid_2-s2.0-84979664045 | - |
dc.identifier.spage | 747 | - |
dc.identifier.epage | 758 | - |