File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps

TitleRevDroid: Code analysis of the side effects after dynamic permission revocation of android apps
Authors
KeywordsAndroid Security
Permission Over-claim
Permission Revocation
RevDroid
Issue Date2016
Citation
ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 747-758 How to Cite?
AbstractDynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhan-dled permission revocations during development time and greatly improve the application quality.
Persistent Identifierhttp://hdl.handle.net/10722/346592

 

DC FieldValueLanguage
dc.contributor.authorFang, Zheran-
dc.contributor.authorHan, Weili-
dc.contributor.authorLi, Dong-
dc.contributor.authorGuo, Zeqing-
dc.contributor.authorGuo, Danhao-
dc.contributor.authorWang, Xiaoyang Sean-
dc.contributor.authorQian, Zhiyun-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:11:54Z-
dc.date.available2024-09-17T04:11:54Z-
dc.date.issued2016-
dc.identifier.citationASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 747-758-
dc.identifier.urihttp://hdl.handle.net/10722/346592-
dc.description.abstractDynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also use revDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, revDroid can be used to help developers uncover the unhan-dled permission revocations during development time and greatly improve the application quality.-
dc.languageeng-
dc.relation.ispartofASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security-
dc.subjectAndroid Security-
dc.subjectPermission Over-claim-
dc.subjectPermission Revocation-
dc.subjectRevDroid-
dc.titleRevDroid: Code analysis of the side effects after dynamic permission revocation of android apps-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/2897845.2897914-
dc.identifier.scopuseid_2-s2.0-84979664045-
dc.identifier.spage747-
dc.identifier.epage758-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats