Skip to main content

Graphical Representations of Security Settings in Android


Abstract On Android, existing security procedures require apps to request permissions for access to sensitive resources.

Only when the user approves the requested permissions will the app be installed.

However, permissions are an incomplete security mechanism.

In addition to a user's limited understanding of permissions, the mechanism does not account for the possibility that different permissions used together have the ability to be more dangerous than any single permission alone.

Even if users did understand the nature of an app's requested permissions, this mechanism is still not enough to guarantee that a user's information is protected.

Applications can potentially send or receive sensitive information from other applications w... (more)
Created Date 2015
Contributor Gibson, Aaron Scott (Author) / Bazzi, Rida (Advisor) / Ahn, Gail-Joon (Committee member) / Walker, Erin (Committee member) / Arizona State University (Publisher)
Subject Computer science / Android / Graph / Permissions / Security
Type Masters Thesis
Extent 63 pages
Language English
Copyright
Reuse Permissions All Rights Reserved
Note Masters Thesis Computer Science 2015
Collaborating Institutions Graduate College / ASU Library
Additional Formats MODS / OAI Dublin Core / RIS


  Full Text
1.0 MB application/pdf
Download Count: 1101

Description Dissertation/Thesis
  CategoryResults.ods
48.3 KB application/vnd.oasis.opendocument.spreadsheet
Download Count: 606

Description Permission Scores and List of Apps considered for each category.