Graphical Representations of Security Settings in Android
|Abstract||On Android, existing security procedures require apps to request permissions for access to sensitive resources.
Only when the user approves the requested permissions will the app be installed.
However, permissions are an incomplete security mechanism.
In addition to a user's limited understanding of permissions, the mechanism does not account for the possibility that different permissions used together have the ability to be more dangerous than any single permission alone.
Even if users did understand the nature of an app's requested permissions, this mechanism is still not enough to guarantee that a user's information is protected.
Applications can potentially send or receive sensitive information from other applications w... (more)
|Contributor||Gibson, Aaron Scott (Author) / Bazzi, Rida (Advisor) / Ahn, Gail-Joon (Committee member) / Walker, Erin (Committee member) / Arizona State University (Publisher)|
|Subject||Computer science / Android / Graph / Permissions / Security|
|Reuse Permissions||All Rights Reserved|
|Note||Masters Thesis Computer Science 2015|
|Collaborating Institutions||Graduate College / ASU Library|
|Additional Formats||MODS / OAI Dublin Core / RIS|