Mining Permission Request Patterns from Android and Facebook Applications

  title={Mining Permission Request Patterns from Android and Facebook Applications},
  author={M. Frank and Ben Dong and Adrienne Porter Felt and D. Song},
  journal={2012 IEEE 12th International Conference on Data Mining},
  • M. Frank, Ben Dong, +1 author D. Song
  • Published 2012
  • Computer Science, Mathematics
  • 2012 IEEE 12th International Conference on Data Mining
  • Android and Facebook provide third-party applications with access to users' private data and the ability to perform potentially sensitive operations (e.g., post to a user's wall or place phone calls). As a security measure, these platforms restrict applications' privileges with permission systems: users must approve the permissions requested by applications before the applications can make privacy-or security-relevant API calls. However, recent studies have shown that users often do not… CONTINUE READING
    Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings
    • 187
    • PDF
    Mining permission patterns for contrasting clean and malicious android applications
    • 83
    • Highly Influenced
    • PDF
    Quantitative Security Risk Assessment of Android Permissions and Applications
    • 66
    • PDF


    Publications referenced by this paper.
    Android permissions: user attention, comprehension, and behavior
    • 883
    • PDF
    The Effectiveness of Application Permissions
    • 291
    • PDF
    Is this app safe?: a large scale study on application permissions and risk signals
    • 209
    • PDF
    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
    • 768
    • PDF
    On lightweight mobile phone application certification
    • 945
    • PDF
    Role-Based Access Control
    • 1,758
    • PDF
    On the automatic categorisation of android applications
    • 89
    • PDF
    Privacy: is there an app for that?
    • 96
    • PDF