Custom permission misconfigurations in Android : A Large-scale security analysis

Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps a...

全面介紹

Saved in:
書目詳細資料
Main Authors: LI, Rui, DIAO, Wenrui, GAO, Debin
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2024
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/9856
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
id sg-smu-ink.sis_research-10856
record_format dspace
spelling sg-smu-ink.sis_research-108562024-12-24T02:24:02Z Custom permission misconfigurations in Android : A Large-scale security analysis LI, Rui DIAO, Wenrui GAO, Debin Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps and custom permissions declared by third-party apps. However, the security of custom permissions has not received enough attention from the mobile security community, resulting in a lack of thorough evaluation of security practices for app developers using custom permissions. This study systematically evaluated the misconfiguration of custom permissions by Android app developers. It is based on ten configuration guidelines derived from the Android development documentation, OS source code, and related research papers to ensure proper functioning and adherence to best security practices of custom permissions. The study established the corresponding violation rules and built a dataset containing 174,740 APK files for large-scale measurement and analysis of guideline violations. The measurement results indicate that misconfiguration of custom permissions by Android app developers is quite common, with approximately 29.02% of the 92,461 apps involving custom permissions having configuration guideline violations. The two most common errors in custom permission configuration are 1) putting custom permissions into a defective custom group and 2) protecting components with undeclared custom permissions. Such misconfigurations can lead to various issues, including private app data leaks, app installation failures, or incomplete implementation of app functions. 2024-12-17T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/9856 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Android permissions Android mobile security Customs permissions configurations Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Android permissions
Android mobile security
Customs permissions configurations
Information Security
spellingShingle Android permissions
Android mobile security
Customs permissions configurations
Information Security
LI, Rui
DIAO, Wenrui
GAO, Debin
Custom permission misconfigurations in Android : A Large-scale security analysis
description Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps and custom permissions declared by third-party apps. However, the security of custom permissions has not received enough attention from the mobile security community, resulting in a lack of thorough evaluation of security practices for app developers using custom permissions. This study systematically evaluated the misconfiguration of custom permissions by Android app developers. It is based on ten configuration guidelines derived from the Android development documentation, OS source code, and related research papers to ensure proper functioning and adherence to best security practices of custom permissions. The study established the corresponding violation rules and built a dataset containing 174,740 APK files for large-scale measurement and analysis of guideline violations. The measurement results indicate that misconfiguration of custom permissions by Android app developers is quite common, with approximately 29.02% of the 92,461 apps involving custom permissions having configuration guideline violations. The two most common errors in custom permission configuration are 1) putting custom permissions into a defective custom group and 2) protecting components with undeclared custom permissions. Such misconfigurations can lead to various issues, including private app data leaks, app installation failures, or incomplete implementation of app functions.
format text
author LI, Rui
DIAO, Wenrui
GAO, Debin
author_facet LI, Rui
DIAO, Wenrui
GAO, Debin
author_sort LI, Rui
title Custom permission misconfigurations in Android : A Large-scale security analysis
title_short Custom permission misconfigurations in Android : A Large-scale security analysis
title_full Custom permission misconfigurations in Android : A Large-scale security analysis
title_fullStr Custom permission misconfigurations in Android : A Large-scale security analysis
title_full_unstemmed Custom permission misconfigurations in Android : A Large-scale security analysis
title_sort custom permission misconfigurations in android : a large-scale security analysis
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9856
_version_ 1821237252864344064