Custom permission misconfigurations in Android : A Large-scale security analysis

Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps a...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Rui, DIAO, Wenrui, GAO, Debin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2024
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9856
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10856
record_format dspace
spelling sg-smu-ink.sis_research-108562024-12-24T02:24:02Z Custom permission misconfigurations in Android : A Large-scale security analysis LI, Rui DIAO, Wenrui GAO, Debin Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps and custom permissions declared by third-party apps. However, the security of custom permissions has not received enough attention from the mobile security community, resulting in a lack of thorough evaluation of security practices for app developers using custom permissions. This study systematically evaluated the misconfiguration of custom permissions by Android app developers. It is based on ten configuration guidelines derived from the Android development documentation, OS source code, and related research papers to ensure proper functioning and adherence to best security practices of custom permissions. The study established the corresponding violation rules and built a dataset containing 174,740 APK files for large-scale measurement and analysis of guideline violations. The measurement results indicate that misconfiguration of custom permissions by Android app developers is quite common, with approximately 29.02% of the 92,461 apps involving custom permissions having configuration guideline violations. The two most common errors in custom permission configuration are 1) putting custom permissions into a defective custom group and 2) protecting components with undeclared custom permissions. Such misconfigurations can lead to various issues, including private app data leaks, app installation failures, or incomplete implementation of app functions. 2024-12-17T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/9856 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Android permissions Android mobile security Customs permissions configurations Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Android permissions
Android mobile security
Customs permissions configurations
Information Security
spellingShingle Android permissions
Android mobile security
Customs permissions configurations
Information Security
LI, Rui
DIAO, Wenrui
GAO, Debin
Custom permission misconfigurations in Android : A Large-scale security analysis
description Android’s popularity is due to its openness and vast app ecosystem. Global developers can use Android Studio and rich Android APIs to create their apps. Within this ecosystem, Android permissions play a crucial role in managing access to resources, with system permissions controlled by system apps and custom permissions declared by third-party apps. However, the security of custom permissions has not received enough attention from the mobile security community, resulting in a lack of thorough evaluation of security practices for app developers using custom permissions. This study systematically evaluated the misconfiguration of custom permissions by Android app developers. It is based on ten configuration guidelines derived from the Android development documentation, OS source code, and related research papers to ensure proper functioning and adherence to best security practices of custom permissions. The study established the corresponding violation rules and built a dataset containing 174,740 APK files for large-scale measurement and analysis of guideline violations. The measurement results indicate that misconfiguration of custom permissions by Android app developers is quite common, with approximately 29.02% of the 92,461 apps involving custom permissions having configuration guideline violations. The two most common errors in custom permission configuration are 1) putting custom permissions into a defective custom group and 2) protecting components with undeclared custom permissions. Such misconfigurations can lead to various issues, including private app data leaks, app installation failures, or incomplete implementation of app functions.
format text
author LI, Rui
DIAO, Wenrui
GAO, Debin
author_facet LI, Rui
DIAO, Wenrui
GAO, Debin
author_sort LI, Rui
title Custom permission misconfigurations in Android : A Large-scale security analysis
title_short Custom permission misconfigurations in Android : A Large-scale security analysis
title_full Custom permission misconfigurations in Android : A Large-scale security analysis
title_fullStr Custom permission misconfigurations in Android : A Large-scale security analysis
title_full_unstemmed Custom permission misconfigurations in Android : A Large-scale security analysis
title_sort custom permission misconfigurations in android : a large-scale security analysis
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9856
_version_ 1820027800819597312