dc.contributor.author | Gamba, Julien | |
dc.contributor.author | Feal, Álvaro | |
dc.contributor.author | Blázquez, Eduardo | |
dc.contributor.author | Bandara, Vinuri | |
dc.contributor.author | Razaghpanah, Abbas | |
dc.contributor.author | Tapiador, Juan | |
dc.contributor.author | Vallina-Rodriguez, Narseo | |
dc.date.accessioned | 2023-07-11T13:12:10Z | |
dc.date.available | 2023-07-11T13:12:10Z | |
dc.date.issued | 2023-06 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12761/1715 | |
dc.description.abstract | Android implements a permission system to regulate apps' access to system resources and sensitive user data. One salient feature of this system is its extensibility: apps can define their own custom permissions to expose features and data to other apps. However, little is known about how widespread the usage of custom permissions is, and what is the impact that these permissions can have on users' privacy and security. In this paper, we empirically study the usage of custom permissions at large scale, using a dataset of 2.2M pre-installed and app-store-downloaded apps. We find the usage of custom permissions to be widespread, and seemingly growing over time. Despite this prevalence, we find that custom permissions are virtually invisible to end users, and their purpose mostly undocumented. This lack of transparency can lead to serious security and privacy problems: we show that custom permissions can facilitate access to permission-protected system resources to apps that lack those permissions without user awareness. To detect this practice, we design and implement two static analysis tools, and highlight multiple concerning cases spotted in the wild. We conclude this study with a discussion of potential solutions to mitigate the privacy and security risks of custom permissions. | es |
dc.description.sponsorship | Horizon Europe | es |
dc.description.sponsorship | Spanish Ministry of Science | es |
dc.language.iso | eng | es |
dc.publisher | IEEE | es |
dc.title | Mules and Permission Laundering in Android: Dissecting Custom Permissios in the Wild | es |
dc.type | journal article | es |
dc.journal.title | IEEE Transactions on Dependable and Secure Computing | es |
dc.rights.accessRights | open access | es |
dc.identifier.doi | 10.1109/TDSC.2023.3288981 | es |
dc.page.final | 18 | es |
dc.page.initial | 1 | es |
dc.relation.projectID | 101021377 | es |
dc.relation.projectID | PID2019-111429RBC2 | es |
dc.relation.projectName | TRUST aWARE | es |
dc.relation.projectName | ODIO | es |
dc.subject.keyword | Android, Access control, Custom permissions, Mobile apps, Android Permissions | es |
dc.description.refereed | TRUE | es |
dc.description.status | pub | es |