Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Android Permission Model (1607.04256v2)

Published 14 Jul 2016 in cs.CR

Abstract: The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the android apps. Mainly, the access of user data through the apps relied on the users given permission to apps.So, it is always a big question that how different apps on the android smart phones bypass the android permission model to have root access and how user data compromised or stolen by its apps. It is not startling that the Google Play Store has massive number of malicious apps that may gain users attention to fall victim for one, but some time it might be even worse than we thought. In this paper, we will look at the security issues (i.e. rooting phone, malware bypassing and secondary storage) and how easy to get access to users phone by using its app. Furthermore, I will discuss the android update mechanism and its functionalities as well as vulnerability to possible third party bypassing and root access. Moreover, a key feature and source of the all possible access route to android applications I will discuss an android permission model. Finally, I will first time present concept of the feature based development model implementing a feature based permission selections as a solution to android application system and describe the purposed Feature based permission model in detail how it is the solution for current security issues caused by intentional (evil coded) or unintentional (poorly coded) coding using android permission models.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (1)
  1. Chalise Birendra (1 paper)
Citations (9)

Summary

We haven't generated a summary for this paper yet.