For the current REF see the REF 2021 website REF 2021 logo

Output details

11 - Computer Science and Informatics

Glasgow Caledonian University

Return to search Previous output Next output
Output 0 of 0 in the submission
Output title

A methodology for empirical analysis of permission-based security models and its application to android

Type
E - Conference contribution
Name of conference/published proceedings
Proceedings of the 17th ACM conference on Computer and Communications Security (CCS'10)
Volume number
-
Issue number
-
First page of article
73
ISSN of proceedings
-
Year of publication
2010
URL
-
Number of additional authors
3
Additional information

<19> Significance: Published in ACM CCS, one of the most competitive conferences in computer security with an acceptance rate of 17%. Originality: This study was one of the earlier systematic studies of Android applications. Also, it provides a 2-dimensional visualization of over 1000 applications. Rigour: Provides a data driven analysis of Android permission models. It takes the Android ecosystem as defined by the most popular 1000 applications and reveals that the way developers use the built-in security features does not match the original design expectations. Kayacik performed the data analysis and wrote 40-50% of the paper.

Interdisciplinary
-
Cross-referral requested
-
Research group
None
Citation count
33
Proposed double-weighted
No
Double-weighted statement
-
Reserve for a double-weighted output
No
Non-English
No
English abstract
-