Output details
11 - Computer Science and Informatics
Glasgow Caledonian University
A methodology for empirical analysis of permission-based security models and its application to android
<19> Significance: Published in ACM CCS, one of the most competitive conferences in computer security with an acceptance rate of 17%. Originality: This study was one of the earlier systematic studies of Android applications. Also, it provides a 2-dimensional visualization of over 1000 applications. Rigour: Provides a data driven analysis of Android permission models. It takes the Android ecosystem as defined by the most popular 1000 applications and reveals that the way developers use the built-in security features does not match the original design expectations. Kayacik performed the data analysis and wrote 40-50% of the paper.