Abstract
Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of granularity in access control. In this work, we present a methodology for the empirical analysis of permission-based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android applications as a case study.
Original language | English |
---|---|
Title of host publication | Proceedings of the 17th ACM conference on Computer and Communications Security (CCS'10) |
Publisher | Association for Computing Machinery (ACM) |
Pages | 73-84 |
Number of pages | 12 |
ISBN (Print) | 9781450302449 |
DOIs | |
Publication status | Published - 2010 |
Event | 17th ACM Conference on Computer and Communications Security - Hyatt Regency Chicago, Chicago, United States Duration: 4 Oct 2010 → 8 Oct 2010 |
Conference
Conference | 17th ACM Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS 2010 |
Country/Territory | United States |
City | Chicago |
Period | 4/10/10 → 8/10/10 |
Keywords
- access control
- visualization
- permission-based security
- self-organizing maps
- smartphone operating systems