A methodology for empirical analysis of permission-based security models and its application to android

David Barrera, Hilmi Gunes Kayacik, Paul Van Oorschot, Anil Somayaji

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    364 Citations (Scopus)

    Abstract

    Permission-based security models provide controlled access to various system resources. The expressiveness of the permission set plays an important role in providing the right level of granularity in access control. In this work, we present a methodology for the empirical analysis of permission-based security models which makes novel use of the Self-Organizing Map (SOM) algorithm of Kohonen (2001). While the proposed methodology may be applicable to a wide range of architectures, we analyze 1,100 Android applications as a case study.
    Original languageEnglish
    Title of host publicationProceedings of the 17th ACM conference on Computer and Communications Security (CCS'10)
    PublisherAssociation for Computing Machinery (ACM)
    Pages73-84
    Number of pages12
    ISBN (Print)9781450302449
    DOIs
    Publication statusPublished - 2010
    Event17th ACM Conference on Computer and Communications Security - Hyatt Regency Chicago, Chicago, United States
    Duration: 4 Oct 20108 Oct 2010

    Conference

    Conference17th ACM Conference on Computer and Communications Security
    Abbreviated titleCCS 2010
    Country/TerritoryUnited States
    CityChicago
    Period4/10/108/10/10

    Keywords

    • access control
    • visualization
    • permission-based security
    • self-organizing maps
    • smartphone operating systems

    Fingerprint

    Dive into the research topics of 'A methodology for empirical analysis of permission-based security models and its application to android'. Together they form a unique fingerprint.

    Cite this