Journalartikel

Signalling over-privileged mobile applications using passive security indicators


AutorenlisteLo Iacono, Luigi; Gorski, Peter Leo; Grosse, Josephine; Gruschka, Nils

Jahr der Veröffentlichung2017

Seiten27-33

ZeitschriftJournal of Information Security and Applications

Bandnummer34

HeftnummerPart 1

ISSN2214-2126

eISSN2214-2134

DOI Linkhttps://doi.org/10.1016/j.jisa.2016.11.006

VerlagElsevier


Abstract
As mobile devices have evolved from simple phones to rich computing systems, the data stored on these multi-taskers have consequently become more sensitive and private. Due to this, modern mobile operating systems include sophisticated permission systems for restricting the access to this device for the mobile applications. However, many applications acquire more permissions than required. These over-privileged applications can affect data security and user privacy. All application permissions are indicated to the user, but these notifications have been shown to be ignored or not understood. Thus, other mechanisms need to be improved.This paper presents design approaches to communicate the degree of over-privilege in mobile applications. It uses an additional rating system in application stores to inform users before making the decision of installing a specific application. The approaches have been evaluated in a usability study based on distinct prototype Android application stores. The findings show that passive security indicators can be applied to influence the decision-making process of users before downloading and installing an application. (C) 2016 Elsevier Ltd. All rights reserved.



Zitierstile

Harvard-ZitierstilLo Iacono, L., Gorski, P., Grosse, J. and Gruschka, N. (2017) Signalling over-privileged mobile applications using passive security indicators, Journal of information security and applications, 34(Part 1), pp. 27-33. https://doi.org/10.1016/j.jisa.2016.11.006

APA-ZitierstilLo Iacono, L., Gorski, P., Grosse, J., & Gruschka, N. (2017). Signalling over-privileged mobile applications using passive security indicators. Journal of information security and applications. 34(Part 1), 27-33. https://doi.org/10.1016/j.jisa.2016.11.006


Zuletzt aktualisiert 2025-07-07 um 11:37