Journal article

Signalling over-privileged mobile applications using passive security indicators


Authors listLo Iacono, Luigi; Gorski, Peter Leo; Grosse, Josephine; Gruschka, Nils

Publication year2017

Pages27-33

JournalJournal of Information Security and Applications

Volume number34

Issue numberPart 1

ISSN2214-2126

eISSN2214-2134

DOI Linkhttps://doi.org/10.1016/j.jisa.2016.11.006

PublisherElsevier


Abstract
As mobile devices have evolved from simple phones to rich computing systems, the data stored on these multi-taskers have consequently become more sensitive and private. Due to this, modern mobile operating systems include sophisticated permission systems for restricting the access to this device for the mobile applications. However, many applications acquire more permissions than required. These over-privileged applications can affect data security and user privacy. All application permissions are indicated to the user, but these notifications have been shown to be ignored or not understood. Thus, other mechanisms need to be improved.This paper presents design approaches to communicate the degree of over-privilege in mobile applications. It uses an additional rating system in application stores to inform users before making the decision of installing a specific application. The approaches have been evaluated in a usability study based on distinct prototype Android application stores. The findings show that passive security indicators can be applied to influence the decision-making process of users before downloading and installing an application. (C) 2016 Elsevier Ltd. All rights reserved.



Citation Styles

Harvard Citation styleLo Iacono, L., Gorski, P., Grosse, J. and Gruschka, N. (2017) Signalling over-privileged mobile applications using passive security indicators, Journal of information security and applications, 34(Part 1), pp. 27-33. https://doi.org/10.1016/j.jisa.2016.11.006

APA Citation styleLo Iacono, L., Gorski, P., Grosse, J., & Gruschka, N. (2017). Signalling over-privileged mobile applications using passive security indicators. Journal of information security and applications. 34(Part 1), 27-33. https://doi.org/10.1016/j.jisa.2016.11.006


Last updated on 2025-07-07 at 11:37