7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Making Smartphone Application Permissions Meaningful for the Average User

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Smartphones hold important private information, yet users routinely expose this information to questionable applications written by developers they know nothing about. Users may be tempted to think of smartphones as old-style dumb phones, not as powerful network-connected computers, and this opens a gap between the permissions-based security paradigm (offered by platforms like Android) and what users expect. This makes it easy to fool users into installing applications that steal their information. Not surprisingly, Android is now a more favored target for hackers than Windows. We propose an approach for closing this gap, based on the observation that the current permissions system--rooted in good ol' UNIX-style thinking--is both too coarse and too fine grained, because it uses the wrong axes for defining the permissions space. We argue for replacing the paradigm in which "an app accesses device resources" (which is foreign to most non-geeks) with a paradigm in which "an app accesses user-tangible services." By using a simple piece of middleware, we can wrap this view of application control around today's permission system, and, by doing so, no conceptual refactoring of applications is required.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Article: not found

          A logic of authentication

            Bookmark

            Author and article information

            Journal
            26 June 2019
            Article
            1906.10873
            bf789550-9c8f-4a26-937e-52a62ba70397

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            History
            Custom metadata
            6 pages, 2 figures
            cs.CR

            Security & Cryptology
            Security & Cryptology

            Comments

            Comment on this article