S. Jan, A. Rauf, R. Saeed, N. Fancy, F. Khan, G. Ahmad, K. Azam
{"title":"Monitoring and Controlling Access to Privacy Sensitive Resources of Android System","authors":"S. Jan, A. Rauf, R. Saeed, N. Fancy, F. Khan, G. Ahmad, K. Azam","doi":"10.26692/surj/2020.03.08","DOIUrl":null,"url":null,"abstract":"There has been a significant increase in the use of Android platform in the last decades mainly because of the features that it offers, i.e., open-source architecture, a wide range of Application Programming Interface (API). For controlling access to resources and data, the android platform offers contains a permission management system. However, recently several third-party applications are found abusing the android permission system. Such applications misuse the granted permissions without user knowledge. Some of the researchers have proposed permission managers which revoke the third-party application permissions to stop the misuse. Although such security applications allow users to revoke the app permissions, however, it is difficult for the users to differentiate between a genuine resource access and a malicious access. In this research work, a security application has been developedthat presents useful monitoring information to usersto help them in deciding on which applications should be restricted from using the phone resources and data. It monitors applications' and systems' activities (e.g., process importance, screen on/off information) and calculates the corresponding risk to notify user about the resource access. If further enables the user to revoke the granted permissions to an android application by considering such resource access reports.","PeriodicalId":21859,"journal":{"name":"Sindh University Research Journal","volume":"5 1","pages":"49-56"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sindh University Research Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26692/surj/2020.03.08","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There has been a significant increase in the use of Android platform in the last decades mainly because of the features that it offers, i.e., open-source architecture, a wide range of Application Programming Interface (API). For controlling access to resources and data, the android platform offers contains a permission management system. However, recently several third-party applications are found abusing the android permission system. Such applications misuse the granted permissions without user knowledge. Some of the researchers have proposed permission managers which revoke the third-party application permissions to stop the misuse. Although such security applications allow users to revoke the app permissions, however, it is difficult for the users to differentiate between a genuine resource access and a malicious access. In this research work, a security application has been developedthat presents useful monitoring information to usersto help them in deciding on which applications should be restricted from using the phone resources and data. It monitors applications' and systems' activities (e.g., process importance, screen on/off information) and calculates the corresponding risk to notify user about the resource access. If further enables the user to revoke the granted permissions to an android application by considering such resource access reports.