29.11.2012 Views

2nd USENIX Conference on Web Application Development ...

2nd USENIX Conference on Web Application Development ...

2nd USENIX Conference on Web Application Development ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(a) Prevalence of Dangerous permissi<strong>on</strong>s, by category.<br />

Category Free Paid<br />

NETWORK** 87.3 % 66 %<br />

SYSTEM TOOLS 39.7 % 50 %<br />

STORAGE** 34.1 % 50 %<br />

LOCATION** 38.9 % 25 %<br />

PHONE CALLS 32.5 % 35 %<br />

PERSONAL INFO 18.4 % 13 %<br />

HARDWARE CONTROLS 12.5 % 17 %<br />

COST MONEY 10.6 % 9 %<br />

MESSAGES 3.7 % 5 %<br />

ACCOUNTS 2.6 % 2 %<br />

DEVELOPMENT TOOLS 0.35 % 0 %<br />

(b) The most frequent Dangerous permissi<strong>on</strong>s and their categories.<br />

Permissi<strong>on</strong> (Category) Free Paid<br />

INTERNET** (NETWORK) 86.6 % 65 %<br />

WRITE EXTERNAL STORAGE** (STORAGE) 34.1 % 50 %<br />

ACCESS COARSE LOCATION** (LOCATION) 33.4 % 20 %<br />

READ PHONE STATE (PHONE CALLS) 32.1 % 35 %<br />

WAKE LOCK** (SYSTEM TOOLS) 24.2 % 40 %<br />

ACCESS FINE LOCATION (LOCATION) 23.4 % 24 %<br />

READ CONTACTS (PERSONAL INFO) 16.1 % 11 %<br />

WRITE SETTINGS (SYSTEM TOOLS) 13.4 % 18 %<br />

GET TASKS* (SYSTEM TOOLS) 4.4 % 11 %<br />

Table 2: Survey of 856 free and 100 paid Android applicati<strong>on</strong>s. We indicate significant difference between the free and paid<br />

applicati<strong>on</strong>s at 1% (**) and 5% (*) significance levels.<br />

As far as we are aware, n<strong>on</strong>e of the paid applicati<strong>on</strong>s<br />

in our data set are signed or distributed by device manufacturers.<br />

Three of the paid applicati<strong>on</strong>s request Signature<br />

permissi<strong>on</strong>s, and five request SignatureOrSystem<br />

permissi<strong>on</strong>s. Of the free applicati<strong>on</strong>s, 25 request Signature<br />

permissi<strong>on</strong>s, 30 request SignatureOrSystem permissi<strong>on</strong>s,<br />

and four request both. We have found four<br />

of the aforementi<strong>on</strong>ed free applicati<strong>on</strong>s pre-installed <strong>on</strong><br />

ph<strong>on</strong>es; the remainder will not receive the permissi<strong>on</strong>s<br />

<strong>on</strong> a typical device. Requests for unobtainable permissi<strong>on</strong>s<br />

may be developer error or leftover from testing.<br />

3.2.3 Evaluati<strong>on</strong><br />

User C<strong>on</strong>sent. Nearly all applicati<strong>on</strong>s (93% of free and<br />

82% of paid) ask for at least <strong>on</strong>e Dangerous permissi<strong>on</strong>,<br />

which indicates that users are accustomed to installing<br />

applicati<strong>on</strong>s with Dangerous permissi<strong>on</strong>s. The<br />

INTERNET permissi<strong>on</strong> is so widely requested that users<br />

cannot c<strong>on</strong>sider its warning anomalous. Security guidelines<br />

or anti-virus programs that warn against installing<br />

applicati<strong>on</strong>s with access to both the Internet and pers<strong>on</strong>al<br />

informati<strong>on</strong> are likely to fail because almost all applicati<strong>on</strong>s<br />

with pers<strong>on</strong>al informati<strong>on</strong> also have INTERNET.<br />

Several important categories are requested relatively<br />

infrequently, which is a positive finding. Permissi<strong>on</strong>s<br />

in the PERSONAL INFO and COST MONEY categories<br />

are <strong>on</strong>ly requested by a fifth and a tenth of applicati<strong>on</strong>s,<br />

respectively. The PERSONAL INFO category includes<br />

permissi<strong>on</strong>s associated with the user’s c<strong>on</strong>tacts, calendar,<br />

etc.; COST MONEY permissi<strong>on</strong>s let applicati<strong>on</strong>s send<br />

text messages or make ph<strong>on</strong>e calls without user c<strong>on</strong>firmati<strong>on</strong><br />

4 . Users have reas<strong>on</strong> to be suspicious of applicati<strong>on</strong>s<br />

that ask for permissi<strong>on</strong>s in these categories. However,<br />

users may not notice these rare warnings because<br />

the overall rate is so high.<br />

4 The separate PHONE CALLS category c<strong>on</strong>tains permissi<strong>on</strong>s that<br />

modify teleph<strong>on</strong>y state but do not cost the user m<strong>on</strong>ey.<br />

6<br />

Defense in Depth. Given the prevalence of Dangerous<br />

permissi<strong>on</strong>s, an applicati<strong>on</strong> vulnerability is likely to occur<br />

in an applicati<strong>on</strong> with at least <strong>on</strong>e Dangerous permissi<strong>on</strong>.<br />

However, the average Android applicati<strong>on</strong> is much<br />

less privileged than a traditi<strong>on</strong>al operating system program.<br />

Every desktop Windows applicati<strong>on</strong> has full privileges,<br />

whereas no Android applicati<strong>on</strong> in our set requests<br />

more than half of the available Dangerous permissi<strong>on</strong>s.<br />

A majority of the Android applicati<strong>on</strong>s ask for less than<br />

seven, and <strong>on</strong>ly 10% have access to functi<strong>on</strong>ality that<br />

costs the user m<strong>on</strong>ey. This is a significant improvement<br />

over the traditi<strong>on</strong>al full-privilege, user-based approach.<br />

Review Triaging. A hypothetical review process could<br />

exempt applicati<strong>on</strong>s that do not have Dangerous permissi<strong>on</strong>s.<br />

Unfortunately, this al<strong>on</strong>e would not reduce reviewer<br />

workload much. Only 18% of paid and 7% of free<br />

applicati<strong>on</strong>s would be exempt from review. To improve<br />

this, a review process could also exclude applicati<strong>on</strong>s<br />

whose <strong>on</strong>ly Dangerous permissi<strong>on</strong> is INTERNET. An<br />

applicati<strong>on</strong> with <strong>on</strong>ly the INTERNET permissi<strong>on</strong> cannot<br />

leak sensitive pers<strong>on</strong>al informati<strong>on</strong> because reading user<br />

data requires a sec<strong>on</strong>d permissi<strong>on</strong>. This would increase<br />

the number of exempt applicati<strong>on</strong>s to 22% of paid and<br />

21% of free applicati<strong>on</strong>s.<br />

4 Reducing Applicati<strong>on</strong> Privileges<br />

Our applicati<strong>on</strong> survey indicates that up-fr<strong>on</strong>t permissi<strong>on</strong><br />

declarati<strong>on</strong>s can promote defense in depth security and<br />

provide moderate review triaging advantages. However,<br />

a large number of applicati<strong>on</strong>s still ask for dangerous<br />

permissi<strong>on</strong>s. Decreasing the number of privileges that<br />

applicati<strong>on</strong>s require to functi<strong>on</strong> will improve the utility<br />

of permissi<strong>on</strong>s. We investigate factors that influence permissi<strong>on</strong><br />

requirements and present corresp<strong>on</strong>ding suggesti<strong>on</strong>s<br />

for reducing the frequency of permissi<strong>on</strong> usage.<br />

80 <strong>Web</strong>Apps ’11: <str<strong>on</strong>g>2nd</str<strong>on</strong>g> <str<strong>on</strong>g>USENIX</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> <strong>on</strong> <strong>Web</strong> Applicati<strong>on</strong> <strong>Development</strong> <str<strong>on</strong>g>USENIX</str<strong>on</strong>g> Associati<strong>on</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!