Filters








5 Hits in 3.7 sec

Android Permissions Remystified: A Field Study on Contextual Integrity

Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, Konstantin Beznosov
2015 Zenodo  
We performed a 36-person field study to explore the notion of "contextual integrity," i.e., how often applications access protected resources when users are not expecting it.  ...  At least 80% of our participants would have preferred to prevent at least one permission request, and overall, they stated a desire to block over a third of all requests.  ...  This field study involved 36 participants over the course of one week of normal smartphone usage.  ... 
doi:10.5281/zenodo.3264702 fatcat:eei3kxaqebfefgd3z2gvmiqx64

Android Permissions Remystified: A Field Study on Contextual Integrity [article]

Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, Konstantin Beznosov
2015 arXiv   pre-print
We performed a 36-person field study to explore the notion of "contextual integrity," that is, how often are applications accessing protected resources when users are not expecting it?  ...  We found out that at least 80% of our participants would have preferred to prevent at least one permission request, and overall, they thought that over a third of requests were invasive and desired a mechanism  ...  This field study involved 36 participants over the course of one week of normal smartphone usage.  ... 
arXiv:1504.03747v1 fatcat:iacaahv3gzgm3mjooffarzdrma

SoK: Lessons Learned from Android Security Research for Appified Software Platforms

Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith
2016 2016 IEEE Symposium on Security and Privacy (SP)  
We present a systematization of Android security and privacy research with a focus on the appification of software systems.  ...  Many security and privacy proposals focus entirely on the Android OS and do not take advantage of the unique features and actors of an appified ecosystem, which could be used to roll out new security mechanisms  ...  [108] present a field study of 20,400 Android devices to measure the prevalence of Android platform specific bugs in the wild.  ... 
doi:10.1109/sp.2016.33 dblp:conf/sp/Acar0BFM016 fatcat:xxyvxkbjp5biflq4nypse3byam

Human Factors in Secure Software Development

Yasemin Acar, Freisleben, Bernd (Prof. Dr.), Mathematik Und Informatik
2021
A lack of focus on usability in libraries, documentation, and tools that they have to use for security-critical components may exacerbate the problem by blowing up the investment of time and effort needed  ...  To solve this, human factors research in security and privacy focus on the users of technology and consider their security needs.  ...  The guidelines we found covered mobile application security (Android, iOS and Windows Mobile), web security, and general secure programming.  ... 
doi:10.17192/z2021.0231 fatcat:qgxcudmzdjgr5nd2g35uuvxkti

"No Country for E-Lit?" – India and Electronic Literature

Souvik Mukherjee
2017 Hyperrhiz  
), can easily misrepresent what is going on in a cultural field.  ...  field.  ...  Know your equipment well and have full confidence in it and yourself before you venture out into the field.  ... 
doi:10.20415/hyp/016.e08 fatcat:ik7x2ivbxjdljoxfh4pyk3vt3y