A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
We performed a 36-person field study to explore the notion of "contextual integrity," i.e., how often applications access protected resources when users are not expecting it. ... At least 80% of our participants would have preferred to prevent at least one permission request, and overall, they stated a desire to block over a third of all requests. ... This field study involved 36 participants over the course of one week of normal smartphone usage. ...doi:10.5281/zenodo.3264702 fatcat:eei3kxaqebfefgd3z2gvmiqx64
We performed a 36-person field study to explore the notion of "contextual integrity," that is, how often are applications accessing protected resources when users are not expecting it? ... We found out that at least 80% of our participants would have preferred to prevent at least one permission request, and overall, they thought that over a third of requests were invasive and desired a mechanism ... This field study involved 36 participants over the course of one week of normal smartphone usage. ...arXiv:1504.03747v1 fatcat:iacaahv3gzgm3mjooffarzdrma
We present a systematization of Android security and privacy research with a focus on the appification of software systems. ... Many security and privacy proposals focus entirely on the Android OS and do not take advantage of the unique features and actors of an appified ecosystem, which could be used to roll out new security mechanisms ...  present a field study of 20,400 Android devices to measure the prevalence of Android platform specific bugs in the wild. ...doi:10.1109/sp.2016.33 dblp:conf/sp/Acar0BFM016 fatcat:xxyvxkbjp5biflq4nypse3byam
A lack of focus on usability in libraries, documentation, and tools that they have to use for security-critical components may exacerbate the problem by blowing up the investment of time and effort needed ... To solve this, human factors research in security and privacy focus on the users of technology and consider their security needs. ... The guidelines we found covered mobile application security (Android, iOS and Windows Mobile), web security, and general secure programming. ...doi:10.17192/z2021.0231 fatcat:qgxcudmzdjgr5nd2g35uuvxkti