Sekander Farooq | Khawaja Yunus Ali University (original) (raw)

Uploads

Papers by Sekander Farooq

Research paper thumbnail of ABSTRACT

In Android Operating System to protect the privacy of end user from intentional and unintentional... more In Android Operating System to protect the privacy of end user from intentional and unintentional malicious activities, a permission-based security model provides that restrict access to privacy relevant areas of the device. Permission system has been revamped with Android 6, it is moving to a run time security model. Whenever an app endeavor to access a restricted area in the platform, the user is prompted for confirmation. We conduct a large scale factual study to get to know how the end user perceives the android permission system, collecting and inspectiong 4.5 millions view about 5572 app published in google play store. Among them, we indentified, classified and analyzed 3574 permission relted revews.

Research paper thumbnail of An Investigation into Android Run-time Permissions from the End Users' Perspective

To protect the privacy of end users from intended or unintended malicious behaviour, the Android ... more To protect the privacy of end users from intended or unintended malicious behaviour, the Android operating system provides a permissions-based security model that restricts access to privacyrelevant parts of the platform. Starting with Android 6, the permission system has been revamped, moving to a run-time model. Users are now prompted for confirmation when an app attempts to access a restricted part of the platform.

Research paper thumbnail of ABSTRACT

In Android Operating System to protect the privacy of end user from intentional and unintentional... more In Android Operating System to protect the privacy of end user from intentional and unintentional malicious activities, a permission-based security model provides that restrict access to privacy relevant areas of the device. Permission system has been revamped with Android 6, it is moving to a run time security model. Whenever an app endeavor to access a restricted area in the platform, the user is prompted for confirmation. We conduct a large scale factual study to get to know how the end user perceives the android permission system, collecting and inspectiong 4.5 millions view about 5572 app published in google play store. Among them, we indentified, classified and analyzed 3574 permission relted revews.

Research paper thumbnail of An Investigation into Android Run-time Permissions from the End Users' Perspective

To protect the privacy of end users from intended or unintended malicious behaviour, the Android ... more To protect the privacy of end users from intended or unintended malicious behaviour, the Android operating system provides a permissions-based security model that restricts access to privacyrelevant parts of the platform. Starting with Android 6, the permission system has been revamped, moving to a run-time model. Users are now prompted for confirmation when an app attempts to access a restricted part of the platform.

Log In