dc.contributor.author | Oğul, Murat | |
dc.contributor.author | Baktır, Selçuk | |
dc.contributor.author | Tatlı, Emin İslam | |
dc.date.accessioned | 10.07.201910:49:13 | |
dc.date.accessioned | 2019-07-10T19:37:52Z | |
dc.date.available | 10.07.201910:49:14 | |
dc.date.available | 2019-07-10T19:37:52Z | |
dc.date.issued | 2014 | en_US |
dc.identifier.citation | Oğul, M., Baktır, S. ve Tatlı, E. İ. (2014). Abused android permissions by advertising networks. International Conference on IT Convergence and Security (ICITCS). Beijing, Peoples R China, October 28-30, 2014. https://dx.doi.org/10.1109/ICITCS.2014.7021726 | en_US |
dc.identifier.isbn | 9781479965410 | |
dc.identifier.issn | 2473-0122 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12511/1490 | |
dc.identifier.uri | https://dx.doi.org/10.1109/ICITCS.2014.7021726 | |
dc.description.abstract | Android is the leading mobile operating system for smart phone and mobile tablet platforms. Since these mobile devices contain personal and sensitive data, security is a big challenge for them. Even though various security features are supported by Android, its permission model is quite problematic from usability and privacy aspects. When users want to install an application, they must grant all requested permissions. Since manually checking dozens of permissions is cumbersome, users ignore it and accept permissions without reading them. In Google Play Store, there exist thousands of applications that request more permissions than they actually need. Applications with unnecessary permissions can misuse their permissions and endanger their users' security and privacy. Especially, advertising network libraries, integrated within applications, request many unnecessary permissions and get unauthorized access to users' personal data. In this paper, we explain the results of our study which analyzes several advertising networks, their permission requests and behavior for accessing critical resources. | en_US |
dc.description.sponsorship | IEEE | en_US |
dc.description.sponsorship | IEEE Computer Society | en_US |
dc.description.sponsorship | Inst Creative Advanced Technologies Sci & Engn | en_US |
dc.description.sponsorship | University of Science and Technology Beijing | en_US |
dc.description.sponsorship | Kyonggi University | en_US |
dc.description.sponsorship | Korea Ind Security Forum | en_US |
dc.description.sponsorship | Korean Convergence Security Assoc | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Advertising Networks | en_US |
dc.subject | Android Permissions | en_US |
dc.subject | Android Security | en_US |
dc.subject | Mobile Security | en_US |
dc.title | Abused android permissions by advertising networks | en_US |
dc.type | conferenceObject | en_US |
dc.relation.ispartof | International Conference on IT Convergence and Security (ICITCS) | en_US |
dc.department | İstanbul Medipol Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Elektrik ve Elektronik Mühendisliği Bölümü | en_US |
dc.authorid | 0000-0003-4562-8486 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1109/ICITCS.2014.7021726 | en_US |