The Effectiveness of Install-Time Permission Systems for Third-Party Applications
Adrienne Porter Felt and Kate Greenwood and David Wagner
EECS Department, University of California, Berkeley
Technical Report No. UCB/EECS-2010-143
December 3, 2010
http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-143.pdf
In many modern development platforms, application permissions control third-party access to sensitive parts of the API (e.g., the camera or microphone). We study install-time permissions, which the user grants to applications during installation; different applications can receive different install-time permissions. Install-time permissions offer several advantages over traditional user-based permissions, which assign the user's full privileges to all applications. However, these benefits rely on the assumption that applications generally require less than full privileges. We explore whether that assumption is realistic, which provides insight into the value of install-time permission.
We perform case studies on two systems with install-time permissions for third-party applications, the Google Chrome extension platform and the Android OS. We collect the permission requirements of a large set of Google Chrome extensions and Android applications. From this data, we evaluate whether install-time permissions are effective at protecting users. Our results indicate that install-time application permissions have a strong positive impact on system security, but a number of changes could further improve their utility.
BibTeX citation:
@techreport{Felt:EECS-2010-143, Author= {Felt, Adrienne Porter and Greenwood, Kate and Wagner, David}, Title= {The Effectiveness of Install-Time Permission Systems for Third-Party Applications}, Year= {2010}, Month= {Dec}, Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-143.html}, Number= {UCB/EECS-2010-143}, Abstract= {In many modern development platforms, application permissions control third-party access to sensitive parts of the API (e.g., the camera or microphone). We study install-time permissions, which the user grants to applications during installation; different applications can receive different install-time permissions. Install-time permissions offer several advantages over traditional user-based permissions, which assign the user's full privileges to all applications. However, these benefits rely on the assumption that applications generally require less than full privileges. We explore whether that assumption is realistic, which provides insight into the value of install-time permission. We perform case studies on two systems with install-time permissions for third-party applications, the Google Chrome extension platform and the Android OS. We collect the permission requirements of a large set of Google Chrome extensions and Android applications. From this data, we evaluate whether install-time permissions are effective at protecting users. Our results indicate that install-time application permissions have a strong positive impact on system security, but a number of changes could further improve their utility.}, }
EndNote citation:
%0 Report %A Felt, Adrienne Porter %A Greenwood, Kate %A Wagner, David %T The Effectiveness of Install-Time Permission Systems for Third-Party Applications %I EECS Department, University of California, Berkeley %D 2010 %8 December 3 %@ UCB/EECS-2010-143 %U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-143.html %F Felt:EECS-2010-143