{"id":"https://openalex.org/W2114275288","doi":"https://doi.org/10.1145/2046707.2046779","title":"Android permissions demystified","display_name":"Android permissions demystified","publication_year":2011,"publication_date":"2011-10-17","ids":{"openalex":"https://openalex.org/W2114275288","doi":"https://doi.org/10.1145/2046707.2046779","mag":"2114275288"},"language":"en","primary_location":{"id":"doi:10.1145/2046707.2046779","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058910481","display_name":"Adrienne Porter Felt","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adrienne Porter Felt","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043450212","display_name":"Erika Chin","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Erika Chin","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113498968","display_name":"Steve Hanna","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steve Hanna","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019426968","display_name":"Dawn Song","orcid":"https://orcid.org/0000-0001-9745-6802"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dawn Song","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062174672","display_name":"David Wagner","orcid":"https://orcid.org/0000-0001-7728-4273"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Wagner","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058910481"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":112.3109,"has_fulltext":false,"cited_by_count":1282,"citation_normalized_percentile":{"value":1.0,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"627","last_page":"638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9194121360778809},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8569519519805908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7677866220474243},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.5680404901504517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5061909556388855},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3968513607978821},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.35304954648017883}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9194121360778809},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8569519519805908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7677866220474243},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.5680404901504517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5061909556388855},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3968513607978821},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35304954648017883},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/2046707.2046779","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.228.3160","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/%7Edaw/papers/androidperm-ccs11.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.229.1126","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.229.1126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/%7Eafelt/android_permissions.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.261.2867","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.261.2867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/%7Edawnsong/papers/2011%20Android%20permissions%20demystified.pdf","raw_type":"text"},{"id":"pmh:oai:berkeley.edu:28722-bk0008q5j7b","is_oa":false,"landing_page_url":"http://techreports.lib.berkeley.edu/accessPages/EECS-2011-48.html","pdf_url":null,"source":{"id":"https://openalex.org/S7407050879","display_name":"UC Berkeley","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"technical reports"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320333591","display_name":"Multidisciplinary University Research Initiative","ror":null},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W81879861","https://openalex.org/W1489067988","https://openalex.org/W1884646655","https://openalex.org/W1986330503","https://openalex.org/W1994588724","https://openalex.org/W2003276999","https://openalex.org/W2101834106","https://openalex.org/W2107709519","https://openalex.org/W2107751709","https://openalex.org/W2129509704","https://openalex.org/W2133824159","https://openalex.org/W2162120832","https://openalex.org/W2167363133","https://openalex.org/W2172260321","https://openalex.org/W2518772410","https://openalex.org/W4253606798"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W2072937473","https://openalex.org/W4210309948","https://openalex.org/W4388923452","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W2070518775","https://openalex.org/W609672658"],"abstract_inverted_index":{"Android":[0,37,42,61,89],"provides":[1],"third-party":[2],"applications":[3,38,112],"with":[4,29,47],"an":[5,30,71],"extensive":[6],"API":[7,26,68,78,90,143],"that":[8,56,70,98,115,129],"includes":[9],"access":[10],"to":[11,19,39,80,93,107,133,141],"phone":[12],"hardware,":[13],"settings,":[14],"and":[15,21,74,113,126],"user":[16],"data.":[17],"Access":[18],"privacy-":[20],"security-relevant":[22],"parts":[23],"of":[24,67,110,124],"the":[25,65,88,95,122],"is":[27,99],"controlled":[28],"install-time":[31],"application":[32,72],"permission":[33,49,96],"system.":[34],"We":[35,51,82,104,120],"study":[36],"determine":[40],"whether":[41],"developers":[43,130],"follow":[44,134],"least":[45,135],"privilege":[46,136],"their":[48],"requests.":[50],"built":[52],"Stowaway,":[53],"a":[54,108],"tool":[55],"detects":[57],"overprivilege":[58,125],"in":[59,91],"compiled":[60],"applications.":[62],"Stowaway":[63,106],"determines":[64],"set":[66,109],"calls":[69,79],"uses":[73],"then":[75],"maps":[76],"those":[77],"permissions.":[81],"used":[83],"automated":[84],"testing":[85],"tools":[86],"on":[87],"order":[92],"build":[94],"map":[97],"necessary":[100],"for":[101],"detecting":[102],"overprivilege.":[103],"apply":[105],"940":[111],"find":[114,127],"about":[116],"one-third":[117],"are":[118,131],"overprivileged.":[119],"investigate":[121],"causes":[123],"evidence":[128],"trying":[132],"but":[137],"sometimes":[138],"fail":[139],"due":[140],"insufficient":[142],"documentation.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":36},{"year":2022,"cited_by_count":55},{"year":2021,"cited_by_count":61},{"year":2020,"cited_by_count":76},{"year":2019,"cited_by_count":91},{"year":2018,"cited_by_count":112},{"year":2017,"cited_by_count":134},{"year":2016,"cited_by_count":140},{"year":2015,"cited_by_count":157},{"year":2014,"cited_by_count":139},{"year":2013,"cited_by_count":133},{"year":2012,"cited_by_count":82}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
