Evolution of Android's Permission-based Security Model and Challenges
- URL: http://arxiv.org/abs/2601.00252v1
- Date: Thu, 01 Jan 2026 08:02:44 GMT
- Title: Evolution of Android's Permission-based Security Model and Challenges
- Authors: Rajendra Kumar Solanki, Vijay Laxmi, Manoj Singh Gaur,
- Abstract summary: The survey's focal point is the Android permission model and relevant research between 2010-2022.<n>We systematize the knowledge on (i) Android API Calls to permissions mapping, (ii) Android Permissions evolution, and (iii) how permissions are checked.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Android Permission Model and Application (app) analysis has consistently remained the focus of the investigation of research groups and stakeholders of the Android ecosystem since it was launched in 2008. Even though the Android smartphone operating system (OS) permission model has evolved significantly from `all-or-none access' to `user-chosen dangerous resource access', specific challenges and issues remain unresolved even after 15 years after the smartphone OS launch. This study addresses the issues and documents the research work in this arena through a comprehensive literature survey and comparative analysis. The survey's focal point is the Android permission model and relevant research between 2010-2022. We systematize the knowledge on (i) Android API Calls to permissions mapping, (ii) Android Permissions evolution, and (iii) how permissions are checked. Furthermore, the survey identifies the permission-related issues and relevant research addressed during the last decade. We reference seminal work in these areas. We summarize the identified research gaps and present future directions for early and experienced researchers.
Related papers
- Bamboo: LLM-Driven Discovery of API-Permission Mappings in the Android Framework [22.145558720584713]
The official API documentation by Android chronically suffers from imprecision and incompleteness.<n>Recent efforts in improving permission specification primarily leverage static and dynamic code analyses to uncover API-permission mappings.<n>This paper introduces a pioneering approach utilizing large language models (LLMs) for a systematic examination of API-permission mappings.
arXiv Detail & Related papers (2025-10-05T07:50:44Z) - A Comprehensive Analysis of Evolving Permission Usage in Android Apps: Trends, Threats, and Ecosystem Insights [9.172402449557264]
Despite official Android platform documentation on proper permission usage, there are still many cases of permission abuse.<n>This study provides a comprehensive analysis of the Android permission landscape.<n>By distinguishing between benign and malicious applications, we uncover developers' evolving strategies.
arXiv Detail & Related papers (2025-08-04T02:54:10Z) - Model Inversion Attacks: A Survey of Approaches and Countermeasures [69.18069679327263]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.<n>Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.<n>This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures [50.987594546912725]
Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations.
This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures.
arXiv Detail & Related papers (2024-03-31T12:44:48Z) - Software Engineering for OpenHarmony: A Research Roadmap [50.56072657598223]
Existing research efforts mainly focus on popular mobile platforms, namely Android and iOS.
OpenHarmony, a newly open-sourced mobile platform, has rarely been considered.
We present to the mobile software engineering community a research roadmap for encouraging our fellow researchers to contribute promising approaches to OpenHarmony.
arXiv Detail & Related papers (2023-11-02T15:27:09Z) - Investigating Software Developers' Challenges for Android Permissions in
Stack Overflow [0.9821874476902969]
This study investigates the permission-related challenges developers face on the crowdsourcing platform Stack Overflow.
We conducted qualitative and quantitative analyses on 3,327 permission-related questions and 3,271 corresponding answers.
Our study indicates the need for clear, consistent documentation to guide the use of permissions and reduce developer misunderstanding.
arXiv Detail & Related papers (2023-10-31T18:37:03Z) - On building machine learning pipelines for Android malware detection: a
procedural survey of practices, challenges and opportunities [4.8460847676785175]
As the smartphone market leader, Android has been a prominent target for malware attacks.
For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible.
While some of the proposed approaches achieve high performance, rapidly evolving Android malware has made them unable to maintain their accuracy over time.
arXiv Detail & Related papers (2023-06-12T13:52:28Z) - An Empirical Study of AI Techniques in Mobile Applications [10.43634556488264]
We conducted the most extensive empirical study on AI applications, exploring on-device ML apps, on-device DL apps, and AI service-supported (cloud-based) apps.
Our study has strong implications for AI app developers, users, and AI R&D.
arXiv Detail & Related papers (2022-12-03T15:31:34Z) - MIPI 2022 Challenge on Under-Display Camera Image Restoration: Methods
and Results [92.61915017739895]
We summarize and review the Under-Display Camera (UDC) Image Restoration track on MIPI 2022.
In total, 167 participants were successfully registered, and 19 teams submitted results in the final testing phase.
The developed solutions in this challenge achieved state-of-the-art performance on Under-Display Camera Image Restoration.
arXiv Detail & Related papers (2022-09-15T05:13:25Z) - Brief View and Analysis to Latest Android Security Issues and Approaches [0.0]
We conduct a wide range of analysis, including latest malwares, Android security features, and approaches.
We also provide some finding when we are gathering information and carrying on experiments.
arXiv Detail & Related papers (2021-09-02T09:34:11Z) - Survey on the Analysis and Modeling of Visual Kinship: A Decade in the
Making [66.72253432908693]
Kinship recognition is a challenging problem with many practical applications.
We review the public resources and data challenges that enabled and inspired many to hone-in on the views.
For the tenth anniversary, the demo code is provided for the various kin-based tasks.
arXiv Detail & Related papers (2020-06-29T13:25:45Z) - Towards Palmprint Verification On Smartphones [62.279124220123286]
Studies in the past two decades have shown that palmprints have outstanding merits in uniqueness and permanence.
We built a DCNN-based palmprint verification system named DeepMPV+ for smartphones.
The efficiency and efficacy of DeepMPV+ have been corroborated by extensive experiments.
arXiv Detail & Related papers (2020-03-30T08:31:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.