skip to main content
10.1145/2702123.2702370acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

Crowdsourced Exploration of Security Configurations

Authors Info & Claims
Published:18 April 2015Publication History

ABSTRACT

Smartphone apps today request permission to access a multitude of sensitive resources, which users must accept completely during installation (e.g., on Android) or selectively configure after installation (e.g., on iOS, but also planned for Android). Everyday users, however, do not have the ability to make informed decisions about which permissions are essential for their usage. For enhanced privacy, we seek to leverage crowdsourcing to find minimal sets of permissions that will preserve the usability of the app for diverse users. We advocate an efficient 'lattice-based' crowd-management strategy to explore the space of permissions sets. We conducted a user study (N = 26) in which participants explored different permission sets for the popular Instagram app. This study validates our efficient crowd management strategy and shows that usability scores for diverse users can be predicted accurately, enabling suitable recommendations.

References

  1. Amini, S., Lin, J., Hong, J. I., Lindqvist, J., and Zhang, J. Mobile application evaluation using automation and crowdsourcing. In Workshop on Privacy Enhancing Tools (July 2013).Google ScholarGoogle Scholar
  2. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., and Shastry, B. Towards taming privilege-escalation attacks on Android. In 19th Network & Distributed System Security Symposium (Feb. 2012).Google ScholarGoogle Scholar
  3. Ekstrand, M. D., Riedl, J. T., and Konstan, J. A. Collaborative filtering recommender systems. Foundations and Trends in Human-Computer Interaction 4, 2 (Feb. 2011), 81--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D. Android permissions demystified. In 18th ACM Conference on Computer and Communications Security (2011), 627--638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Felt, A. P., Greenwood, K., and Wagner, D. The effectiveness of application permissions. In 2nd USENIX Conference on Web Application Development (2011), 75--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In 8th Symposium on Usable Privacy and Security (2012), 3:1--3:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., and Wetherall, D. A conundrum of permissions: Installing applications on an Android smartphone. In Financial Cryptography and Data Security. Springer, 2012, 68--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kelley, P. G., Cranor, L. F., and Sadeh, N. Privacy as part of the app decision-making process. In 2013 ACM Conference on Human Factors in Computing Systems (2013), 3393--3402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kennedy, K., Gustafson, E., and Chen, H. Quantifying the effects of removing permissions from Android applications. In IEEE Mobile Security Technologies (2013).Google ScholarGoogle Scholar
  10. Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J. I., and Zhang, J. Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing. In 2012 ACM Conference on Ubiquitous Computing (2012), 501--510. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., and Ghosh, R. Spotting opinion spammers using behavioral footprints. In 19th ACM Conference on Knowledge Discovery and Data Mining (2013), 632--640. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nauman, M., Khan, S., and Zhang, X. Apex: Extending Android permission model and enforcement with user-defined runtime constraints. In 5th ACM Symposium on Information, Computer and Communications Security (2010), 328--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Resnick, P., Iacovou, N., Bergstrom, M. S. P., and Riedl, J. T. GroupLens: An open architecture for collaborative filtering of netnews. In ACM Conference on Computer Supported Collaborative Work (1994), 175--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Saltzer, J. H., and Schroeder, M. D. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept. 1975).Google ScholarGoogle ScholarCross RefCross Ref
  15. Sarwar, B., Karypis, G., Konstan, J., and Riedl, J. Analysis of recommendation algorithms for e-commerce. In 2nd ACM Conference on Electronic Commerce (2000), 158--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sarwar, B., Karypis, G., Konstan, J., and Riedl, J. Item-based collaborative filtering recommendation algorithms. In 10th International Conference on World Wide Web (2001), 285--295. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Crowdsourced Exploration of Security Configurations

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
          April 2015
          4290 pages
          ISBN:9781450331456
          DOI:10.1145/2702123

          Copyright © 2015 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 April 2015

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader