There are many apps for that: Quantifying the availability of privacy-preserving apps
The adage \there's an app for that" holds true in modern app stores. Indeed, app stores usually go further and provide multiple apps with very similar functionality; examples range from flashlight apps to alarm clocks. We call these functionally-similar apps. When searching for these apps,...
Main Authors: | , , |
---|---|
Format: | Conference item |
Published: |
Association for Computing Machinery
2017
|
Subjects: |
_version_ | 1797058783045746688 |
---|---|
author | Taylor, V Beresford, A Martinovic, I |
author_facet | Taylor, V Beresford, A Martinovic, I |
author_sort | Taylor, V |
collection | OXFORD |
description | The adage \there's an app for that" holds true in modern app stores. Indeed, app stores usually go further and provide multiple apps with very similar functionality; examples range from flashlight apps to alarm clocks. We call these functionally-similar apps. When searching for these apps, users are often presented with a vast array of choices, but no distinction is made in the user interface to highlight the relative privacy risks inherent in choosing one app over an- other. Yet the availability of many functionally-similar apps raises the question of whether some apps are significantly less invasive than others. In this paper, we take several steps toward answering this question. We begin by enumer- ating 2 500 groups of functionally-similar apps in the Google Play Store. Within groups of apps, we use static analysis to understand the real-world risks coming from apps with aggressive permission usage. By leveraging an established ranking system, and combining it with real-world data from over 28 000 Android devices, we quantify the improvements that can be made if users installed apps with privacy in mind. We observe that at least 25.6% of apps contain li- braries that gratuitously exploit available permissions and find that 43.5% of apps could be swapped for comparable alternatives that require fewer permissions. Permissions saved may deliver important privacy and security improvements, including preventing access to the calendar (in 24% of cases), sending text messages (12%) and recording audio (8%). This is particularly important for apps which embed third-party libraries, since library code executes with the same permissions as the app itself. |
first_indexed | 2024-03-06T19:55:12Z |
format | Conference item |
id | oxford-uuid:2553b01c-945c-4805-982d-f92a4201a63f |
institution | University of Oxford |
last_indexed | 2024-03-06T19:55:12Z |
publishDate | 2017 |
publisher | Association for Computing Machinery |
record_format | dspace |
spelling | oxford-uuid:2553b01c-945c-4805-982d-f92a4201a63f2022-03-26T11:55:06ZThere are many apps for that: Quantifying the availability of privacy-preserving appsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:2553b01c-945c-4805-982d-f92a4201a63f*subject*Symplectic Elements at OxfordAssociation for Computing Machinery2017Taylor, VBeresford, AMartinovic, IThe adage \there's an app for that" holds true in modern app stores. Indeed, app stores usually go further and provide multiple apps with very similar functionality; examples range from flashlight apps to alarm clocks. We call these functionally-similar apps. When searching for these apps, users are often presented with a vast array of choices, but no distinction is made in the user interface to highlight the relative privacy risks inherent in choosing one app over an- other. Yet the availability of many functionally-similar apps raises the question of whether some apps are significantly less invasive than others. In this paper, we take several steps toward answering this question. We begin by enumer- ating 2 500 groups of functionally-similar apps in the Google Play Store. Within groups of apps, we use static analysis to understand the real-world risks coming from apps with aggressive permission usage. By leveraging an established ranking system, and combining it with real-world data from over 28 000 Android devices, we quantify the improvements that can be made if users installed apps with privacy in mind. We observe that at least 25.6% of apps contain li- braries that gratuitously exploit available permissions and find that 43.5% of apps could be swapped for comparable alternatives that require fewer permissions. Permissions saved may deliver important privacy and security improvements, including preventing access to the calendar (in 24% of cases), sending text messages (12%) and recording audio (8%). This is particularly important for apps which embed third-party libraries, since library code executes with the same permissions as the app itself. |
spellingShingle | *subject* Taylor, V Beresford, A Martinovic, I There are many apps for that: Quantifying the availability of privacy-preserving apps |
title | There are many apps for that: Quantifying the availability of privacy-preserving apps |
title_full | There are many apps for that: Quantifying the availability of privacy-preserving apps |
title_fullStr | There are many apps for that: Quantifying the availability of privacy-preserving apps |
title_full_unstemmed | There are many apps for that: Quantifying the availability of privacy-preserving apps |
title_short | There are many apps for that: Quantifying the availability of privacy-preserving apps |
title_sort | there are many apps for that quantifying the availability of privacy preserving apps |
topic | *subject* |
work_keys_str_mv | AT taylorv therearemanyappsforthatquantifyingtheavailabilityofprivacypreservingapps AT beresforda therearemanyappsforthatquantifyingtheavailabilityofprivacypreservingapps AT martinovici therearemanyappsforthatquantifyingtheavailabilityofprivacypreservingapps |