[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2746285.2764930acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
demonstration

Demo: RecDroid: An Android Resource Access Permission Recommendation System

Published: 22 June 2015 Publication History

Abstract

Nowadays, it is prohibitive for apps market places, such as Google App Store, to thoroughly verify an app's resource permission requests to be legitimate or malicious. As a result, mobile users are left to decide for themselves whether an app is safe to use or not. To assist users to make correct decisions as for whether to accept a permission request or not, we propose RecDroid. RecDroid is a crowdsourcing recommendation framework that collects apps' permission requests and users' responses to those requests, from which an experts ranking algorithm is used to seek expert users in the system and a recommendation algorithm is used to suggest appropriate responses to permission requests (accept or reject) based on experts' responses. In this demo, we demonstrate a user case to show how the RecDroid system assists users in permission control. We also explain the major principles and processes behind that support the RecDroid recommendation system.

References

[1]
B. Rashidi, C. Fung, and T. Vu. Recdroid: A resource access permission control portal and recommendation service for smartphone users. In Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME '14, pages 13--18, New York, NY, USA, 2014. ACM.
[2]
B. Rashidi, C. Fung, and T. Vu. Dude, ask the experts!: Android resource access permission recommendation with recdroid. In 14th IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). IEEE, Ottawa, Canada, 2015.

Cited By

View all
  • (2016)BotTracer: Bot user detection using clustering method in RecDroidNOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS.2016.7502994(1239-1244)Online publication date: Apr-2016

Index Terms

  1. Demo: RecDroid: An Android Resource Access Permission Recommendation System

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiHoc '15: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing
      June 2015
      436 pages
      ISBN:9781450334891
      DOI:10.1145/2746285
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 June 2015

      Check for updates

      Author Tags

      1. android
      2. permission
      3. policy-based
      4. recommendation
      5. smartphone

      Qualifiers

      • Demonstration

      Conference

      MobiHoc'15
      Sponsor:

      Acceptance Rates

      MobiHoc '15 Paper Acceptance Rate 37 of 250 submissions, 15%;
      Overall Acceptance Rate 296 of 1,843 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)BotTracer: Bot user detection using clustering method in RecDroidNOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS.2016.7502994(1239-1244)Online publication date: Apr-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      EPUB

      View this article in ePub.

      ePub

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media