Abstract
Current smartphone operating systems enable users to manage permissions according to their personal preferences with a runtime permission model. Nonetheless, the systems provide very limited information when requesting permissions, making it difficult for users to understand permissions' capabilities and potentially induced risks. In this paper, we first investigated to what extent current system-provided information can help users understand the scope of permissions and their potential risks. We took a mixed-methods approach by collecting real permission settings from 4,636 Android users, an interview study of 20 participants, and large-scale Internet surveys of 1559 users. Our study identified several common misunderstandings on the runtime permission model among users. We found that only a very small percentage (6.1%) of users can infer the scope of permission groups accurately from the system-provided information. This indicates that the information provided by current systems is far from sufficient. We thereby explored what extra information that systems can provide to help users make more informed permission decisions. By surveying users' common concerns on apps' permission requests, we identified five types of information (i.e., decision factors) that are helpful for users' decisions. We further studied the impact and helpfulness of the factors to users' permission decisions with both positive and negative messages. Our study shows that the background access factor helps most while the grant rate helps the least. Based on the findings, we provide suggestions for system designers to enhance future systems with more permission information.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 30th USENIX Security Symposium |
| Publisher | USENIX Association |
| Pages | 751-768 |
| Number of pages | 18 |
| ISBN (Electronic) | 9781939133243 |
| Publication status | Published - 2021 |
| Externally published | Yes |
| Event | 30th USENIX Security Symposium, USENIX Security 2021 - Virtual, Online Duration: 11 Aug 2021 → 13 Aug 2021 |
Publication series
| Name | Proceedings of the 30th USENIX Security Symposium |
|---|
Conference
| Conference | 30th USENIX Security Symposium, USENIX Security 2021 |
|---|---|
| City | Virtual, Online |
| Period | 11/08/21 → 13/08/21 |
Bibliographical note
Publisher Copyright:© 2021 by The USENIX Association. All rights reserved.
Fingerprint
Dive into the research topics of 'Can systems explain permissions better? Understanding users' misperceptions under smartphone runtime permission model'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver