I am now a GIAC Certified Forensic Examiner (GCFE).
We study how users utilize the run time permission model on Android devices.
Past papers on this theme:
1) P. Andriotis, and A. Takasu. To Allow, or Deny? That is the Question. In Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy, and Trust (HCI-CPT), Springer International Publishing, 2020.
2) P. Andriotis, G. Stringhini, and M.A. Sasse. Studying users' adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications. 40: 31-43 (2018).
3) P. Andriotis, L. Shancang, T. Spyridopoulos, and G. Stringhini. A comparative study of Android users' privacy preferences under the runtime permission model. In T. Tryfonas, editor, Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017), Held as Part of HCI International 2017, Vancouver, Canada, July 12-14, 2017. Springer International Publishing, 2017.
4) P. Andriotis, M. A. Sasse, and G. Stringhini. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1-6, Dec 2016. doi:10.1109/WIFS.2016.7823922.
This data set contains permission data from anonymous users' devices (Paper No 1).
Get the data set from the UWE Bristol Repository.
We would like you to acknowledge our work (citing our paper) if you use the data set. Thank you.
This data set contains permission data from anonymous users' devices (Paper No 4).
Get the data set from the UCL Discovery Repository
We would like you to acknowledge our work (citing our papers) if you use the data set. Thank you.