Android User Study

We study how users utilize the run time permission model on Android devices.

Past papers on this theme:

P. Andriotis, G. Stringhini, and M.A. Sasse. Studying users' adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications. 40: 31-43 (2018).

P. Andriotis, L. Shancang, T. Spyridopoulos, and G. Stringhini. A comparative study of Android users' privacy preferences under the runtime permission model. In T. Tryfonas, editor, Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017), Held as Part of HCI International 2017, Vancouver, Canada, July 12-14, 2017. Springer International Publishing, 2017.

P. Andriotis, M. A. Sasse, and G. Stringhini. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1-6, Dec 2016. doi:10.1109/WIFS.2016.7823922.


This is a data set containing permission data from anonymous users.

Get the data set from the UCL Discovery Repository

We would like you to acknowledge our work (citing our papers) if you use the data set. Thank you.