We have a paper at IEEE WIFS 2018. See you at Hong Kong.
We study how users utilize the run time permission model on Android devices.
Past papers on this theme:
P. Andriotis, G. Stringhini, and M.A. Sasse. Studying users' adaptation to Android's run-time fine-grained access control system. Journal of Information Security and Applications. 40: 31-43 (2018).
P. Andriotis, L. Shancang, T. Spyridopoulos, and G. Stringhini. A comparative study of Android users' privacy preferences under the runtime permission model. In T. Tryfonas, editor, Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2017), Held as Part of HCI International 2017, Vancouver, Canada, July 12-14, 2017. Springer International Publishing, 2017.
P. Andriotis, M. A. Sasse, and G. Stringhini. Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1-6, Dec 2016. doi:10.1109/WIFS.2016.7823922.
This is a dataset containing permission data from anonymous users.
Get the dataset from the UCL Discovery Repository
We would like you to acknowledge our work (citing our papers) if you use the dataset. Thank you.