ABSTRACT

Android is the clear leader in operating systems for smartphones and tablets [1, 5]. Its open source environment and unrestricted application market have attracted many Android app developers. However, Android is also the most targeted platform for attackers at the same time. Although Android has a permission system where users are notified of the permissions and able to cancel the installation, it’s still not fine-grained enough. The users are not aware of how these permissions granted to apps are actually used, what resources they access, when these resources are used and where these resources flow to.