With the rapid growth of the mobile market, security of mobile platforms is receiving increasing attention from both research community as well as the public. In this paper, we make the first attempt to establish a baseline for security comparison between the two most popular mobile platforms. We investigate applications that run on both Android and iOS and examine the difference in the usage of their security sensitive APIs (SS-APIs). Our analysis over 2,600 applications shows that iOS applications consistently access more SS-APIs than their counterparts on Android. The additional privileges gained on iOS are often associated with accessing private resources such as device ID, camera, and users’ contacts. A possible explanation for this difference in SS-API usage is that privileges obtained by an application on the current iOS platform are invisible to end users. Our analysis shows that: 1) third-party libraries (specifically advertising and analytic libraries) on iOS invoke more SS-APIs than those on Android; 2) Android application developers avoid requesting unnecessary privileges which will be shown in the permission list during application installation. Considering the fact that an Android application may gain additional privileges with privilege-escalation attacks and iOS provides a more restricted privilege set accessible by third-party applications, our results do not necessarily imply that Android provides better privacy protection than iOS. However, our evidence suggests that Apple’s application vetting process may not be as effective as Android’s privilege notification mechanism, particularly in protecting sensitive resources from third-party applications.
Databases and Information Systems | Information Security
Data Management and Analytics; Cybersecurity
International Conference on Secure Knowledge Management in Big-data Era (SKM 2014), 8-9 December
City or Country
Han, Jin; Yan, Qiang; GAO, Debin; Zhou, Jianying; and DENG, Huijie Robert.
Android or iOS for Better Privacy Protection?. (2014). International Conference on Secure Knowledge Management in Big-data Era (SKM 2014), 8-9 December. 1-10. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/2632
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.