An Investigation into Android Run-time Permissions from the End Users’ Perspective Gian Luca Scoccia Gran Sasso Science Institute L’Aquila, Italy gianluca.scoccia@gssi.it Stefano Ruberto Gran Sasso Science Institute L’Aquila, Italy stefano.ruberto@gssi.it Ivano Malavolta Vrije Universiteit Amsterdam Amsterdam, The Netherlands i.malavolta@vu.nl Marco Autili University of L’Aquila L’Aquila, Italy marco.autili@univaq.it Paola Inverardi University of L’Aquila L’Aquila, Italy paola.inverardi@univaq.it ABSTRACT To protect the privacy of end users from intended or unintended malicious behaviour, the Android operating system provides a permissions-based security model that restricts access to privacy- relevant parts of the platform. Starting with Android 6, the per- mission system has been revamped, moving to a run-time model. Users are now prompted for confirmation when an app attempts to access a restricted part of the platform. We conducted a large-scale empirical study to investigate how end users perceive the new run-time permission system of Android, collecting and inspecting over 4.3 million user reviews about 5,572 apps published in the Google Play Store. Among them, we iden- tified, classified, and analyzed 3,574 permission-related reviews, employing machine learning and Natural Language Processing techniques. Out of the permission-related reviews, we determined recurring points made by users about the new permission system and classified them into a taxonomy. Results of our analysis sug- gest that, even with the new system, permission-related issues are widespread, with 8% of collected apps having user reviews with negative comments about permissions. We identify a number of points for improvement in the Android run-time permission system, and provide recommendations for future research. KEYWORDS Android, Permissions, Apps, Opinion Mining, Review Analysis, Privacy, Security ACM Reference Format: Gian Luca Scoccia, Stefano Ruberto, Ivano Malavolta, Marco Autili, and Paola Inverardi. 2018. An Investigation into Android Run-time Permissions from the End Users’ Perspective. In MOBILESoft ’18: MOBILESoft ’18: 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems , May 27–28, 2018, Gothenburg, Sweden. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3197231.3197236 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MOBILESoft ’18, May 27–28, 2018, Gothenburg, Sweden © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5712-8/18/05. . . $15.00 https://doi.org/10.1145/3197231.3197236 1 INTRODUCTION As mobile devices provide more advanced features, more sensitive data are manipulated and stored, including not only personal infor- mation but also data collected via sensors [1]. Aiming at protecting the privacy of end users from intended or unintended malicious be- havior, the Android operating system provides a permissions-based security model that restricts the access to security- and privacy- relevant parts of the platform. Past research in the field has evidenced the existence of usability issues within the permission system [24]. Only a minority of users are aware of the implications of their privacy decisions and warning dialogs are not easily understood. Towards addressing these problems, the permission system has been revamped and, starting with Android 6 (i.e., Android API level 23), access to privacy- and security-relevant parts of the platform is enforced by a new run-time permission system. Under the new permission system, users are prompted for confirmation when an app attempts to access a restricted part of the platform for the first time [5]. In this paper, we investigate how end users perceive the new run-time permission system of Android, with the ultimate goal of identifying possible points of improvement present in the per- mission system, despite the recent changes. For this purpose, we conducted a large-scale empirical study on over 4.3 million user reviews about 5,572 apps published on the Google Play Store that adopt the run-time permission system (identified within an ini- tial dataset of over 18 million user reviews belonging to 15,124 apps). By using a combination of an established keyword-based ap- proach [6], we identified among them potential permission-related reviews regarding the new Android permission system. We manu- ally analyzed a statistically representative sample of the reviews, and categorized the main concerns expressed by end users about the new system into a taxonomy. Then, by making use of machine learning and Natural Language Processing (NLP) techniques, we classified a complete set of 3,574 permission-related reviews ac- cording to the previously-built taxonomy. Finally, by analyzing the achieved classification, we identified a number of points for improvement in the new permission system related to, e.g., the lack of clarity of developers when requesting permissions, excessive number of requested permissions, and permission-related bugs. We