bility for non-complying apps.
ACKNOWLEDGEMENTS
This work is supported by the National Science Foun-
dation (NSF) Grant Number 1850054 and Towson
University OSPR Pilot Research Seed Grant.
REFERENCES
AbouZeid, K. (2020). Phonograph - A material designed
local music player for Android. https://github.com/
kabouzeid/Phonograph. (Accessed on June 15, 2021).
Ali-Gombe, A., Richard III, G. G., Ahmed, I., and Rous-
sev, V. (2016). Don’t touch that column: Portable,
fine-grained access control for android’s native con-
tent providers. In Proceedings of the 9th ACM Con-
ference on Security & Privacy in Wireless and Mobile
Networks, pages 79–90.
Alkindi, Z., Sarrab, M., and Alzidi, N. (2020). Cupa: A
configurable user privacy approach for android mo-
bile application. In 2020 7th IEEE International
Conference on Cyber Security and Cloud Computing
(CSCloud)/2020 6th IEEE International Conference
on Edge Computing and Scalable Cloud (EdgeCom),
pages 216–221. IEEE.
Android (2021). Android open source project. https:
//source.android.com/. (Accessed on June 1, 2021).
Backes, M., Gerling, S., Hammer, C., Maffei, M., and von
Styp-Rekowsky, P. (2012). Appguard-real-time policy
enforcement for third-party applications.
Backes, M., Gerling, S., Hammer, C., Maffei, M., and
von Styp-Rekowsky, P. (2013). Appguard–enforcing
user requirements on android apps. In International
Conference on TOOLS and Algorithms for the Con-
struction and Analysis of Systems, pages 543–548.
Springer.
Beresford, A. R., Rice, A., Skehin, N., and Sohan, R.
(2011). Mockdroid: trading privacy for application
functionality on smartphones. In Proceedings of the
12th workshop on mobile computing systems and ap-
plications, pages 49–54.
Breaux, T. D., Hibshi, H., and Rao, A. (2014). Eddy, a for-
mal language for specifying and analyzing data flow
specifications for conflicting privacy requirements.
Requirements Engineering, 19(3):281–307.
Breaux, T. D. and Schaub, F. (2014). Scaling requirements
extraction to the crowd: Experiments with privacy
policies. In 2014 IEEE 22nd International Require-
ments Engineering Conference (RE), pages 163–172.
IEEE.
Brutschy, L., Ferrara, P., Tripp, O., and Pistoia, M. (2015).
Shamdroid: gracefully degrading functionality in the
presence of limited resource access. ACM SIGPLAN
Notices, 50(10):316–331.
Bugiel, S., Heuser, S., and Sadeghi, A.-R. (2013). Flexi-
ble and fine-grained mandatory access control on an-
droid for diverse security and privacy policies. In 22nd
USENIX Security Symposium, pages 131–146.
Caputo, D., Pagano, F., Bottino, G., Verderame, L., and
Merlo, A. (2021). You can’t always get what you
want: towards user-controlled privacy on android.
arXiv preprint arXiv:2106.02483.
Cate, F. H. (2010). The limits of notice and choice. IEEE
Security & Privacy, 8(2):59–62.
CCPA (2021). California consumer privacy act (ccpa).
https://oag.ca.gov/privacy/ccpa. (Accessed on May
29, 2021).
Chen, X., Huang, H., Zhu, S., Li, Q., and Guan, Q. (2017).
Sweetdroid: Toward a context-sensitive privacy pol-
icy enforcement framework for android os. In Pro-
ceedings of the 2017 on Workshop on Privacy in the
Electronic Society, pages 75–86.
Chen, Y., Zha, M., Zhang, N., Xu, D., Zhao, Q., Feng, X.,
Yuan, K., Suya, F., Tian, Y., Chen, K., et al. (2019).
Demystifying hidden privacy settings in mobile apps.
In Proceedings of IEEE Symposium on Security and
Privacy, pages 570–586. IEEE.
Das, A., Acar, G., Borisov, N., and Pradeep, A. (2018).
The web’s sixth sense: A study of scripts accessing
smartphone sensors. In Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 1515–1532.
DaveTheTytnIIGuy. Is flashing roms legal? well i
went straight to the big guys. https://forum.xda-
developers.com/t/is-flashing-roms-legal-well-i-went-
straight-to-the-big-guys.598449/. (Accessed on June
15, 2021).
Davis, B. and Chen, H. (2013). Retroskeleton: Retrofitting
android apps. In Proceeding of the 11th annual inter-
national conference on Mobile systems, applications,
and services, pages 181–192.
Do, Q., Martini, B., and Choo, K.-K. R. (2014). Enhanc-
ing user privacy on android mobile devices via per-
missions removal. In Proceedings of the 47th Hawaii
International Conference on System Sciences, pages
5070–5079. IEEE.
Doan, S., Ohno-Machado, L., and Collier, N. (2012). En-
hancing twitter data analysis with simple semantic fil-
tering: Example in tracking influenza-like illnesses. In
2012 iEEE second international conference on health-
care informatics, imaging and systems biology, pages
62–71. IEEE.
GDPR (2021). General data protection regulation- gdpr.
https://gdpr-info.eu/. (Accessed on May 29, 2021).
Gluck, J., Schaub, F., Friedman, A., Habib, H., Sadeh, N.,
Cranor, L. F., and Agarwal, Y. (2016). How short
is too short? implications of length and framing on
the effectiveness of privacy notices. In Twelfth Sym-
posium on Usable Privacy and Security ({SOUPS}
2016), pages 321–340.
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps
163