
to mainstream Android. In this work, we revisited the
extent of permission piggybacking in libraries. Our
proposed method works on any Android version and
is, in contrast to other work, not reliant on the tedious
manual API extraction and mapping to permissions.
However, we have shown that our approach deliv-
ers identical evaluation result compared to previous
publications. In our evaluation we were able to an-
alyze all libraries on the top 1,000 apps on Google
Play and did not limit our search to advertisement li-
braries. Even though, most piggybacking libraries we
discovered fell into advertisement and tracking cate-
gory. Most popular piggybacked permissions remain
almost identical to the ones prevalent 12 years ago.
Also, the most alarming number that 50% of all li-
braries use permission piggybacking remain constant
throughout the years.
To change this practice, this topic needs more at-
tention in the media to become relevant for Google
to implement means into Android. What changed in
the past 12 years is that privacy has gained more at-
tention among normal users of digital platforms. The
previous Android releases had strong privacy focus,
like for example Scoped Storage in Android 11 or the
Privacy Dashboard in Android 12. Thus, if permis-
sion piggybacking comes into focus again, maybe it
would draw Googles attention with their recent pri-
vacy initiatives. Another option would be to imple-
ment a permission piggybacking prevention system in
privacy focused custom ROMs such as GrapheneOS.
It wouldn’t be the first feature finding its way from a
custom ROM into the official Android version.
ACKNOWLEDGEMENTS
This research work was supported by the National
Research Center for Applied Cybersecurity ATHENE
and the Hessian Ministry of the Interior and Sports.
REFERENCES
Au, K. W. Y., Zhou, Y. F., Huang, Z., and Lie, D. (2012).
Pscout: analyzing the android permission specifica-
tion. In ACM CCS, pages 217–228.
Backes, M., Bugiel, S., Derr, E., McDaniel, P., Octeau, D.,
and Weisgerber, S. (2016). On demystifying the an-
droid application framework: Re-Visiting android per-
mission specification analysis. In USENIX Security,
pages 1101–1118, Austin, TX.
Book, T., Pridgen, A., and Wallach, D. S. (2013). Lon-
gitudinal analysis of android ad library permissions.
arXiv:1303.0857.
Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D.
(2011). Android permissions demystified. In ACM
CCS, pages 627–638.
Grace, M. C., Zhou, W., Jiang, X., and Sadeghi, A.-R.
(2012). Unsafe exposure analysis of mobile in-app
advertisements. In ACM WiSec, pages 101–112.
Heid, K. and Heider, J. (2024). Haven’t we met before?
- detecting device fingerprinting activity on android
apps. EICC ’24, page 11–18. ACM.
Kawabata, H., Isohara, T., Takemori, K., Kubota, A., Kani,
J., Agematsu, H., and Nishigaki, M. (2013). Sanad-
box: Sandboxing third party advertising libraries in a
mobile application. In ICC, pages 2150–2154. IEEE.
Liu, B., Liu, B., Jin, H., and Govindan, R. (2015). Efficient
privilege de-escalation for ad libraries in mobile apps.
In MobiSys, pages 89–103.
Narayanan, A., Chen, L., and Chan, C. K. (2014). Addetect:
Automated detection of android ad libraries using se-
mantic analysis. In IEEE ISSNIP, pages 1–6.
Pearce, P., Felt, A. P., Nunez, G., and Wagner, D. (2012).
Addroid: Privilege separation for applications and ad-
vertisers in android. In Proceedings of the 7th ACM
Symposium on Information, Computer and Communi-
cations Security, pages 71–72.
Seo, J., Kim, D., Cho, D., Shin, I., and Kim, T. (2016).
Flexdroid: Enforcing in-app privilege separation in
android. In NDSS.
Shekhar, S., Dietz, M., and Wallach, D. S. (2012).
{AdSplit}: Separating smartphone advertising from
applications. In USENIX Security, pages 553–567.
Stevens, R., Gibler, C., Crussell, J., Erickson, J., and Chen,
H. (2012). Investigating user privacy in android ad li-
braries. In Workshop on Mobile Security Technologies
(MoST), volume 10, pages 195–197.
Sun, M. and Tan, G. (2014). Nativeguard: Protecting an-
droid applications from third-party native libraries. In
Proceedings of the 2014 ACM conference on Secu-
rity and privacy in wireless & mobile networks, pages
165–176.
Wang, F., Zhang, Y., Wang, K., Liu, P., and Wang,
W. (2016). Stay in your cage! a sound sandbox
for third-party libraries on android. In Computer
Security–ESORICS 2016: 21st European Symposium
on Research in Computer Security, Heraklion, Greece,
September 26-30, 2016, Proceedings, Part I 21, pages
458–476. Springer.
Zhan, X., Liu, T., Fan, L., Li, L., Chen, S., Luo, X., and
Liu, Y. (2021). Research on third-party libraries in
android apps: A taxonomy and systematic literature
review. IEEE Transactions on Software Engineering,
48(10):4181–4213.
Zhang, X., Ahlawat, A., and Du, W. (2013). Aframe: Iso-
lating advertisements from mobile applications in an-
droid. In Proceedings of the 29th Annual Computer
Security Applications Conference, pages 9–18.
Zhao, K., Zhan, X., Yu, L., Zhou, S., Zhou, H., Luo, X.,
Wang, H., and Liu, Y. (2023). Demystifying privacy
policy of third-party libraries in mobile apps. In 2023
IEEE/ACM 45th International Conference on Soft-
ware Engineering (ICSE), pages 1583–1595. IEEE.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
46