Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System

作者: Shancang Li , Junhua Chen , Theodoros Spyridopoulos , Panagiotis Andriotis , Robert Ludwiniak

DOI: 10.1007/978-3-319-20376-8_34

关键词: Privacy softwareMobile deviceShort Message ServiceIntrusion detection systemPermissionComputer scienceService managementInternet privacyComputer securityAndroid (operating system)

摘要: In this paper, we investigated the definition of privacy, privacy abuse behaviours, and in Android systems, which may be very useful for identifying malicious apps from 'normal' apps. We also injection technology, service binding, proxy system, are widely used by normal to steal information. A real-time monitoring system app is developed on monitor potential data abuse. The able permission requests all installed as well analyse behaviors.

参考文章(8)
Yajin Zhou, Kapil Singh, Xuxian Jiang, Owner-Centric Protection of Unstructured Data on Smartphones trust and trustworthy computing. pp. 55- 73 ,(2014) , 10.1007/978-3-319-08593-7_4
Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang, DIVILAR: diversifying intermediate language for anti-repackaging on android platform conference on data and application security and privacy. pp. 199- 210 ,(2014) , 10.1145/2557547.2557558
Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui, A security assessment method for Android applications based on permission model international conference on cloud computing. ,vol. 02, pp. 701- 705 ,(2012) , 10.1109/CCIS.2012.6664265
Wei Tang, Guang Jin, Jiaming He, Xianliang Jiang, Extending Android Security Enforcement with a Security Distance Model international conference on internet technology and applications. pp. 1- 4 ,(2011) , 10.1109/ITAP.2011.6006288
Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor, Effective Risk Communication for Android Apps IEEE Transactions on Dependable and Secure Computing. ,vol. 11, pp. 252- 265 ,(2014) , 10.1109/TDSC.2013.58
Longfei Wu, Xiaojiang Du, Xinwen Fu, Security threats to mobile multimedia applications: Camera-based attacks on mobile phones IEEE Communications Magazine. ,vol. 52, pp. 80- 87 ,(2014) , 10.1109/MCOM.2014.6766089
Hiroki Kuzuno, S. Tonami, Signature generation for sensitive information leakage in android applications international conference on data engineering. pp. 112- 119 ,(2013) , 10.1109/ICDEW.2013.6547438
Albert B. Jeng, Te-En Wei, Chin-Wei Tien, Hahn-Ming Lee, Chih-How Chen, Android privacy international conference on machine learning and cybernetics. ,(2012)