Mobile applications: Analyzing private data leakage using third party connections

作者: Pradeep Kumar , Maninder Singh , None

DOI: 10.1109/ICACCI.2015.7275584

关键词:

摘要: In previous few years, an incredible growth is witnessed in the popularity and pervasiveness of smart phones. It has also seen that new mobile applications are built day by day. These provide users functionality like social networking applications, games, many more. Some might be having a direct purchasing cost or free but ad-support for revenue return these users' private data to ad provider with without consent. Worryingly, some libraries ask permissions beyond requirement additional ones listed their documentation. track network sniffer across providers its applications. often ineffective at conveying meaningful, useful information on how user's privacy impacted using application. Here this paper, we have examined effect user grossing Android transmit permission. Using third party connections app makes, defined legitimacy Also observed other parameter check whether stealing information.

参考文章(9)
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Christopher Mann, Artem Starostin, A framework for static detection of privacy leaks in android applications acm symposium on applied computing. pp. 1457- 1462 ,(2012) , 10.1145/2245276.2232009
Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, Sahin Albayrak, Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications international conference on malicious and unwanted software. pp. 66- 72 ,(2011) , 10.1109/MALWARE.2011.6112328
Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Vision Proceedings of the second international workshop on Mobile cloud computing and services - MCS '11. pp. 21- 26 ,(2011) , 10.1145/1999732.1999740
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, X. Sean Wang, AppIntent: analyzing sensitive data transmission in android for privacy leakage detection computer and communications security. pp. 1043- 1054 ,(2013) , 10.1145/2508859.2516676
Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi, Unsafe exposure analysis of mobile in-app advertisements wireless network security. pp. 101- 112 ,(2012) , 10.1145/2185448.2185464
Sanae Rosen, Zhiyun Qian, Z. Morely Mao, AppProfiler Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 221- 232 ,(2013) , 10.1145/2435349.2435380
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, David Wetherall, These aren't the droids you're looking for Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 639- 652 ,(2011) , 10.1145/2046707.2046780