Detection of sensitive information leakage in Android applications using signature generation

被引:7
作者
Kuzuno, Hiroki [1 ]
Tonami, Satoshi [1 ]
机构
[1] SECOM Co Ltd, Intelligent Syst Lab, Mitaka, Tokyo 1818528, Japan
关键词
security; privacy; Android; mobile device;
D O I
10.1504/IJSSC.2015.067998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There has been growth in the development of mobile device market. In particular, many mobile devices' applications are 'free', but depend on advertisement modules for their revenue. An advertisement module can collect a user's sensitive information and transmit it across the network. Such behaviour becomes an invasion of privacy. We analysed 1,188 Android applications' traffic and permissions, 93% connected to multiple network destinations, and 55% required both access to sensitive information and the networking permissions. Of the 107,859 HTTP packets from these applications, 22% contained sensitive information. In an effort to enable users to control the transmission of their private information, we propose a system which, using a novel clustering method based on the HTTP destination and content distances, generates signatures from the clustering result and uses them to detect sensitive information leakage from applications. Our system detected 97% of the sensitive information leakage, with only 3% false positive results.
引用
收藏
页码:53 / 62
页数:10
相关论文
共 34 条
  • [1] ASIAJIN, 2011, ANDR APP KAR LETS YO
  • [2] Bailey M., 2007, 10 S REC ADV INTR DE
  • [3] Barrera D., 2010, 17 ACM C COMP COMM S
  • [4] Bayer U., 2009, 18 NETW DISTR SYST S
  • [5] Bilenko M., 2011, 11 PRIV ENH TECHN S
  • [6] Chung Y. J., 2009, IP OP MAN 9 IEEE INT
  • [7] Cilibrasi L. R., 2007, THESIS
  • [8] Coull E. S., 2011, 18 NETW DISTR SYST S
  • [9] Enck E., 2011, 20 USENIX SEC S
  • [10] Enck W, 2009, 16 ACM C COMP COMM S