Repackaging Android Applications for Auditing Access to Private Data

被引:20
作者
Berthome, P. [1 ]
Fecherolle, T. [1 ]
Guilloteau, N. [1 ]
Lalande, J. -F. [1 ]
机构
[1] Ensi Bourges, LIFO, F-18000 Bourges, France
来源
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES) | 2012年
关键词
android; security; permissions; privacy;
D O I
10.1109/ARES.2012.74
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important threats for Android users is the collection of private data by malware put on the market. Most of the proposed approaches that help to guarantee the user's privacy rely on modified versions of the Android operating system. In this paper, we propose to automatically detect when an application accesses private data and to log this access in a third-party application. This detection should be performed without any modification to the operating system. The proposed methodology relies on the repackaging of a compiled application and the injection of a reporter at bytecode level. Thus, such a methodology enables the user to audit suspicious applications that ask permissions to access private data and to know if such an access has occurred. We show that the proposed methodology can also be implemented as an IPS, in order to prevent such accesses. Experimental results show the efficiency of the methodology on a set of 18 regular applications of the Android market that deal with contacts. Our prototype detected 66% of the accesses to the user's contacts. We also experimented the detection of privacy violations with 5 known malware that send premium-rate SMS.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 24 条
[1]  
[Anonymous], 2011, ANDR FAK
[2]  
[Anonymous], 2012, SERV SID POL ANDR AP
[3]  
[Anonymous], P IEEE INT C EL INF
[4]  
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
[5]  
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640
[6]  
Asrar I., 2011, ANDROID THREAT TACKL
[7]  
Balanza M., 2011, 2011 6th International Conference on Malicious and Unwanted Software, P73, DOI 10.1109/MALWARE.2011.6112329
[8]  
Barrera D., 2010, ACM C COMP COMM SEC, P73, DOI DOI 10.1145/1866307.1866317
[9]   Secure Software Installation on Smartphones [J].
Barrera, David ;
van Oorschot, Paul .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :42-48
[10]  
Batyuk L., 2011, 2011 6th International Conference on Malicious and Unwanted Software, P66, DOI 10.1109/MALWARE.2011.6112328