Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques

被引:2
|
作者
Deverashetti, Mounika [1 ]
Ranjitha, K. [1 ]
Pradeepthi, K., V [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Telengana, India
基金
中国国家自然科学基金;
关键词
Period/menstruation cycle tracking apps; Android apps; Static analysis; Dynamic analysis; Permission based; Machine learning; FORENSIC ANALYSIS; ANDROID APPS;
D O I
10.1016/j.jisa.2022.103171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There have been many incidents in the past, where user's private information, health and vitals, shared to a mobile app have been disclosed. In this paper, we consider Menstruation Cycle Tracking Android apps, and analyse their security features to understand if the app developers have taken adequate care to avoid such incidents of breach or disclosure. These apps store extremely personal information of women and need to take security very seriously. We have initially applied Static Analysis techniques on these apps, and understood the various loopholes from the developer's prospective. Moreover, we used Dynamic Analysis techniques to further scrutinise the apps and exploit the discovered vulnerabilities. We found many apps are not observant in implementing minimal security features. Further, we propose a machine learning based-Ranking and Extraction of Android Permissions (REAP) framework, where we extract the permissions of these apps and apply Classification and Clustering algorithms to aid in identifying apps that are seeking more permissions and are potentially more risky. Classification accuracy of 94.52% was achieved using Naive Bayes classifier. Menstruation cycle tracking apps carry extremely private information, however, the app developers, sometimes, fail to provide a secure environment to the end-users.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Enhancing Network Security using Hybrid Machine Learning Techniques
    Sirenjeevi, P.
    Dhanakoti, V.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [22] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Parnika Bhat
    Sunny Behal
    Kamlesh Dutta
    Proceedings of the Indian National Science Academy, 2023, 89 : 429 - 444
  • [23] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2023, 89 (03): : 429 - 444
  • [24] Modeling Virtualized Applications using Machine Learning Techniques
    Kundu, Sajib
    Rangaswami, Raju
    Gulati, Ajay
    Zhao, Ming
    Dutta, Kaushik
    ACM SIGPLAN NOTICES, 2012, 47 (07) : 3 - 14
  • [25] Learning Process Analysis using Machine Learning Techniques
    Fernandez-Robles, Laura
    Alaiz-Moreton, Hector
    Alfonso-Cendon, Javier
    Castejon-Limas, Manuel
    Panizo-Alonso, Luis
    INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2018, 34 (03) : 981 - 989
  • [26] Securing Web Applications with Static and Dynamic Information Flow Tracking
    Lam, Monica S.
    Martin, Michael
    Livshits, Benjamin
    Whaley, John
    PEPM'08: PROCEEDINGS OF THE 2008 ACM SIGPLAN SYMPOSIUM ON PARTIAL EVALUATION AND SEMANTICS-BASED PROGRAM MANIPULATION, 2008, : 3 - 12
  • [27] Static, Dynamic and Intrinsic Features Based Android Malware Detection Using Machine Learning
    Mantoo, Bilal Ahmad
    Khurana, Surinder Singh
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 31 - 45
  • [28] Dynamic Permissions based Android Malware Detection using Machine Learning Techniques
    Mahindru, Arvind
    Singh, Paramvir
    PROCEEDINGS OF THE 10TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2017, : 202 - 210
  • [29] Combining Static and Dynamic Analysis to Improve Machine Learning-based Malware Classification
    Chanajitt, Rajchada
    Pfahringer, Bernhard
    Gomes, Heitor Murilo
    2021 IEEE 8TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA), 2021,
  • [30] Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques
    Jinsoo Hwang
    Jeankyung Kim
    Seunghwan Lee
    Kichang Kim
    Wireless Personal Communications, 2020, 112 : 2597 - 2609