Assessment of Source Data Vulnerability to Reproduction in Android Applications

被引:0
作者
Shafi, Muhammad [1 ]
Israr, Muhammad [2 ]
Khan, Muhammad Sohail [2 ]
Khattak, Muhammad Irfan [2 ]
Syed, Togeer Ali [3 ]
机构
[1] Air Univ Islamabad, Islamabad, Pakistan
[2] Univ Engn & Technol, Peshawar, Pakistan
[3] Islamic Univ Medina, Medina, Saudi Arabia
来源
2017 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN) | 2017年
关键词
Android; Reproduction; Repackaging; Assessment; security; vulnerability; DEVELOPERS;
D O I
10.1109/CICN.2017.28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The vast distribution of smartphone applications and the data resident on the phone (in case of offline applications) makes the data more vulnerable to theft and reproduction. This exposure of data not only affects the intellectual property but also exposes the smartphone users to spam and illegal use of private data. This paper analyzes the offline Android applications with sizable databases such as dictionaries to assess the level of security they have against data theft/reproduction. 200 dictionaries were downloaded from Google Play Store to assess the level of security they provide against data theft/reproduction. Alarmingly, it was found that most of the applications have no encryption and the data is just few clicks away from reproduction while others are encrypted but the encryption schemes are so naive and could easily be decrypted. Only few applications were found to have robust encryption making it hard to reproduce the data.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 17 条
[1]  
Balebako R., 2014, The Privacy and Security Behaviors of Smartphone App Developers
[2]   Improving App Privacy: Nudging App Developers to Protect User Privacy [J].
Balebako, Rebecca ;
Cranor, Lorrie .
IEEE SECURITY & PRIVACY, 2014, 12 (04) :55-58
[3]  
Enck W., LIGHTWEIGHT MOBILE P, P235
[4]  
Huang H., FRAMEWORK EVALUATING, P169
[5]  
Kelley P. G., CONUNDRUM PERMISSION, P68
[6]  
Kelley P. G., PRIVACY PART APP DEC, P3393
[7]   Joining a smartphone ecosystem: Application developers' motivations and decision criteria [J].
Koch, Stefan ;
Kerschbaum, Markus .
INFORMATION AND SOFTWARE TECHNOLOGY, 2014, 56 (11) :1423-1435
[8]  
Linares-Vasquez M., REVISITING ANDROID R, P242
[9]  
Rashidi B., 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications JoWUA, V6, P3
[10]  
Ren C., DROIDMARKING RESILIE, P635