Privacy Profiling Impact of Android Mobile Applications

被引:0
作者
Barca, Cristian [1 ]
Barca, Dan Claudiu [1 ]
Mara, Constantin [1 ]
Raducu, Marian [1 ]
Gavriloaia, Bogdan [2 ]
Vizireanu, Radu [2 ]
Craciunescu, Razvan [2 ]
Halunga, Simona [2 ]
机构
[1] Univ Pitesti, Fac Elect Commun & Comp, Pitesti, Romania
[2] Univ Politehn Bucuresti, Telecommun Dept, Bucharest, Romania
来源
PROCEEDINGS OF THE 2015 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI) | 2015年
关键词
sensitive data; privacy impact profiling; permissions; mobile applications; Android; ALGORITHM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the past years we have experienced a fast growth in the demand and widespread of mobile devices. The evolution of wireless network technologies has offered mobile devices direct access to Internet and so, now, many applications allow users to interact with their friends on social-networks, send emails, use internet-banking services and more, while on the move. Because of that, and the advance in hardware capabilities, end users are increasingly relying on their personal mobile devices to store and handle sensitive information. In such context the privacy issues are quite concerning, since is likely for vendors to access sensitive data through their custom apps. Although several studies have examined general privacy risks and solutions to monitor, block or shadow personal data, few attempts have been made to build a framework that profiles the privacy impact of Android mobile applications at installation time and afterwards. Hence, in this paper, we propose an Android system extension that can expose to users a series of information about the previous concerns. We start by generating a high-level profile of the application at installation time (short-term) and then gather insights about it by monitoring sensitive data flows during runtime (long-term). The result: users will get the privacy impact knowledge needed in order to make informed decisions on whether or not to install or keep using an Android application.
引用
收藏
页数:6
相关论文
共 26 条
[1]  
Au K., 2012, P ACM COMP COMM SEC, P46
[2]  
Bal G., 2012, P IEEE S SEC PRIV, P1
[3]   A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android [J].
Barrera, David ;
Kayacik, H. Guenes ;
van Oorschot, P. C. ;
Somayaji, Anil .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :73-84
[4]  
Benton K., 2013, P 5 INT WORKSH SECUR, P1
[5]  
Beresford A., 2011, P HOT MOB, P45
[6]  
Chang CT, 2011, J INF SCI ENG, V27, P995
[7]  
El Agha M., 2012, EFFIC FAST INITIAL A, V4, P21, DOI [10.5815/ijisa.2012.01.03, DOI 10.5815/IJISA.2012.01.03]
[8]  
Enck W., 2009, P 16 ACM C COMP COMM, P14
[9]  
Enck William, 2010, P USENIX S OP SYST D
[10]  
Felt A. P., 2012, UCBEECS201270, P41