Toward a Framework for Detecting Privacy Policy Violations in Android Application Code

被引:116
作者
Slavin, Rocky [1 ]
Wang, Xiaoyin [1 ]
Hosseini, Mitra Bokaei [1 ]
Hester, James [2 ]
Krishnan, Ram [1 ]
Bhatia, Jaspreet [3 ]
Breaux, Travis D. [3 ]
Niu, Jianwei [1 ]
机构
[1] Univ Texas San Antonio, San Antonio, TX 78249 USA
[2] Univ Texas Dallas, Dallas, TX USA
[3] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE) | 2016年
基金
美国国家科学基金会;
关键词
Privacy Policies; Android Applications; Violation Detection;
D O I
10.1145/2884781.2884855
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile applications frequently access sensitive personal information to meet user or business requirements. Because such information is sensitive in general, regulators increasingly require mobile-app developers to publish privacy policies that describe what information is collected. Furthermore, regulators have fined companies when these policies are inconsistent with the actual data practices of mobile apps. To help mobile-app developers check their privacy policies against their apps' code for consistency, we propose a semi-automated framework that consists of a policy terminology-API method map that links policy phrases to API methods that produce sensitive information, and information flow analysis to detect misalignments. We present an implementation of our framework based on a privacy-policy-phrase ontology and a collection of mappings from API methods to policy phrases. Our empirical evaluation on 477 top Android apps discovered 341 potential privacy policy violations.
引用
收藏
页码:25 / 36
页数:12
相关论文
共 36 条
[1]  
[Anonymous], 2009, SCANDROID AUTO UNPUB
[2]  
[Anonymous], P WEB
[3]  
[Anonymous], 2014 NETW DISTR SYST
[4]  
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[5]  
[Anonymous], DISAGREEABLE PRIVACY
[6]  
[Anonymous], 2008, INTRO INFORM RETRIEV, DOI DOI 10.1017/CBO9780511809071
[7]  
[Anonymous], 2015, 22 ANN NETW DISTR SY
[8]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[9]  
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[10]  
Bello-Ogunu E., 2014, P 2014 WORKSH ECL TE, P15, DOI [10.1145/2688130.2688135, DOI 10.1145/2688130.2688135]