A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control

被引:0
|
作者
Wu, Fan [1 ]
Sun, Ran [2 ]
Fan, Wenhao [2 ]
Liu, Yuan'An [1 ]
Liu, Feng [3 ]
Lu, Hui [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Chinese Acad Sci, Beijing, Peoples R China
[4] Guangzhou Univ, Guangzhou, Guangdong, Peoples R China
关键词
Android Privacy; Forensics Method; Machine Learning; Process Injection;
D O I
10.4018/IJDCF.2018070108
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This article proposes a system that focuses on Android application runtime behavior forensics. Using Linux processes, a dynamic injection and a Java function hook technology, the system is able to manipulate the runtime behavior of applications without modifying the Android framework and the application's source code. Based on this method, a privacy data protection policy that reflects users' intentions is proposed by extracting and recording the privacy data usage in applications. Moreover, an optimized random forest algorithm is proposed to reduce the policy training time. The result shows that the system realizes the functions of application runtime behavior monitor and control. An experiment on 134 widely used applications shows that the basic privacy policy could satisfy the majority of users' privacy intentions.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 50 条
  • [1] Android application privacy protection mechanism based on virtual machine bytecode injection
    Song, Yubo
    Chen, Qi
    Song, Rui
    Hu, Aiqun
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (06): : 171 - 181
  • [2] DroidScribe: Classifying Android Malware Based on Runtime Behavior
    Dash, Santanu Kumar
    Suarez-Tangil, Guillermo
    Khan, Salahuddin
    Tam, Kimberly
    Ahmadi, Mansour
    Kinder, Johannes
    Cavallaro, Lorenzo
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 252 - 261
  • [3] Towards an Application-Based Notion of Anomalous Privacy Behavior in Android Applications
    AlSobeihy, Modhi M.
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [4] Sdguard - An Android Application Implementing Privacy Protection and Ransomware Detection
    Hong, Shuangxi
    Liu, Chuanchang
    Ren, Bingfei
    Chen, Junliang
    [J]. MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2017, : 149 - 149
  • [5] A context-perceptual privacy protection approach on Android devices
    Tan, Hua-Zhe
    Zhao, Wei
    Shen, Hai-Hua
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] MineRBS: Detecting Android Malware Based on Runtime Behavior Sequence
    Jin, Hao
    Li, Yangyang
    Yang, Ying
    [J]. 2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 216 - 222
  • [7] Contextual Integrity Based Android Privacy Data Protection System
    Wu, Fan
    Li, He
    Fan, Wenhao
    Tang, Bihua
    Liu, Yuanan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (07) : 906 - 916
  • [8] CUPA : A Configurable User Privacy Approach For Android Mobile Application
    Alkindi, Zainab
    Sarrab, Mohamed
    Alzidi, Nasser
    [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 216 - 221
  • [9] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [10] Android platform-based individual privacy information protection system
    Weizhe Zhang
    Xiong Li
    Naixue Xiong
    Athanasios V. Vasilakos
    [J]. Personal and Ubiquitous Computing, 2016, 20 : 875 - 884