A privacy enforcing framework for Android applications

被引:15
|
作者
Neisse, Ricardo [1 ]
Steri, Gary [1 ]
Geneiatakis, Dimitris [2 ]
Fovino, Igor Nai [1 ]
机构
[1] European Commiss, Joint Res Ctr, Via E Fermi 2749, Ispra, Italy
[2] Aristotle Univ Thessaloniki, Elect & Comp Engn Dept, GR-54124 Thessaloniki, Greece
关键词
Android; App instrumentation; Permission control; Policy enforcement; Privacy;
D O I
10.1016/j.cose.2016.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of the Android operating system in a variety type of devices ranging from smart phones to smart TVs, makes it an interesting target for developers of malicious applications. One of the main flaws exploited by these developers is the permissions granting mechanism, which does not allow users to easily understand the privacy implications of the granted permissions. In this paper, we propose an approach to enforce fine-grained usage control privacy policies that enable users to control the access of applications to sensitive resources through application instrumentation. The purpose of this work is to enhance user control on privacy, confidentiality and security of their mobile devices, with regards to application intrusive behaviours. Our approach relies on instrumentation techniques and includes a refinement step where high-level resource-centric abstract policies defined by users are automatically refined to enforceable concrete policies. The abstract policies consider the resources being used and not the specific multiple concrete API methods that may allow an app to access the specific sensitive resources. For example, access to the user location may be done using multiple API methods that should be instrumented and controlled according to the user selected privacy policies. We show how our approach can be applied in Android applications and discuss performance implications under different scenarios. (C) 2016 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:257 / 277
页数:21
相关论文
共 50 条
  • [41] Container-Based Privacy Preserving Scheme for Android Applications
    CUI Haoliang
    SHAO Shuai
    NIU Shaozhang
    ZHANG Wen
    YUAN Yang
    ChineseJournalofElectronics, 2020, 29 (04) : 731 - 737
  • [42] Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    Fan, Chuan-Yen
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1361 - 1369
  • [43] Evaluating the privacy of Android mobile applications under forensic analysis
    Ntantogian, Christoforos
    Apostolopoulos, Dimitris
    Marinakis, Giannis
    Xenakis, Christos
    COMPUTERS & SECURITY, 2014, 42 : 66 - 76
  • [44] Android social applications permission overview from a privacy perspective
    Sandor, Andrei
    Tont, Gabriela
    2021 16TH INTERNATIONAL CONFERENCE ON ENGINEERING OF MODERN ELECTRIC SYSTEMS (EMES), 2021, : 166 - 169
  • [45] Toward a Framework for Detecting Privacy Policy Violations in Android Application Code
    Slavin, Rocky
    Wang, Xiaoyin
    Hosseini, Mitra Bokaei
    Hester, James
    Krishnan, Ram
    Bhatia, Jaspreet
    Breaux, Travis D.
    Niu, Jianwei
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 25 - 36
  • [46] Realization of a user-centric, privacy preserving permission framework for Android
    Nauman, Mohammad
    Khan, Sohail
    Othman, Abu Talib
    Musa, Shahrulniza
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 368 - 382
  • [47] ENFORCING RIGHT OF PRIVACY THROUGH PRIVACY ACT OF 1974
    EASTMAN, HB
    FEDERAL BAR JOURNAL, 1975, 34 (04): : 335 - 339
  • [48] AppGuard - Enforcing User Requirements on Android Apps
    Backes, Michael
    Gerling, Sebastian
    Hammer, Christian
    Maffei, Matteo
    von Styp-Rekowsky, Philipp
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 543 - 548
  • [49] TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android Applications
    Hu, Xinwen
    IEEE ACCESS, 2024, 12 : 165026 - 165041
  • [50] COMBINATION ATTACK OF ANDROID APPLICATIONS ANALYSIS SCHEME BASED ON PRIVACY LEAK
    Gu, Jieming
    Li, Chengze
    Lei, Dian
    Li, Qi
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 62 - 66