Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections

被引:0
|
作者
Kumar, Pradeep [1 ]
Singh, Maninder [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2015年
关键词
Digital privacy; smartphones; android; third party connections;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In previous few years, an incredible growth is witnessed in the popularity and pervasiveness of smart phones. It has also seen that new mobile applications are built day by day. These applications provide users functionality like social networking applications, games, and many more. Some of the mobile applications might be having a direct purchasing cost or be free but having an ad-support for revenue and in return these applications provide users' private data to ad provider with or without users' consent. Worryingly, some of ad libraries ask for permissions beyond the requirement and additional ones listed in their documentation. Some applications also track users by a network sniffer across ad providers and its applications. It is often ineffective at conveying meaningful, useful information on how a user's privacy might be impacted by using an application. Here in this paper, we have examined the effect on user privacy of some grossing Android applications that transmit private data of user without their permission. Using third party connections that an app makes, we defined the legitimacy of application. Also we observed some other parameter to check whether an app is stealing users' private information.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [21] Labyrinth: Visually Configurable Data-leakage Detection in Mobile Applications
    Pistoia, Marco
    Tripp, Omer
    Centonze, Paolina
    Ligman, Joseph W.
    2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 1, 2015, : 279 - 286
  • [22] PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications
    Zhang, Ruide
    Zhang, Ning
    Moini, Assad
    Lou, Wenjing
    Hou, Y. Thomas
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 34 - 44
  • [23] The Platform of Enterprise Third-Party Data Service Based on Distributed Mobile Communication
    Han, Hui
    Sun, Congyi
    Bai, Baohua
    Xing, Jianping
    Yao, Xiaojing
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 213 - +
  • [24] Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 201 - 222
  • [25] Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States
    Sheng-Liang Huang
    Tzonelih Hwang
    Prosanta Gope
    International Journal of Theoretical Physics, 2016, 55 : 2969 - 2976
  • [26] Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States
    Huang, Sheng-Liang
    Hwang, Tzonelih
    Gope, Prosanta
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (06) : 2969 - 2976
  • [27] USING NGSENGINE® DATA ANALYSIS SOFTWARE TO ANALYZE THIRD PARTY NGS HLA DATA
    Stelet, Vinicus N.
    Cita, Rafael F.
    Romero, Matilde
    Mendes, Maristela F.
    Binato, Renata
    HUMAN IMMUNOLOGY, 2019, 80 : 94 - 94
  • [28] Resource Allocation for Mobile Data Offloading Through Third-Party Cognitive Small Cells
    Li, Qun
    Yin, Zheng
    Xu, Ding
    COMMUNICATIONS AND NETWORKING, CHINACOM 2018, 2019, 262 : 438 - 447
  • [29] A public key encryption authentication new protocol by using the third party for mobile communication
    Li, FW
    Chen, GH
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1064 - 1069
  • [30] Passive Geolocation of Mobile Subscribers Using a Single Base Station with Third Party Capture
    Pimentel, Benjamin
    Tummala, Murali
    McEachen, John
    2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,