COMBINATION ATTACK OF ANDROID APPLICATIONS ANALYSIS SCHEME BASED ON PRIVACY LEAK

被引:0
|
作者
Gu, Jieming [1 ,2 ]
Li, Chengze [1 ,2 ]
Lei, Dian [1 ,2 ]
Li, Qi [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] NEL Secur Technol Mobile Internet, Beijing, Peoples R China
关键词
Combination attack; Risk component; Associated application; Privacy leak;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, attackers use communication defects among different applications to trigger malicious attack behaviors, we name it combination attack of Android applications. Combination attack of Android applications is researched in depth, but there are still some shortcomings in the research findings. Because the combination attack of Android applications involves several applications, it is more hidden than general attack and the detection scheme for single application is not suitable. Based on these, this paper proposes a combination attack of Android applications analysis scheme based on privacy leak. Firstly, detecting the risk components of applications and then extracting the associated applications. Moreover, we establish privacy leak paths of the associated applications. Based on these, we can find the applications that involve in combination attack. The experimental result shows that this scheme can analyze the combination attack of Android applications effectively.
引用
收藏
页码:62 / 66
页数:5
相关论文
共 50 条
  • [1] An Automated Pipeline for Privacy Leak Analysis of Android Applications
    Zhou, Yifan
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1048 - 1050
  • [2] Container-Based Privacy Preserving Scheme for Android Applications
    Cui, Haoliang
    Shao, Shuai
    Niu, Shaozhang
    Zhang, Wen
    Yuan, Yang
    CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (04) : 731 - 737
  • [3] Container-Based Privacy Preserving Scheme for Android Applications
    CUI Haoliang
    SHAO Shuai
    NIU Shaozhang
    ZHANG Wen
    YUAN Yang
    ChineseJournalofElectronics, 2020, 29 (04) : 731 - 737
  • [4] Static Analysis of Memory Leak in Android Applications
    Zhou, Di
    Fu, Zhengyu
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1023 - 1027
  • [5] Android Malware : Study and Analysis for Privacy Leak in Ad-Hoc Network
    Malhotra, Akash
    Singh, Pawan Prakash
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 92 - 95
  • [6] Privacy Vulnerability Analysis for Android Applications A Practical Approach
    Argudo, Alejandro
    Lopez, Gabriel
    Sanchez, Franklin
    2017 FOURTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2017, : 256 - 260
  • [7] Longitudinal Compliance Analysis of Android Applications with Privacy Policies
    Hashmi, Saad Sajid
    Waheed, Nazar
    Tangari, Gioacchino
    Ikram, Muhammad
    Smith, Stephen
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 280 - 305
  • [8] Privacy Risk Assessment for SQLite Based Android Applications
    Yeh, Kuo-Hui
    Hou, Jia-Li
    Chen, Lin-Chih
    Liao, Hao-Xiang
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (07): : 1533 - 1541
  • [9] Memory Leak detection in Android applications based on code patterns
    Santhanakrishnan, Gayathri
    Cargile, Chris
    Olmsted, Aspen
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2016), 2016, : 133 - 134
  • [10] Testing of Memory Leak in Android Applications
    Shahriar, Hossain
    North, Sarah
    Mawangi, Edward
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 176 - 183