COMBINATION ATTACK OF ANDROID APPLICATIONS ANALYSIS SCHEME BASED ON PRIVACY LEAK

被引:0
|
作者
Gu, Jieming [1 ,2 ]
Li, Chengze [1 ,2 ]
Lei, Dian [1 ,2 ]
Li, Qi [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] NEL Secur Technol Mobile Internet, Beijing, Peoples R China
关键词
Combination attack; Risk component; Associated application; Privacy leak;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, attackers use communication defects among different applications to trigger malicious attack behaviors, we name it combination attack of Android applications. Combination attack of Android applications is researched in depth, but there are still some shortcomings in the research findings. Because the combination attack of Android applications involves several applications, it is more hidden than general attack and the detection scheme for single application is not suitable. Based on these, this paper proposes a combination attack of Android applications analysis scheme based on privacy leak. Firstly, detecting the risk components of applications and then extracting the associated applications. Moreover, we establish privacy leak paths of the associated applications. Based on these, we can find the applications that involve in combination attack. The experimental result shows that this scheme can analyze the combination attack of Android applications effectively.
引用
收藏
页码:62 / 66
页数:5
相关论文
共 50 条
  • [21] Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
    Zhang, Xiaolu
    Baggili, Ibrahim
    Breitinger, Frank
    COMPUTERS & SECURITY, 2017, 70 : 516 - 531
  • [22] Analysis of Privacy Leak on Twitter
    Deodhar, Leena
    Divakaran, Dinil Mon
    Gurusamy, Mohan
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [23] Metrics based on permission groups to understand the impact of Android applications on privacy
    Aparicio, Amador
    Martinez Gonzalez, M. Mercedes
    Cardenoso, Valentin
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [24] Permission-Combination-based Scheme for Android Mobile Malware Detection
    Liang, Shuang
    Du, Xiaojiang
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2301 - 2306
  • [25] An Effective Access Control Scheme for Preventing Permission Leak in Android
    Wu, Longfei
    Du, Xiaojiang
    Zhang, Hongli
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 57 - 61
  • [26] Examining the Privacy Vulnerability Level of Android Applications
    Kapitsaki, Georgia M.
    Ioannou, Modestos
    WEBIST: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, : 34 - 45
  • [27] PRADroid: Privacy Risk Assessment for Android Applications
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 90 - 95
  • [28] Comparing Privacy Labels of Applications in Android and iOS
    Khandelwal, Rishabh
    Nayak, Asmit
    Chung, Paul
    Fawaz, Kassem
    PROCEEDINGS OF THE 22ND WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2023, 2023, : 61 - 73
  • [29] Privacy Profiling Impact of Android Mobile Applications
    Barca, Cristian
    Barca, Dan Claudiu
    Mara, Constantin
    Raducu, Marian
    Gavriloaia, Bogdan
    Vizireanu, Radu
    Craciunescu, Razvan
    Halunga, Simona
    PROCEEDINGS OF THE 2015 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2015,
  • [30] Automatic Detection for Privacy Violations in Android Applications
    Luo, Qian
    Yu, Yinbo
    Liu, Jiajia
    Benslimane, Abderrahim
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6159 - 6172