COMBINATION ATTACK OF ANDROID APPLICATIONS ANALYSIS SCHEME BASED ON PRIVACY LEAK

被引:0
|
作者
Gu, Jieming [1 ,2 ]
Li, Chengze [1 ,2 ]
Lei, Dian [1 ,2 ]
Li, Qi [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] NEL Secur Technol Mobile Internet, Beijing, Peoples R China
关键词
Combination attack; Risk component; Associated application; Privacy leak;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, attackers use communication defects among different applications to trigger malicious attack behaviors, we name it combination attack of Android applications. Combination attack of Android applications is researched in depth, but there are still some shortcomings in the research findings. Because the combination attack of Android applications involves several applications, it is more hidden than general attack and the detection scheme for single application is not suitable. Based on these, this paper proposes a combination attack of Android applications analysis scheme based on privacy leak. Firstly, detecting the risk components of applications and then extracting the associated applications. Moreover, we establish privacy leak paths of the associated applications. Based on these, we can find the applications that involve in combination attack. The experimental result shows that this scheme can analyze the combination attack of Android applications effectively.
引用
收藏
页码:62 / 66
页数:5
相关论文
共 50 条
  • [31] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [32] DexDefender: A DEX Protection Scheme to Withstand Memory Dump Attack Based on Android Platform
    RONG Yu
    LIU Yiyi
    LI Hui
    WANG Wei
    ZTE Communications, 2018, 16 (03) : 45 - 51
  • [33] Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android
    Hutchinson, Shinelle
    Mirza, Mohammad Meraj
    West, Nicholas
    Karabiyik, Umit
    Rogers, Marcus K.
    Mukherjee, Tathagata
    Aggarwal, Sudhir
    Chung, Haeyong
    Pettus-Davis, Carrie
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [34] Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking
    Tang, Junwei
    Li, Ruixuan
    Xiong, Zhiqiang
    Han, Hongmu
    Gu, Xiwu
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 193 - 200
  • [35] Towards an Application-Based Notion of Anomalous Privacy Behavior in Android Applications
    AlSobeihy, Modhi M.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [36] A privacy stealing detection method based on behavior-chain for android applications
    Wang, Zhao-Guo
    Li, Cheng-Long
    Zhang, Luo-Shi
    Zhang, Ji-Bao
    Guan, Yi
    Xue, Yi-Bo
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (09): : 1750 - 1755
  • [37] Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking
    Tang, Junwei
    Li, Ruixuan
    Xiong, Zhiqiang
    Han, Hongmu
    Gu, Xiwu
    Proceedings - 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing, EUC 2021, 2021, : 193 - 200
  • [38] Bug Analysis of Android Applications Based on JPF
    Wu, Libin
    Lu, Yahui
    Qi, Jing
    Cai, Shubin
    Deng, Bo
    Ming, Zhong
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 173 - 182
  • [39] Multi-Signature Based Tamper Detection Scheme of Android Applications
    Lee, Hyeong-Chan
    Jung, Jin-Hyuk
    Yi, Jeong Hyun
    SENSOR LETTERS, 2013, 11 (09) : 1820 - 1827
  • [40] Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools
    Heid, Kris
    Heider, Jens
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 1 - 6