COMBINATION ATTACK OF ANDROID APPLICATIONS ANALYSIS SCHEME BASED ON PRIVACY LEAK

被引:0
|
作者
Gu, Jieming [1 ,2 ]
Li, Chengze [1 ,2 ]
Lei, Dian [1 ,2 ]
Li, Qi [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] NEL Secur Technol Mobile Internet, Beijing, Peoples R China
关键词
Combination attack; Risk component; Associated application; Privacy leak;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, attackers use communication defects among different applications to trigger malicious attack behaviors, we name it combination attack of Android applications. Combination attack of Android applications is researched in depth, but there are still some shortcomings in the research findings. Because the combination attack of Android applications involves several applications, it is more hidden than general attack and the detection scheme for single application is not suitable. Based on these, this paper proposes a combination attack of Android applications analysis scheme based on privacy leak. Firstly, detecting the risk components of applications and then extracting the associated applications. Moreover, we establish privacy leak paths of the associated applications. Based on these, we can find the applications that involve in combination attack. The experimental result shows that this scheme can analyze the combination attack of Android applications effectively.
引用
收藏
页码:62 / 66
页数:5
相关论文
共 50 条
  • [41] A comprehensive investigation of user privacy leakage to Android applications
    Ge, Yuming
    Deng, Bo
    Sun, Yi
    Tang, Libo
    Sheng, Dajiang
    Zhao, Yantao
    Xie, Gaogang
    Salamatian, Kave
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [42] PAcT: Detecting and Classifying Privacy Behavior of Android Applications
    Jain, Vijayanta
    Gupta, Sanonda Datta
    Ghanavati, Sepideh
    Peddinti, Sai Teja
    McMillan, Collin
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 104 - 118
  • [43] Check Points against Privacy Breaches in Android Applications
    Fukushima, Kazuhide
    Bauer, Lujo
    Jia, Limin
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 1 - 10
  • [44] MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications
    Ma, Kai
    Liu, Mengyang
    Guo, Shanqing
    Ban, Tao
    NEURAL INFORMATION PROCESSING, PT III, 2015, 9491 : 384 - 391
  • [45] Privacy-Enhanced Android for Smart Cities Applications
    Lepinski, Matthew
    Levin, David
    McCarthy, Daniel
    Watro, Ronald
    Lack, Michael
    Hallenbeck, Daniel
    Slater, David
    SMART CITY 360, 2016, 166 : 66 - 77
  • [46] Repackaging Attack on Android Banking Applications and Its Countermeasures
    Jung, Jin-Hyuk
    Kim, Ju Young
    Lee, Hyeong-Chan
    Yi, Jeong Hyun
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (04) : 1421 - 1437
  • [47] Coordinated Attack Research between Android Applications and Solutions
    Qu, Xiang-Dong
    Yu, Ge
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 718 - 722
  • [48] Repackaging Attack on Android Banking Applications and Its Countermeasures
    Jin-Hyuk Jung
    Ju Young Kim
    Hyeong-Chan Lee
    Jeong Hyun Yi
    Wireless Personal Communications, 2013, 73 : 1421 - 1437
  • [49] Real Time Analysis of Android Applications by Calculating Risk Factor to Identify Botnet Attack
    Kothari, Sonali
    ICCCE 2019: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND CYBER-PHYSICAL ENGINEERING, 2020, 570 : 55 - 62
  • [50] An Efficient Scheme of Detecting Repackaged Android Applications
    QIN Zhongyuan
    PAN Wanpeng
    XU Ying
    FENG Kerong
    YANG Zhongyun
    ZTECommunications, 2016, 14 (03) : 60 - 66