Analyzing User Awareness of Privacy Data Leak in Mobile Applications

被引:9
|
作者
Kim, Youngho [1 ]
Oh, Tae [2 ]
Kim, Jeongnyeo [1 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Rochester Inst Technol, Rochester, NY 14623 USA
关键词
D O I
10.1155/2015/369489
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To overcome the resource and computing power limitation of mobile devices in Internet of Things (IoT) era, a cloud computing provides an effective platform without human intervention to build a resource-oriented security solution. However, existing malware detection methods are constrained by a vague situation of information leaks. The main goal of this paper is to measure a degree of hiding intention for the mobile application (app) to keep its leaking activity invisible to the user. For real-world application test, we target Android applications, which unleash user privacy data. With the Taint Droid-ported emulator, wemake experiments about the timing distance between user events and privacy leaks. Our experiments with Android apps downloaded from the Google Play show that most of leak cases are driven by user explicit events or implicit user involvement which make the user aware of the leakage. Those findings can assist a malware detection system in reducing the rate of false positive by considering malicious intentions. From the experiment, we understand better about app's internal operations as well. As a case study, we also presents a cloud-based dynamic analysis framework to perform a traffic monitor.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Analyzing Awareness on Data Privacy
    Andrews, Vernon
    [J]. PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 198 - 201
  • [2] On Privacy in User Tracking Mobile Applications
    Gasparovic, Marko
    Nicolau, Pedro
    Marques, Ana
    Silva, Catarina
    Marcelino, Luis
    [J]. 2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2016,
  • [3] Analyzing User Perspectives on Mobile App Privacy at Scale
    Nema, Preksha
    Anthonysamy, Pauline
    Taft, Nina
    Peddinti, Sai Teja
    [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 112 - 124
  • [4] User privacy awareness model in mobile payment environment based on data mining algorithm
    Ling, Xia
    Li, Gang
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2274 - 2278
  • [5] MOBILE APPS - USER AWARENESS ON PERMISSIONS, INFORMATION PRIVACY AND SECURITY
    Tutunea, Mihaela Filofteia
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2017): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2017, : 70 - 77
  • [6] Privacy Most online pornography sites leak user data
    Vaughan, Adam
    [J]. NEW SCIENTIST, 2019, 243 (3240) : 15 - 15
  • [7] Analyzing Privacy Designs of Mobile Social Networking Applications
    Chen, Guanling
    Rahman, Faruq
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 83 - 88
  • [8] User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study
    Callanan, Cormac
    Jerman-Blazic, Borka
    Blazic, Andrej Jerman
    [J]. TELEMATICS AND INFORMATICS, 2016, 33 (01) : 109 - 128
  • [9] USER PRIVACY AND DATA TRUSTWORTHINESS IN MOBILE CROWD SENSING
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE WIRELESS COMMUNICATIONS, 2015, 22 (01) : 28 - 34
  • [10] Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing
    Wu, Haiqin
    Wang, Liangmin
    Xue, Guoliang
    Tang, Jian
    Yang, Dejun
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (06) : 2294 - 2307