Proceedings of the 27th Annual ACM Symposium on Applied Computing 2012
DOI: 10.1145/2245276.2232009
|View full text |Cite
|
Sign up to set email alerts
|

A framework for static detection of privacy leaks in android applications

Abstract: We report on applying techniques for static information flow analysis to identify privacy leaks in Android applications. We have crafted a framework which checks with the help of a security type system whether the Dalvik bytecode implementation of an Android app conforms to a given privacy policy. We have carefully analyzed the Android API for possible sources and sinks of private data and identified exemplary privacy policies based on this. We demonstrate the applicability of our framework on two case studies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
50
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(51 citation statements)
references
References 11 publications
0
50
0
Order By: Relevance
“…Multiple prior works use static analysis to detect intracomponent privacy leaks in Android apps [7], [22], [26], [35], [47]. AndroidLeaks [22] and LeakMiner [47] state the ability to handle the Android lifecycle including callback methods, but the two tools are not context-sensitive which precludes the precise analysis of many practical scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple prior works use static analysis to detect intracomponent privacy leaks in Android apps [7], [22], [26], [35], [47]. AndroidLeaks [22] and LeakMiner [47] state the ability to handle the Android lifecycle including callback methods, but the two tools are not context-sensitive which precludes the precise analysis of many practical scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], Batyuk et al proposed using static analysis for identifying security and privacy threats. AndroidLeaks [9], SCANDAL [10], and the approach presented in [11] are frameworks that detect privacy information leakage based on static analysis. Furthermore, in [12], the Android Application Sandbox (AAS) is proposed by Blasing et al AAS uses both static and dynamic analysis, where the static analysis part is based on matching 5 different patterns from decompiled code.…”
Section: Related Workmentioning
confidence: 99%
“…In this section we assess to what extent current static [2]- [7], [9], [12], [13] and dynamic [14], [15] code analysis approaches could benefit from our categorized sources/sinks list. As our results show, SUSI finds all the sources and sinks these previous approaches mention, plus many others which the community was previously unaware of, including some of which are actually being used by malware.…”
Section: E Rq5: Existing Lists Of Sources and Sinksmentioning
confidence: 99%
“…As our results show, SUSI finds all the sources and sinks these previous approaches mention, plus many others which the community was previously unaware of, including some of which are actually being used by malware. Most of the code-analysis tools were not publicly available, precluding one from directly comparing their source and sink lists to SUSI's [2], [3], [6], [7], [9], [15]. For those approaches we thus estimated the lists from their research papers.…”
Section: E Rq5: Existing Lists Of Sources and Sinksmentioning
confidence: 99%