Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23039
|View full text |Cite
|
Sign up to set email alerts
|

A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks

Abstract: Abstract-Today's smartphone users face a security dilemma: many apps they install operate on privacy-sensitive data, although they might originate from developers whose trustworthiness is hard to judge. Researchers have addressed the problem with more and more sophisticated static and dynamic analysis tools as an aid to assess how apps use private user data. Those tools, however, rely on the manual configuration of lists of sources of sensitive data as well as sinks which might leak data to untrusted observers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
154
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 257 publications
(155 citation statements)
references
References 25 publications
0
154
0
1
Order By: Relevance
“…A path may be within a single component or across multiple components. In this paper, the sources and sinks we use are provided by SUSI [38]. Listing 1 illustrates the concept of ICC leak through a concrete example.…”
Section: Icc Leaksmentioning
confidence: 99%
“…A path may be within a single component or across multiple components. In this paper, the sources and sinks we use are provided by SUSI [38]. Listing 1 illustrates the concept of ICC leak through a concrete example.…”
Section: Icc Leaksmentioning
confidence: 99%
“…Potential Active Component Leak (PACL). We define a PACL as a taint flow path starting from a source (defined as calls into resource methods returning non-constant values into the application code [23]) and ending with an exit-point. Such PCLs are referred to as "active", as the involved component is actively leaking sensitive data that it collected itself to other components (cf.…”
Section: B Pcl Typesmentioning
confidence: 99%
“…We define a PPCL as a taint flow path starting from an entry-point and ending with a sink (defined as calls into resource methods accepting at least one non-constant data value from the application code as parameter, if and only if a new value is written or an existing one is overwritten on the shared resource (e.g., GSM network) [23]). Such PCLs are referred to as "passive", as the involved component is passively leaking sensitive data collected by other components (cf.…”
Section: B Pcl Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…Initially, we tested SuSi, a tool that automatically identifies sink and source methods in the Android API [24]. The automatically identified sources and sinks were incomplete.…”
Section: Identifying and Classifying Sources And Sinksmentioning
confidence: 99%