2022
DOI: 10.1007/s41019-022-00189-1
|View full text |Cite
|
Sign up to set email alerts
|

A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis

Abstract: Mobile apps represent essential tools in our daily routines, supporting us in almost every task. However, this assistance might imply a high cost in terms of privacy. Indeed, mobile apps gather a massive amount of data about individuals (e.g., users’ profiles and habits) and their devices (e.g., locations), where not all are strictly needed for app execution. According to privacy laws, apps’ providers must inform end-users on adopted data usage practices (e.g., which data are collected and for which purpose). … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…The data leakage modelling is relatively coarse‐grained compared with the data‐flow analysis used in this work. Our work focusses on the sensitive data operated by cryptographic APIs, which are more specialised than the personal data of [38]. Taking the information from Table 1, we summarise the differences between related approaches in Table 12.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The data leakage modelling is relatively coarse‐grained compared with the data‐flow analysis used in this work. Our work focusses on the sensitive data operated by cryptographic APIs, which are more specialised than the personal data of [38]. Taking the information from Table 1, we summarise the differences between related approaches in Table 12.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with these cryptographic misuse detection approaches, our work aims at demonstrating the risk of dependency between cryptographic misuse and related data leakage. On the other hand, the general-purpose risk estimation approach [38] takes private data collection and sharing behaviours as the metrics to measure apps' risk. The data leakage modelling is relatively coarse-grained compared with the data-flow analysis used in this work.…”
Section: Related Workmentioning
confidence: 99%
“…The two graphs are then compared to determine the set of dangerous APIs. Son et al [19,20] leverages on app's static analysis to model an app's behavior w.r.t data collection, on the basis of APIs, classes, functions, and constants usage. They measure an app's risk level by quantifying how much the app's behaviour diverges from the behavior of the majority of the apps in the same category.…”
Section: Related Workmentioning
confidence: 99%