2017 5th International Symposium on Digital Forensic and Security (ISDFS) 2017
DOI: 10.1109/isdfs.2017.7916515
|View full text |Cite
|
Sign up to set email alerts
|

Detection of mobile applications leaking sensitive data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Current data exfiltration detection methods for Android mostly focus on mobile applications leaking sensitive data. For example, in [3], a J48 classification algorithm was used to detect leakage of sensitive data by mobile applications and they also used the K-Means clustering algorithm to detect ma-licious mobile applications by comparing them to applications downloaded from Google Play Store. The proposed system can detect malign and benign applications.…”
Section: Related Workmentioning
confidence: 99%
“…Current data exfiltration detection methods for Android mostly focus on mobile applications leaking sensitive data. For example, in [3], a J48 classification algorithm was used to detect leakage of sensitive data by mobile applications and they also used the K-Means clustering algorithm to detect ma-licious mobile applications by comparing them to applications downloaded from Google Play Store. The proposed system can detect malign and benign applications.…”
Section: Related Workmentioning
confidence: 99%
“…However, the requirement to possess information related to genuine user routine leaves the arrangement vulnerable to attacks plus the scheme should consider fusion with other modalities to achieve better performance. In [46], sensitive data leakage prevention mechanism for Android mobile devices has been proposed. Malicious applications are detected which are responsible for the leakage of critical data utilising J8-classification algorithm.…”
Section: Non-biometric-based Systemsmentioning
confidence: 99%
“…b) Prominent processing power and execution time subsist [21], [22], resulting in subsequent incompatibility to operate on generic mobile devices. c) Databases used to train the biometric recognition schemes are far from the data that exists in the real world [33], [39], [40], [46], thus, offering reduced accuracy when such solutions are exposed to realistic data. d) Behavioural biometrics ease a user in terms of user adoptability [11], [33], [36]; however, the accuracy of such systems drops abruptly when user behaves inversely.…”
Section: Open Issuesmentioning
confidence: 99%
See 2 more Smart Citations