Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014
DOI: 10.1145/2590296.2590312
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, context-aware privacy leakage confinement for android applications without firmware modding

Abstract: As Android has become the most prevalent operating system in mobile devices, privacy concerns in the Android platform are increasing. A mechanism for efficient runtime enforcement of informationflow security policies in Android apps is desirable to confine privacy leakage. The prior works towards this problem require firmware modification (i.e., modding) and incur considerable runtime overhead. Besides, no effective mechanism is in place to distinguish malicious privacy leakage from those of legitimate uses. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
1

Year Published

2015
2015
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 24 publications
0
16
0
1
Order By: Relevance
“…AppIntent [29] tracks the sequence of events leading to private data transmission, which helps to determine whether it is user intended or not. Zhang and Yin [30] develop Capper that can track privacy information and detect leakage at run time by inserting instrumentation code into apps. Our work takes a different viewpoint by systematically analyzing what privacy sensitive information the advertiser can collect and aggregate at run-time from multiple apps and infer the social relationship of a user.…”
Section: Discussionmentioning
confidence: 99%
“…AppIntent [29] tracks the sequence of events leading to private data transmission, which helps to determine whether it is user intended or not. Zhang and Yin [30] develop Capper that can track privacy information and detect leakage at run time by inserting instrumentation code into apps. Our work takes a different viewpoint by systematically analyzing what privacy sensitive information the advertiser can collect and aggregate at run-time from multiple apps and infer the social relationship of a user.…”
Section: Discussionmentioning
confidence: 99%
“…AppSealer [49] instruments Android apps for generating vulnerability-specific patches, which prevent component hijacking attacks at runtime. Other approaches [50,51] apply the same idea, which injects shadow code into Android apps, to perform privacy leaks prevention.…”
Section: Related Workmentioning
confidence: 99%
“…For example, TaintDroid [21] uses dynamic taint analysis to detect privacy leaks in Android apps, while PiOS [20] targets the iOS platform. Several systems [16,29,32,40,42,47,48,48,50] have been proposed to mitigate this threat. They either extend the Android framework to provide fine-grained permission control, or repackage apps to avoid changing the framework.…”
Section: Related Workmentioning
confidence: 99%