Proceedings of the 15th Workshop on Mobile Computing Systems and Applications 2014
DOI: 10.1145/2565585.2565593
|View full text |Cite
|
Sign up to set email alerts
|

Information leakage through mobile analytics services

Abstract: In this paper we investigate the risk of privacy leakage through mobile analytics services and demonstrate the ease with which an external adversary can extract individual's profile and mobile applications usage information, through two major mobile analytics services, i.e. Google Mobile App Analytics and Flurry. We also demonstrate that it is possible to exploit the vulnerability of analytics services, to influence the ads served to users' devices, by manipulating the profiles constructed by these services. B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
70
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(71 citation statements)
references
References 5 publications
1
70
0
Order By: Relevance
“…This technique entails analyzing an app's bytecode using symbolic execution [58] and/or control flow graphs [10], [11], [22]. Several academic studies leverage static analysis to inspect app permissions and their associated system calls [11], [41], to audit third-party library usage [17], [51], and to analyze flaws in HTTPS usage and certificate validation [24], [27]. This approach is appealing because it enables large-scale app analysis without the overhead of running or interacting with apps.…”
Section: Related Workmentioning
confidence: 99%
“…This technique entails analyzing an app's bytecode using symbolic execution [58] and/or control flow graphs [10], [11], [22]. Several academic studies leverage static analysis to inspect app permissions and their associated system calls [11], [41], to audit third-party library usage [17], [51], and to analyze flaws in HTTPS usage and certificate validation [24], [27]. This approach is appealing because it enables large-scale app analysis without the overhead of running or interacting with apps.…”
Section: Related Workmentioning
confidence: 99%
“…Information leakage [47] gives the information about how the privacy is getting disturbed in mobile environment. Two types of attacks are possible in mobile environment: 1) External attack, 2) Internal attack.…”
Section: Information Leakagementioning
confidence: 99%
“…An in-depth analysis of the data completeness is necessary to build dashboards that are useful for learners. Chen et al [8] investigate the chance of privacy leakage through mobile analytics services and show the easiness with which an external body will extract an individual's profile and mobile applications usage information through two of the major mobile analytics services, i.e., Google Mobile App analytics and Flurry that have the highest market share. Access to information such as device ID can reveal all the information from Flurry.…”
Section: Literature Surveymentioning
confidence: 99%
“…Access to information such as device ID can reveal all the information from Flurry. According to Chen et al [8], it is possible not only to spoof the identity of an Android device but also to extract each user's profile. To tackle this risk, they suggest deprecation of permanent unique identifiers (Android ID for Android and UUID for iOS).…”
Section: Literature Surveymentioning
confidence: 99%