2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW) 2013
DOI: 10.1109/icdew.2013.6547438
|View full text |Cite
|
Sign up to set email alerts
|

Signature generation for sensitive information leakage in android applications

Abstract: In recent years, there has been rapid growth in mobile devices such as smartphones, and a number of applications are developed specifically for the smartphone market. In particular, there are many applications that are "free" to the user, but depend on advertisement services for their revenue. Such applications include an advertisement module -a library provided by the advertisement service -that can collect a user's sensitive information and transmit it across the network. Such information is used for targete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Network permission is the most popular permission among Android apps [42,43] which suggest that Android apps are highly dependent on internet access. This has pushed the research community to study network-related aspects of mobile apps, and in particular: (i) network traffic profiling/characterization/usage [5,6,[43][44][45][46][47][48][49][50]; (ii) security and privacy concerns, namely how private information is being manipulated and protected in apps [7,8,[51][52][53][54][55]; and (iii) network-related vulnerable scenarios which can be exploited by mischievous attackers [9,56,57]. To the best of our knowledge, our study is the first one empirically analyzing Eventual Connectivity issues in Android apps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Network permission is the most popular permission among Android apps [42,43] which suggest that Android apps are highly dependent on internet access. This has pushed the research community to study network-related aspects of mobile apps, and in particular: (i) network traffic profiling/characterization/usage [5,6,[43][44][45][46][47][48][49][50]; (ii) security and privacy concerns, namely how private information is being manipulated and protected in apps [7,8,[51][52][53][54][55]; and (iii) network-related vulnerable scenarios which can be exploited by mischievous attackers [9,56,57]. To the best of our knowledge, our study is the first one empirically analyzing Eventual Connectivity issues in Android apps.…”
Section: Related Workmentioning
confidence: 99%
“…As a consequence, it is unknown the prevalence of those issues and their impact on the quality as perceived by users. Indeed, state-of-the-art studies are mostly devoted to (i) network traffic characterization [5,6], (ii) its security and privacy implications [7,8], and (iii) possible exploitable scenarios addressed by malicious agents [9]. Previous studies have indeed focused on cataloging bugs/crashes for mobile apps in general [10], and bugs/crashes specific to quality attributes such as performance [11][12][13][14][15], security [16][17][18], behavioral/GUI inconsistency [19][20][21][22], and energy consumption [23][24][25][26][27].…”
mentioning
confidence: 99%
“…In Table VI, we present the surveyed works that deal with PII leakage detection [23], [27], [29], [5], [41], [50], [54], [57], [58]. For each work, we summarize the targeted mobile platforms, and whether the PII leaks are simply detected or also prevented.…”
Section: Pii Leakage Detectionmentioning
confidence: 99%
“…Kuzuno and Tonami in [27] investigate the leakage of sensitive information by the advertisement libraries embedded into free Android apps. They focus on both original and hashed identifiers unique to mobile devices (i.e., IMEI and Android ID) and SIM cards (i.e., IMSI and SIM Serial ID), as well as on the name of the cellular operator (CARRIER).…”
Section: Pii Leakage Detectionmentioning
confidence: 99%
See 1 more Smart Citation